Ψηφιακό Τεκμήριο
Ψηφιακό Τεκμήριο
Ψηφιακό Τεκμήριο
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
ΚΕΦΑΛΑΙΟ 5.......................................................................................................................................67<br />
ΠΟΛΙΤΙΚΕΣ ΑΣΦΑΛΕΙΑΣ ΓΙΑ ΤΟ ΚΕΝΤΡΟ ΈΛΕΓΧΟΥ ΚΑΙ ΔΙΑΧΕΙΡΙΣΗΣ ΔΙΚΤΥΟΥ<br />
Α.Τ.Ε.Ι ΚΡΗΤΗΣ .................................................................................................................................67<br />
5.1 ACCEPTABLE ENCRYPTION POLICY ..............................................................................................67<br />
5.2 ACCEPTABLE USE POLICY & ..........................................................................................................69<br />
5.3 ANALOG/ISDN LINE SECURITY POLICY.......................................................................................70<br />
5.4 ANTI-VIRUS PROCESS*.................................................................................................................73<br />
5.5 BACKUP POLICY ...........................................................................................................................75<br />
5.6 CERTIFICATION AND ACCREDITATION POLICY .............................................................................77<br />
5.7 DIAL-IN ACCESS POLICY ..............................................................................................................79<br />
5.8 DISASTER RECOVERY POLICY ......................................................................................................81<br />
5.9 DMZ SECURITY POLICY ...............................................................................................................83<br />
5.10 E-MAIL POLICY*.........................................................................................................................86<br />
5.11 IDENTIFICATION AND AUTHENTICATION POLICY........................................................................88<br />
5.12 NETWORK SECURITY POLICY* ...................................................................................................90<br />
5.13 PASSWORD PROTECTION POLICY*..............................................................................................92<br />
5.14 PERSONNEL SECURITY POLICY* ................................................................................................95<br />
5.15 PHYSICAL SECURITY POLICY*..................................................................................................100<br />
5.16 PRIVACY POLICY ......................................................................................................................104<br />
5.17 REMOTE ACCESS POLICY..........................................................................................................105<br />
5.18 MOBILE COMPUTING AND STORAGE DEVICES..........................................................................108<br />
5.19 RESOURCE UTILIZATION SECURITY POLICY .............................................................................110<br />
5.20 ROUTER SECURITY POLICY.......................................................................................................112<br />
5.21 SERVER SECURITY POLICY* .....................................................................................................114<br />
5.22 SERVER MALWARE PROTECTION POLICY* ...............................................................................116<br />
5.23 USER DATA PROTECTION POLICY.............................................................................................118<br />
5.24 VPN SECURITY POLICY*..........................................................................................................120<br />
5.25 WIRELESS COMMUNICATION POLICY* .....................................................................................122<br />
ΚΕΦΑΛΑΙΟ 6.....................................................................................................................................128<br />
ΚΑΤΑΡΤΙΣΗ ΚΑΙ ΣΥΝΕΙΔΗΤΟΠΟΙΗΣΗ ΠΑΝΩ ΣΕ ΘΕΜΑΤΑ ΑΣΦΑΛΕΙΑΣ .....................128<br />
6.1 ΤΡΟΠΟΙ ΚΑΙ ΚΑΘΟΔΗΓΗΣΗ ΓΙΑ ΤΟΝ ΣΧΕΔΙΑΣΜΟ ΠΡΟΓΡΑΜΜΑΤΟΣ ΚΑΤΑΡΤΙΣΗΣ ΚΑΙ<br />
ΣΥΝΕΙΔΗΤΟΠΟΙΗΣΗΣ .........................................................................................................................128<br />
6.2 ΠΟΛΙΤΙΚΕΣ ΓΙΑ ΣΥΝΕΙΔΗΤΟΠΟΙΗΣΗ ΚΑΙ ΕΚΠΑΙΔΕΥΣΗ ΠΑΝΩ ΣΕ ΘΕΜΑΤΑ ΑΣΦΑΛΕΙΑΣ .................133<br />
6.2.1 Security Training Policy ....................................................................................................133<br />
6.2.2 Information Security Awareness Policy .............................................................................135<br />
ΚΕΦΑΛΑΙΟ 7.....................................................................................................................................138<br />
ΕΠΙΛΟΓOΣ-ΣΥΜΠΕΡΑΣΜΑΤΑ ....................................................................................................138<br />
ΠΑΡΑΡΤΗΜΑ....................................................................................................................................139<br />
8.1 ΠΟΛΙΤΙΚΕΣ ΑΣΦΑΛΕΙΑΣ ΣΤΑ ΑΓΓΛΙΚΑ.........................................................................................139<br />
8.1.1 Acceptable Use Policy .......................................................................................................140<br />
8.1.2 Analog/ISDN Line Security Policy.....................................................................................141<br />
8.1.3 Backup Policy ....................................................................................................................144<br />
8.1.4 Dial-In Access Policy.........................................................................................................145<br />
8.1.5 DMZ Lab Security Policy...................................................................................................146<br />
8.1.6 Network Security Policy.....................................................................................................150<br />
8.1.7 Privacy Policy....................................................................................................................152<br />
8.1.8 Remote Access Policy.........................................................................................................153<br />
8.1.9 Router Security Policy .......................................................................................................156<br />
ΒΙΒΛΙΟΓΡΑΦΙΑ................................................................................................................................158<br />
6