Establish A Bullet-Proof Security Policy: Page 2

(Page 2 of 4)

Identifying Your Organization's Assets
Your very first step in creating a site security policy consists of compiling a comprehensive list of all the things that need to be protected. Items to consider include:

  • Hardware:
    • cpus
    • boards
    • keyboards
    • terminals
    • workstations
    • personal computers
    • printers
    • disk drives
    • communication lines
    • terminal servers
    • routers.
  • Software:
    • source programs
    • object programs
    • utilities
    • diagnostic programs
    • operating systems
    • communication programs
  • Data:
    • during execution
    • stored on-line
    • archived off-line
    • backups
    • audit logs
    • databases
    • in transit over communication media
  • People:
    • users
    • people needed to run systems
  • Documentation:
    • programs & applications
    • hardware
    • systems
    • local administrative procedures
  • Supplies:
    • paper
    • forms
    • ribbons
    • magnetic media

Page 2 of 4

Previous Page
1 2 3 4
Next Page





0 Comments (click to add your comment)
Comment and Contribute

 


(Maximum characters: 1200). You have characters left.