Your security policy should minimize all types of threats and ensure network compromise or security breaches are as infrequent as impossible. It should also minimize the affect of any security breach once it occurs.
As you develop your security policy focus on the following goals :
(i) Preventing maliclious damage to files and systems.
(ii) Preventing accidental damage to files and systems.
(iii) Limiting the results of any deletions or damage to files that do over.
(iv) Protecting the integrity and confidentiality of data.
(v) Preventing unauthorized access to the system.
(vi) Preventing appropriate disaster-recovery systems so the server can be restored and be back online again quickly.
(vii) Whatever form, information should always be protected to its value.
As you develop your security policy focus on the following goals :
(i) Preventing maliclious damage to files and systems.
(ii) Preventing accidental damage to files and systems.
(iii) Limiting the results of any deletions or damage to files that do over.
(iv) Protecting the integrity and confidentiality of data.
(v) Preventing unauthorized access to the system.
(vi) Preventing appropriate disaster-recovery systems so the server can be restored and be back online again quickly.
(vii) Whatever form, information should always be protected to its value.
0 comments:
Post a Comment