Seminar - An Overview of Communications Technologies
|
Module 12 - Enterprise/SOHO Communications Needs and Solutions Slide 22 of 30 ________________ Security Policies
________________ The problem is not, not having the security policies, but not monitoring and enforcing the in-place policies. Most security policies identify assets, risks, and vulnerability, then consider the risks and take protective measures. Accountability Policy - Determines what entities a system should authenticate after identification and determine what communications path should be used between the authenticated parties. Access Control Policy - Determines what system entities should be controlled and their privileges. Data Confidentiality Policy - Establishes data disclosure procedures and data encryption types. Data Integrity Policy - Determines data protection methods
|