Intro To Networking Chapter 9 Terms Flashcards
a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
Security Policy
Describes what staff, customers, and business partners can expect for monitoring and reporting network use.
Privacy policy
Explains for what purposes network resources can be used.
Acceptable use policy
Describes how users identify themselves to gain access to network resources. Logon names, password conventions, and authentication methods should be described.
Authentication policy
Explains what constitutes proper or improper use of Internet resources.
Internet use policy
Specifies how and when users are allowed to access network resources. Policies should exist for both onsite and remote access to the network.
Access policy
Explains the manner in which security compliance or violations can be verified and the consequences for violations
Auditing policy
Outlines the policies for backup procedures, virus protection, and disaster recovery.
Data protection
features such as data encryption, complex password requirements, detailed auditing and monitoring of computer and network access, intricate authentication methods, including multifactor authentication, and strict policies governing use of the Internet and e-mail.
Highly Restrictive Security Policies
require passwords for each user but not overly complex passwords. Auditing is geared toward detecting unauthorized logon attempts, misuse of network resources, and network attacker activity.
Moderately Restrictive Security Policies
simple or no passwords, unrestricted access to resources, and probably no monitoring and auditing.
Open Security Policies
Identifying who’s permitted to access which network resources
Authentication and authorization
Making data unusable to anyone except authorized users
Encryption
Allowing authorized remote access to a private network via the public Internet
Virtual private networks (VPNs)
Implementing measures for protecting data and authorizing access to a wireless network
Wireless security
Using a hardware device or software (including firewalls, intrusion detection and prevention systems, and content filters) that protects a computer or network from unauthorized access and attacks designed to cripple network or computer performance
Network security devices
Securing data from software designed to destroy data or make computers and networks operate inefficiently
Malware protection