Establish a Bullet-Proof Security Policy - Page 2

By Elizabeth Ferrarini | Posted Oct 4, 2001
Page 2 of 4   |  Back to Page 1
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

Identifying Your Organization's Assets
Your very first step in creating a site security policy consists of compiling a comprehensive list of all the things that need to be protected. Items to consider include:

  • Hardware:
    • cpus
    • boards
    • keyboards
    • terminals
    • workstations
    • personal computers
    • printers
    • disk drives
    • communication lines
    • terminal servers
    • routers.
  • Software:
    • source programs
    • object programs
    • utilities
    • diagnostic programs
    • operating systems
    • communication programs
  • Data:
    • during execution
    • stored on-line
    • archived off-line
    • backups
    • audit logs
    • databases
    • in transit over communication media
  • People:
    • users
    • people needed to run systems
  • Documentation:
    • programs & applications
    • hardware
    • systems
    • local administrative procedures
  • Supplies:
    • paper
    • forms
    • ribbons
    • magnetic media

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter