Lecture 3
Lecture 3
Lecture 3
Esmiralda Moradian
Learning outcomes
Ensure that all operations are consistent with the intent of the
security policies
Security policies types
● Access control
● Physical and environmental security
● Backup & restore
● Protection from malicious code
● Communications security (cryptographic controls)
● Privacy policy
● End user-oriented policies
– acceptable use of assets
– clear desk and clear screen
– mobile device and teleworking
– restrictions on software installation and use
Example. Internet usage policy
● Plan and address the security aspects of the deployment of a public web server
● Implement security management practices and controls
● Ensure web server OS and application meet the security requirements
● Ensure appropriate steps are taken to protect web content
● Use authentication and cryptographic technologies
● Employ network infrastructure for WS protection
● Commit to an ongoing process of maintaining WS security
Example. HR security_Employees