X hits on this document

Powerpoint document

3 Security Policies, Standards, and Planning - page 13 / 55

177 views

0 shares

0 downloads

0 comments

13 / 55

Firewalls & Network Security, 2nd ed. - Chapter 3

Components of An Effective ISSP

1. Statement of policy

a. Scope and applicability

b. Definition of technology addressed

c. Responsibilities

2. Authorized access and usage

a. User access

b. Fair and responsible use

c. Protection of privacy

3. Prohibited usage

a. Disruptive use or misuse

b. Criminal use

c. Offensive or harassing materials

d. Copyrighted, licensed, or other intellectual property

e. Other restrictions

4. Systems management

a. Management of stored   materials

b. Employer monitoring

c. Virus protection

d. Physical security

e. Encryption

5. Violations of policy

a. Procedures for reporting violations

b. Penalties for violations

6. Policy review and modification

a. Scheduled review of policy and procedures for modification

7. Limitations of liability

a. Statements of liability or disclaimers

Firewalls & Network Security, 2nd ed. - Chapter 3

Document info
Document views177
Page views177
Page last viewedMon Dec 05 17:09:54 UTC 2016
Pages55
Paragraphs604
Words4124

Comments