Security policies are a formal set of rules which is issued by an organization to ensure that the user who are authorized to access company technology and information assets comply with rules and guidelines related to the security of information.
A
security policy also considered to be a "living document" which means
that the document is never finished, but it is continuously updated as
requirements of the technology and employee changes.
Security
policies are used to manage network security. Most types of security policies
are automatically created during the installation. Policies can also customized
to suit specific environment.
Need
of Security policies-
1)
It increases efficiency.
2)
It upholds discipline and accountability
3)
It can make or break a business deal
4)
It helps to educate employees on security literacy
Some
important cyber security policies recommendations describe below-
Virus
and Spyware Protection policy:
•
It helps to detect threads in files, to detect applications that exhibit
suspicious behavior.
•
Removes, and repairs the side effects of viruses and security risks by using
signatures.
Firewall
Policy:
•
It blocks the unauthorized users from accessing the systems and networks that
connect to the Internet.
•
It detects the attacks by cybercriminals and removes the unwanted sources of
network traffic.
Intrusion
Prevention policy:
•
This policy automatically detects and
blocks the network attacks and browser attacks.
•
It also protects applications from
vulnerabilities and checks the contents of one or more data packages and
detects malware which is coming through legal ways.
Application
and Device Control:
•
This policy protects a system's
resources from applications and manages the peripheral devices that can attach
to a system.
• The device control policy applies to
both Windows and Mac computers whereas application control policy can be
applied only to Windows clients.
No comments:
Post a Comment