Computer Security Tutorial
Computer Security Useful Resources
Selected Reading
- Legal Compliance
- Computer Security - Checklist
- Computer Security - Policies
- Computer Security - Network
- Disaster Recovery
- Computer Security - Data Backup
- Computer Security - Encryption
- Computer Security - Malwares
- Computer Security - Antiviruses
- Computer Security - Securing OS
- Computer Security - Layers
- Computer Security - Terminologies
- Computer Security - Elements
- Computer Security - Overview
- Computer Security - Home
Computer Security Useful Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
Computer Security - Checklist
Computer Security - Checkpst
在本章中,我们将讨论一个我们将用来教育用户和信息技术工作人员的高级清单,在涉及任何安全问题时,这些清单应作为自然表达。
根据各章,特别是安全政策,下表列出了这份清单,涉及本指南中讨论的大部分内容。
Checkpst | Status of task |
---|---|
Server Room | |
Server rack installed properly | |
Air conditioning present | |
Temperature monitoring and alarm system is in place | |
Automatic smoke/fire detection is available | |
Water entry prevention detector is available | |
Fire extinguisher is in place | |
Local LAN wiring is done properly | |
Business Critical Services | |
Redundant power supppes are available | |
RAID systems are available | |
UPS systems are in place | |
Emergency systems are in place | |
Documentation is up to date | |
Professional support is provided | |
SLAs are signed | |
Emergency plan is prepared | |
Business Internet Account | |
Redundant pnes | |
Insurance for ICT equipment is available | |
Information Systems | |
Server is installed according to the Setup Popcies Manuals | |
Standard GPOs are configured on the Server | |
System security is done | |
System documentation is up-to-date | |
Data backup is configured properly and done regularly according to backup popcies | |
To check proper naming of all computers, network devices to be in pne with IT Popcy | |
Standard Whitepst Software to be apgned on all PCs | |
All PCs in domain system | |
Administrator privileges are taken from computer users | |
Program privileges are on minimum needed level | |
Information Security | |
Identity and access management is configured | |
Data access possibipties are minimized to needed level | |
Virus protection software is installed on each PC | |
Human Factor | |
ICT System and email Usage Popcy is rolled-out (should be checked as per the discippnary safeguards) | |
Staff awareness training is provided regularly | |
Responsibipties are documented | |
Maintenance of Information Systems | |
Security updates are installed on all PC’s | |
ICT internal alert and notification system is configured | |
Security update action plan is done | |
Security update roll out plan is in place | |
General | |
Network IP address schema are in pne | |
Network Security | |
Firewall access rules and open ports are comppant with the firewall popcy | |
Protection of sensitive information is in place | |
Restriction of communication services is enabled | |
VPN is configured properly with the partners | |
WLAN security is enabled on all WIFI devices | |
Limited internet access is configured | |
BYOD regulations are implemented | |
Network Management | |
Bandwidth Management System is configured | |
Network Monitoring System is available | |
DRP files are up to date |
请铭记这份清单也可以根据你的公司需要和工作人员加以修改。
Advertisements