Friday, 27 April 2012

Security policy

Security policy is a set of rules which people who are given access to the organization's technology and information must follow in order for the assets to have confidentiality, integrity and availability.
Security policy is created to have a baseline of the organization security posture, set the framework for the security implementation, to set a behavioral code, determine the procedures and tools, define roles and communicate consensus, and handle security incidents.
 There are two types of elements in security policy. Firstly, network design factors upon which security policies are based. Secondly, basic Internet threat vectors toward which security policies are written to mitigate.
As a continuous process of security policy, there is Network security which is done in four steps. 
Firstly, secure, where there are security solutions being implemented to prevent unauthorized persons to access the assets. Authentication, encryption, firewall and vulnerability patching are some security solutions.
Secondly, monitor, where system auditing and real-time intrusion detection is used so that violations to the security policy will be detected. This step authenticate the security implementation of the 'secure' step.
Thirdly, test, this shows the effectiveness of the policy.
Last but not least, improve, where the information that was gathered from the 'test' and 'monitor' steps are use to make improvements to the security implemented.

1 comment:

  1. HELLO,
    Through this post, i learnt more about the continuous process of security policy, which is network security. As this post goes more in depth on network security, unlike mine only touching on the surface of network security. I learnt more about the 4 stages of network security and how these stages can affect the security policy, by improvising the security policy to make the network as safe and secure as possible.
    The first step which is secure can be used by different methods as mentioned above, I think those solutions can also be implemented to prevent some network threats, such as hackers, etc.

    xoxo,
    JENNY ♥ 1104495E

    ReplyDelete