11) HND
11) HND
11) HND
1
Key Terms
2
Policy.
3
Security Policy.
▪ A security policy is a written document in an organization
outlining how to protect the organization from threats,
including computer security threats, and how to handle
situations when they do occur.
▪ A security policy must identify all of a company's assets as
well as all the potential threats to those assets.
▪ Company employees need to be kept updated on the
company's security policies.
▪ The policies themselves should be updated regularly as
well.
4
Standards.
5
Procedures.
▪Procedures are detailed step by step instructions to
achieve a given goal or mandate.
▪They are typically intended for internal departments
and should adhere to strict change control processes.
▪Often act as the “cookbook” for staff to consult to
accomplish a repeatable process.
▪Detailed enough and yet not too difficult that only a
small group (or a single person) will understand.
6
Security Procedures.
7
Guidelines.
8
Policy, Standards ,Procedures,
Guidelines
9
Different Policies.
There are a number of policies that can be implemented within an organisation,
stating the way in which a specific resource should or should not be used.
▪ User account and password policy
This will describe who can administer user accounts, how
accounts can be enabled and disabled, how often the password
should be changed and how strong it should be, how to recover
passwords or accounts, etc.
10
Different Policies.
11
Different Policies.
▪ Internet and email policy
Describes what type of websites cannot be accessed, what
type of information can or cannot be uploaded or downloaded,
precautions to be taken when sending / reading mail and
attachments, etc.
12
Different Policies.
▪Software policy
Describes what software can be installed, who has the
right to install it, use of illegal software, attempting to hack
or crack software, etc.
▪Physical access policy
Any rules with regards to accessing the physical
resources, what’s allowed and not allowed, times at which
access is allowed / not allowed, remote access, etc.
13
The Benefits of Documented IT
Policies & Procedures:
14
Lesson Summary
▪Policy
▪Procedures
▪Standards
▪Guidelines
▪Different Policies
▪The Benefits of Documented IT Policies &
Procedures
15