dcsimg

Establish a Bullet-Proof Security Policy - Page 2

 By Elizabeth Ferrarini | Posted Oct 4, 2001
Page 2 of 4   |  Back to Page 1
Print ArticleEmail Article

Identifying Your Organization's Assets
Your very first step in creating a site security policy consists of compiling a comprehensive list of all the things that need to be protected. Items to consider include:

  • Hardware:
    • cpus
    • boards
    • keyboards
    • terminals
    • workstations
    • personal computers
    • printers
    • disk drives
    • communication lines
    • terminal servers
    • routers.
  • Software:
    • source programs
    • object programs
    • utilities
    • diagnostic programs
    • operating systems
    • communication programs
  • Data:
    • during execution
    • stored on-line
    • archived off-line
    • backups
    • audit logs
    • databases
    • in transit over communication media
  • People:
    • users
    • people needed to run systems
  • Documentation:
    • programs & applications
    • hardware
    • systems
    • local administrative procedures
  • Supplies:
    • paper
    • forms
    • ribbons
    • magnetic media

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter

By submitting your information, you agree that enterprisenetworkingplanet.com may send you ENTERPRISENetworkingPLANET offers via email, phone and text message, as well as email offers about other products and services that ENTERPRISENetworkingPLANET believes may be of interest to you. ENTERPRISENetworkingPLANET will process your information in accordance with the Quinstreet Privacy Policy.