01.08.2013 Views

Ψηφιακό Τεκμήριο

Ψηφιακό Τεκμήριο

Ψηφιακό Τεκμήριο

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ΚΕΦΑΛΑΙΟ 5.......................................................................................................................................67<br />

ΠΟΛΙΤΙΚΕΣ ΑΣΦΑΛΕΙΑΣ ΓΙΑ ΤΟ ΚΕΝΤΡΟ ΈΛΕΓΧΟΥ ΚΑΙ ΔΙΑΧΕΙΡΙΣΗΣ ΔΙΚΤΥΟΥ<br />

Α.Τ.Ε.Ι ΚΡΗΤΗΣ .................................................................................................................................67<br />

5.1 ACCEPTABLE ENCRYPTION POLICY ..............................................................................................67<br />

5.2 ACCEPTABLE USE POLICY & ..........................................................................................................69<br />

5.3 ANALOG/ISDN LINE SECURITY POLICY.......................................................................................70<br />

5.4 ANTI-VIRUS PROCESS*.................................................................................................................73<br />

5.5 BACKUP POLICY ...........................................................................................................................75<br />

5.6 CERTIFICATION AND ACCREDITATION POLICY .............................................................................77<br />

5.7 DIAL-IN ACCESS POLICY ..............................................................................................................79<br />

5.8 DISASTER RECOVERY POLICY ......................................................................................................81<br />

5.9 DMZ SECURITY POLICY ...............................................................................................................83<br />

5.10 E-MAIL POLICY*.........................................................................................................................86<br />

5.11 IDENTIFICATION AND AUTHENTICATION POLICY........................................................................88<br />

5.12 NETWORK SECURITY POLICY* ...................................................................................................90<br />

5.13 PASSWORD PROTECTION POLICY*..............................................................................................92<br />

5.14 PERSONNEL SECURITY POLICY* ................................................................................................95<br />

5.15 PHYSICAL SECURITY POLICY*..................................................................................................100<br />

5.16 PRIVACY POLICY ......................................................................................................................104<br />

5.17 REMOTE ACCESS POLICY..........................................................................................................105<br />

5.18 MOBILE COMPUTING AND STORAGE DEVICES..........................................................................108<br />

5.19 RESOURCE UTILIZATION SECURITY POLICY .............................................................................110<br />

5.20 ROUTER SECURITY POLICY.......................................................................................................112<br />

5.21 SERVER SECURITY POLICY* .....................................................................................................114<br />

5.22 SERVER MALWARE PROTECTION POLICY* ...............................................................................116<br />

5.23 USER DATA PROTECTION POLICY.............................................................................................118<br />

5.24 VPN SECURITY POLICY*..........................................................................................................120<br />

5.25 WIRELESS COMMUNICATION POLICY* .....................................................................................122<br />

ΚΕΦΑΛΑΙΟ 6.....................................................................................................................................128<br />

ΚΑΤΑΡΤΙΣΗ ΚΑΙ ΣΥΝΕΙΔΗΤΟΠΟΙΗΣΗ ΠΑΝΩ ΣΕ ΘΕΜΑΤΑ ΑΣΦΑΛΕΙΑΣ .....................128<br />

6.1 ΤΡΟΠΟΙ ΚΑΙ ΚΑΘΟΔΗΓΗΣΗ ΓΙΑ ΤΟΝ ΣΧΕΔΙΑΣΜΟ ΠΡΟΓΡΑΜΜΑΤΟΣ ΚΑΤΑΡΤΙΣΗΣ ΚΑΙ<br />

ΣΥΝΕΙΔΗΤΟΠΟΙΗΣΗΣ .........................................................................................................................128<br />

6.2 ΠΟΛΙΤΙΚΕΣ ΓΙΑ ΣΥΝΕΙΔΗΤΟΠΟΙΗΣΗ ΚΑΙ ΕΚΠΑΙΔΕΥΣΗ ΠΑΝΩ ΣΕ ΘΕΜΑΤΑ ΑΣΦΑΛΕΙΑΣ .................133<br />

6.2.1 Security Training Policy ....................................................................................................133<br />

6.2.2 Information Security Awareness Policy .............................................................................135<br />

ΚΕΦΑΛΑΙΟ 7.....................................................................................................................................138<br />

ΕΠΙΛΟΓOΣ-ΣΥΜΠΕΡΑΣΜΑΤΑ ....................................................................................................138<br />

ΠΑΡΑΡΤΗΜΑ....................................................................................................................................139<br />

8.1 ΠΟΛΙΤΙΚΕΣ ΑΣΦΑΛΕΙΑΣ ΣΤΑ ΑΓΓΛΙΚΑ.........................................................................................139<br />

8.1.1 Acceptable Use Policy .......................................................................................................140<br />

8.1.2 Analog/ISDN Line Security Policy.....................................................................................141<br />

8.1.3 Backup Policy ....................................................................................................................144<br />

8.1.4 Dial-In Access Policy.........................................................................................................145<br />

8.1.5 DMZ Lab Security Policy...................................................................................................146<br />

8.1.6 Network Security Policy.....................................................................................................150<br />

8.1.7 Privacy Policy....................................................................................................................152<br />

8.1.8 Remote Access Policy.........................................................................................................153<br />

8.1.9 Router Security Policy .......................................................................................................156<br />

ΒΙΒΛΙΟΓΡΑΦΙΑ................................................................................................................................158<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!