Thursday, November 21, 2019

Configuring Files, NTFS, and Backups Assignment

Configuring Files, NTFS, and Backups - Assignment Example Security breaches possibly caused by human actions, which could be malicious, accidental, or through improper installation, operation or configuration. This paper presents guidelines that should be adopted to ensure efficient management and security of any information and communication technology network. These guidelines are written with keeping in mind of a less experienced IT network managers, to assist them in understanding and dealing with the risks they face. Upon implementation, these guidelines will go a long way in easing with problems of network insecurity. Network security policy guidelines are the practices and rules followed by an institution to protect its information resources. These polices must be documented, developed, reviewed, implemented and evaluated to ensure the integrity of the network. Hence, the need for these policies by an institution is never overemphasized (Avolio & Fallin, 2007). Program policies. It tackles overall Network security goals and it should be applied to all IT resources inside an institution. The institution’s management must instruct policy development to guarantee that the policies address the Network security requirements of all systems operating within the institution. System-specific policies. It addresses the Network security matters and requirements of a particular system. Corporate facilities may have several sets of system-specific policies that address security from the very common (access control) to the particular (system authorizations that reflect the isolation of duties among a team of employees). Create an approval procedure to include legal and human resources specialists, regulatory specialists and procedure and policy experts. Allow maximum time for the review and respond to every comment whether you accept it or not. Institution once developed its network security policy; next step is to document these policies. Each department is responsible to protect its networks,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.