Computer Security: Corporate Security Documentation Suitable for a Large Corporation
Item
(I) in-Depth Defense Measures
(II) Firewall Design
(III) Intrusion Detection System
(IV) Operating System Security
(V) Database Security
(VI) Corporate Contingency of Operation
(VII) Corporate Disaster Recovery Plan
(VIII) Team Members and Roles of Each
(IX) Timeline with Goal Description
(X) Data Schema
(XI) Graphical Interface Design
(XII) Testing Plan
(XIII) Support Plan
(XIV) Schematics
Computer Security: Corporate Security Documentation Suitable for a Large Corporation
(I) In-Depth Defense Measures
Information Technology (IT) Acceptable Use Policy
The intentions of IT for the publication of an Acceptable Use Policy are to ensure that non-restrictions are imposed that are not contrary to the organizations' culture of openness, integrity and trust. IT has a firm commitment to the protection of the company's employees, partners and the company from any individuals that are illegal or that would otherwise cause damage with or without knowledge or intent to the following:
Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of the company and these systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations.
Required in the effective security initiative is a team effort with full participation and support of each company employee. Each individual in the company that uses a computer has a responsibility to be aware of the guidelines and to follow these guidelines.
The purpose of this publication is to outline the appropriate use of computers in the organization. These rules are for the purpose of protecting the employee and the company against virus attacks and network systems services and to avoid legal situations. This policy is applicable to employees, contractors, consultants, temporaries and any other workers with this organization. Furthermore, included are personnel affiliated with other or third parties.
General Use and Ownership
Good judgment is required to be exercised by all employees and individual departments are responsible for development of guidelines on the personal use of the Internet/Intranet/Extranet systems. Any sensitive information or information considered vulnerable should be encrypted. The network may be monitored by authorized persons including equipment, systems and network traffic at any time for security purposes.
Security and Proprietary Information
The user interface for information included on the related systems will be classified as confidential or alternatively as non-confidential. Confidential information includes but is not limited to the following:
(1) company private information;
(2) corporate strategies;
(3) competitor sensitive information;
(4) trade secrets;
(5) specifications;
(6) customer lists; and (7) research data.
All PCs, laptops and workstations of the company will be security with a password-protected screensaver with automatic activation feature set for ten minutes or less or through logging off when the host is to be unattended. All host computers used by employees in conducting business for the company shall be equipped with an anti-virus program. Activities that are prohibited in general include any activity deemed illegal by local, state, federal or international law. Activities that are strictly prohibited include:
(1) violations of the right of any individual or company protected under copyright, trade secret, patent or other type of intellectual property including any similar laws or regulations.
(2) unauthorized copying of copyrighted material -- this includes photographs from magazines, books or other sources under copyright protection as well as music and any copyright software.
(3) exporting software, technical information, encryption software or technology in violation of international or regional laws controlling exports.
(4) introducing programs that are malicious into the network or server that contain any types of virus, worm, Trojan horse, email bomb or any other type of threat;
(5) revealing their password to others or allowing use of their account by others.
(6) Using the company computer or system to engage in the procurement or transmission of material that violate sexual harassment or hostile workplace laws in the jurisdiction of the company or the user.
(7) Making fraudulent offers relating to products, services, or items that originate from any company account.
(8) making statements concerning express or implied warranties unless that is part of the individual normal and regular tasks with the company.
(9) Committing breaches of security or network communication disruptions.
(10) Scanning ports or security scanning is prohibited unless IT is first informed.
(11) Execution of any type of monitoring on the network that will intercept data not intended for the host of the employee is prohibited.
(II) Firewall Design
The Network Support Organization maintained firewall devices are required...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now