General discussion

Locked

SECURITY BEST PRACTICES

By goncalves ·
Are there any published best practices for security available and how does one obtain a copy?

This conversation is currently closed to new comments.

8 total posts (Page 1 of 1)  
| Thread display: Collapse - | Expand +

All Comments

Collapse -

SECURITY BEST PRACTICES

by pjpatiky In reply to SECURITY BEST PRACTICES

goncalves - Go to IE, clear Address block and type in:

? Computers, Acceptable Employee Use

? Computers, Security Practices

? Computers, Security Guidelines

The above are writings/guides by Businesses, Universities, and Computer Managers.

With the above you should get several hundered near hits and 30 or so direct hits on how to set up Computer Security. Then write up a rough draft to fit your particular work enviorment, computer product, employee structure, and physical floor plan(s). Then mix your rough draft with the formal written practices you have taken from the above ? guides. Then have a Staff presentation to plug up the minor leaks before you put your policy into hard copy and effect.

Having come out of Senior Management where Seciruty was paramount I emphisize that your weakest link in Seciruty is your own employees. Create a Wiring Chart, (Chain of Command) to oversee that your policies are being adhered to. Appoint a pre-work monitor, and a post work monitor that will sparodically check each work station. And appoint one person to be the overall Security Officer to also monitor policy effectiveness and compliance.

Come back to me via my Hotmail address if I may further assist.

Collapse -

SECURITY BEST PRACTICES

by pjpatiky In reply to SECURITY BEST PRACTICES

One of the essentials of Security is repititious communication with work stations and Information handlers. This allows to the Security Coordinator to see where new practices should be introduced, and view where policied practices are in force.
In your case you have not returned an ethical reply to you Post. Is this indicitive?

Collapse -

SECURITY BEST PRACTICES

by goncalves In reply to SECURITY BEST PRACTICES

Your feedback was a great help to me - I found many artices outlining best practices for security. Thanks so much!

Collapse -

SECURITY BEST PRACTICES

by brandon.j.carroll In reply to SECURITY BEST PRACTICES

The Managing Cisco Network Security book, there is a great deal of security issues and alternatives discussed. I find that you will never be able to keep someone out if they want in bad enough. The key is to make it as difficult for them as possible. Not only firewalls and intrusion detection devices, but constantly changing your password and monitoring the logs. Believe it or not, if your company has alot of contract employees, they're real curious about what is out on the LAN. Even if it's not intended to cause harm.

Collapse -

SECURITY BEST PRACTICES

by goncalves In reply to SECURITY BEST PRACTICES

Poster rated this answer

Collapse -

SECURITY BEST PRACTICES

by AZosims In reply to SECURITY BEST PRACTICES

I can suggest you to read this on-line book:
http://www.boran.com/security/detail_toc.html

This book is about how to make a good Security Policy for Your enterprise.

Collapse -

SECURITY BEST PRACTICES

by goncalves In reply to SECURITY BEST PRACTICES

Poster rated this answer

Collapse -

SECURITY BEST PRACTICES

by goncalves In reply to SECURITY BEST PRACTICES

This question was closed by the author

Back to Security Forum
8 total posts (Page 1 of 1)  

Related Discussions

Related Forums