11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4 IT Essentials: PC Harware and Software Companion GuideThe security policy should also provide detailed information about the following issues incase of an emergency:■■■■■Steps to take after a breach in securityWho to contact in an emergencyInformation to share with customers, vendors, and the mediaSecondary locations to use in an evacuationSteps to take after an emergency is over, including the priority of services to berestoredCautionA security policy must be enforced and followed by all employees to be effective.Here is an example of an emergency checklist:■■■■Data loss:■■■■■Because of equipment theftBecause of wiretappingBecause of internal personnelBecause of external personnelBecause of temporary personnel/contractors/vendorsPower-related emergencies:■■■Building or floor power outageLocal power outageLarge or regional power outageTerrorist action:■■Theft:■■■Terrorist attacks leading to evacuationTerrorist attacks leading to lockdownPhysical theft of network devicePhysical theft of desktop computerPhysical theft of laptop

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!