General discussion

  • Creator
    Topic
  • #2092427

    SECURITY BEST PRACTICES

    Locked

    by goncalves ·

    Are there any published best practices for security available and how does one obtain a copy?

All Comments

  • Author
    Replies
    • #3878926

      SECURITY BEST PRACTICES

      by pjpatiky ·

      In reply to SECURITY BEST PRACTICES

      goncalves – Go to IE, clear Address block and type in:

      ? Computers, Acceptable Employee Use

      ? Computers, Security Practices

      ? Computers, Security Guidelines

      The above are writings/guides by Businesses, Universities, and Computer Managers.

      With the above you should get several hundered near hits and 30 or so direct hits on how to set up Computer Security. Then write up a rough draft to fit your particular work enviorment, computer product, employee structure, and physical floor plan(s). Then mix your rough draft with the formal written practices you have taken from the above ? guides. Then have a Staff presentation to plug up the minor leaks before you put your policy into hard copy and effect.

      Having come out of Senior Management where Seciruty was paramount I emphisize that your weakest link in Seciruty is your own employees. Create a Wiring Chart, (Chain of Command) to oversee that your policies are being adhered to. Appoint a pre-work monitor, and a post work monitor that will sparodically check each work station. And appoint one person to be the overall Security Officer to also monitor policy effectiveness and compliance.

      Come back to me via my Hotmail address if I may further assist.

      • #3865400

        SECURITY BEST PRACTICES

        by pjpatiky ·

        In reply to SECURITY BEST PRACTICES

        One of the essentials of Security is repititious communication with work stations and Information handlers. This allows to the Security Coordinator to see where new practices should be introduced, and view where policied practices are in force.
        In your case you have not returned an ethical reply to you Post. Is this indicitive?

      • #3878173

        SECURITY BEST PRACTICES

        by goncalves ·

        In reply to SECURITY BEST PRACTICES

        Your feedback was a great help to me – I found many artices outlining best practices for security. Thanks so much!

    • #3868479

      SECURITY BEST PRACTICES

      by brandon.j.carroll ·

      In reply to SECURITY BEST PRACTICES

      The Managing Cisco Network Security book, there is a great deal of security issues and alternatives discussed. I find that you will never be able to keep someone out if they want in bad enough. The key is to make it as difficult for them as possible. Not only firewalls and intrusion detection devices, but constantly changing your password and monitoring the logs. Believe it or not, if your company has alot of contract employees, they’re real curious about what is out on the LAN. Even if it’s not intended to cause harm.

    • #3875052

      SECURITY BEST PRACTICES

      by azosims ·

      In reply to SECURITY BEST PRACTICES

      I can suggest you to read this on-line book:
      http://www.boran.com/security/detail_toc.html

      This book is about how to make a good Security Policy for Your enterprise.

    • #3878172

      SECURITY BEST PRACTICES

      by goncalves ·

      In reply to SECURITY BEST PRACTICES

      This question was closed by the author

Viewing 3 reply threads