***Welcome to ashrafedu.blogspot.com * * * This website is maintained by ASHRAF***

Posts

    Latest Updates

    Sunday, April 24, 2022

    Security Policies

    Security policies are a formal set of rules which is issued by an organization to ensure that the user who are authorized to access company technology and information assets comply with rules and guidelines related to the security of information.

    A security policy also considered to be a "living document" which means that the document is never finished, but it is continuously updated as requirements of the technology and employee changes.

    Security policies are used to manage network security. Most types of security policies are automatically created during the installation. Policies can also customized to suit specific environment.

    Need of Security policies-

    1) It increases efficiency.

    2) It upholds discipline and accountability

    3) It can make or break a business deal

    4) It helps to educate employees on security literacy

    Some important cyber security policies recommendations describe below-

    Virus and Spyware Protection policy:

    • It helps to detect threads in files, to detect applications that exhibit suspicious behavior.

    • Removes, and repairs the side effects of viruses and security risks by using signatures.

    Firewall Policy:

    • It blocks the unauthorized users from accessing the systems and networks that connect to the Internet.

    • It detects the attacks by cybercriminals and removes the unwanted sources of network traffic.

    Intrusion Prevention policy:

             This policy automatically detects and blocks the network attacks and browser attacks.

             It also protects applications from vulnerabilities and checks the contents of one or more data packages and detects malware which is coming through legal ways.

    Application and Device Control:

             This policy protects a system's resources from applications and manages the peripheral devices that can attach to a system.

        The device control policy applies to both Windows and Mac computers whereas application control policy can be applied only to Windows clients.

    No comments:

    Post a Comment

    Network session analysis

    Network session analysis Network session analysis is a method of monitoring network activity and availability to identify issues, such as ...