Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
A New Security Policy

A New Security Policy

Ratings: (0)|Views: 7|Likes:
Uploaded from Google Docs
Uploaded from Google Docs

More info:

Published by: Sally Frederick Tudor on May 04, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

12/21/2013

pdf

text

original

 
Sally Frederick Tudor 
 
IS 411SECURITY POLICYWhat's in a name? We frequently hear people use the names "policy", "standard", and"guideline" to refer to documents that fall within the policy infrastructure. So that those who participate in this consensus process can communicate effectively, we'll use the followingdefinitions.A policy is typically a document that outlines specific requirements or rules that must be met. Inthe information/network security realm, policies are usually point-specific, covering a singlearea. For example, an "Acceptable Use" policy would cover the rules and regulations for appropriate use of the computing facilities.A standard is typically collections of system-specific or procedural-specific requirements thatmust be met by everyone. For example, you might have a standard that describes how to hardena Windows NT workstation for placement on an external (DMZ) network. People must followthis standard exactly if they wish to install a Windows NT workstation on an external network segment.A guideline is typically a collection of system specific or procedural specific "suggestions" for  best practice. They are not requirements to be met, but are strongly recommended. Effectivesecurity policies make frequent references to standards and guidelines that exist within anorganization.Galena Park ISD requires all students to wear ID badges. All visitors are required to sign in atthe school office. I believe that these measures would help to minimize the risks from intruders, but I don¶t believe that it would stop the threat to students completely. There are no 100% safeways to protect our schools--just as there are no 100% secure networks. The most that can be

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->