Saturday, 2024-04-27, 0:43 AM
Welcome Guest | RSS
Site menu
Section categories
Arts [10]
Automotive [2]
Bank [17]
Beauty [3]
Business [5]
Energy [9]
Economy [1]
Entertainment [2]
Ecommerce [2]
Environment [1]
Fitness Equipment [1]
Finance [12]
Fundraising [1]
Food & Drink [6]
Gardening [1]
Health [4]
History [5]
Holdings [1]
Hair [3]
Hardware [1]
Home Based Business [1]
Industry [6]
Insurance [40]
Investing [5]
Loans [14]
Marketing [17]
Nature [1]
Networks [9]
Property [8]
Soccer [4]
Sociology [1]
Politics [2]
Trading Forex [17]
Technology [2]
Our poll
Rate my site
Total of answers: 1
Statistics

Total online: 1
Guests: 1
Users: 0
Home » 2015 » June » 19 » IT Security Policy
11:55 AM
IT Security Policy

The security policy is the definition of what it means to be safe for an organization, system or other entities. For an organization, it addresses constraints on the behavior of its members as well as the constraints imposed on the enemy by mechanisms such as doors, locks, keys and walls. For systems, security policies address the constraints on the functioning and the flow between them, constraints on access by external systems and enemies, including programs and access to the data by people.

If it is important to secure, then it is important to ensure that all security policies enforced by a mechanism that is strong enough. There is an organized methodology and risk assessment strategies to ensure the completeness of security policy and ensure that they are actually enforced. In a complex system, such as system information, the policy can be decomposed into sub-policies to facilitate the allocation of security mechanisms to enforce sub-policies. However, this practice has pitfalls. It is too easy to just go directly to the sub-policies, which basically rules of operation and issued by top-level policy. Which gives a false sense of security that address some of the operating rules of the overall security definitions when they are not. Since it is very difficult to think clearly with the completeness of the safety, operating rules declared a "sub-policy" without "policy super-" usually turns into a rambling ad-hoc rules that fail to enforce something with completeness. As a result, top-level security policies critical to serious security schemes and sub-policies and operating rules are meaningless without it.

Category: Networks | Views: 416 | Added by: mrblue | Tags: it security policy | Rating: 0.0/0
Total comments: 0
avatar
Log In
Search
Organization
Calendar
«  June 2015  »
SuMoTuWeThFrSa
 123456
78910111213
14151617181920
21222324252627
282930
Entries archive
Site friends
  • uCoz Community
  • uCoz Manual
  • Video Tutorials
  • Official Template Store
  • Best uCoz Websites