11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 16: Advanced Security 3After completing the following sections, you will meet these objectives:■■■Outline a local security policyExplain when and how to use security hardwareExplain when and how to use security application softwareFigure 16-1 illustrates how the different approaches to security work together to ensurephysical and data security.Figure 16-1Security ComponentsOutline a Local Security PolicyA security policy is a collection of rules, guidelines, and checklists. Network techniciansand managers of an organization work together to develop the rules and guidelines for thesecurity needs of computer equipment. A security policy includes the following elements:■■■■■Defines an acceptable computer usage statement for an organization.Identifies the people permitted to use the computer equipment in an organization.Identifies devices that are permitted to be installed on a network, as well as the conditionsof the installation. Modems and wireless access points are examples of hardwarethat could expose the network to attacks.Defines the requirements necessary for data to remain confidential on a network.Determines a process for employees to acquire access to equipment and data. Thisprocess can require the employee to sign an agreement regarding the company rules. Italso lists the consequences for failure to comply.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!