Corporate Security and IT Policies

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 5: Line 5:
[[Image:Security_Camera.jpg|thumb|right|Typical security camera used for recording physical perimeter of building]]
[[Image:Security_Camera.jpg|thumb|right|Typical security camera used for recording physical perimeter of building]]
-
 
==Software Security==
==Software Security==
Line 23: Line 22:
password Policy: http://www.sans.org/resources/policies/Password_Policy.pdf
password Policy: http://www.sans.org/resources/policies/Password_Policy.pdf
 +
 +
http://en.wikipedia.org/wiki/Physical_Security
==See Also==
==See Also==

Revision as of 22:36, 12 April 2009

Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect their corporations against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees).

Contents

Hardware Security

This is the hardware stuff

Typical security camera used for recording physical perimeter of building

Software Security

This is the software Stuff

Social Employee Security

This is social engineering prevention (dont give out passwords)

Other Security measures

References

Some companies have statements of security as shown here: http://www.total.com/static/en/medias/topic1608/pol-sur-001_security_policy12.pdf

picture: http://www.rsscctv.com/images/P/200x200_tkc215_300%2520WEB.jpg

password change policy: http://support.netmail.sg/images/changepwd_owa2.gif

password Policy: http://www.sans.org/resources/policies/Password_Policy.pdf

http://en.wikipedia.org/wiki/Physical_Security

See Also

Network firewall

Email Security

Fingerprint Authentication

External Links

Corporate Security

Password Policies

Personal tools