dcsimg

Establish A Bullet-Proof Security Policy: Page 2

(Page 2 of 4)

Identifying Your Organization's Assets
Your very first step in creating a site security policy consists of compiling a comprehensive list of all the things that need to be protected. Items to consider include:

  • Hardware:
    • cpus
    • boards
    • keyboards
    • terminals
    • workstations
    • personal computers
    • printers
    • disk drives
    • communication lines
    • terminal servers
    • routers.
  • Software:
    • source programs
    • object programs
    • utilities
    • diagnostic programs
    • operating systems
    • communication programs
  • Data:
    • during execution
    • stored on-line
    • archived off-line
    • backups
    • audit logs
    • databases
    • in transit over communication media
  • People:
    • users
    • people needed to run systems
  • Documentation:
    • programs & applications
    • hardware
    • systems
    • local administrative procedures
  • Supplies:
    • paper
    • forms
    • ribbons
    • magnetic media

Page 2 of 4

Previous Page
1 2 3 4
Next Page





0 Comments (click to add your comment)
Comment and Contribute

 


(Maximum characters: 1200). You have characters left.

 

 

IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.





×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.