LAB3 - Policy Flashcards
Why do organisations need security policies?
Policies define how things should be done in an organisation.
What 9 things do security policies cover?
Internet usage, email, external devices, passwords, software, personal devices, disposal of equipment, backup, device hardening
Defining reponsiblities
Who is reponsible for what, how to report concerns, reporting to staff/employees
3 security parameters
Password policy, acceptable software/installation/usage policy, device hardening parameters
Password policy - 3 dos
Create long password - harder to crack, combination of upper and lowercase letters and symbols - more complex, change password regularly - reduce the likelihood of someone working them out, limit length of access
Password policy - 4 don’ts
Make the password a single word - ‘dictionary hack’ may be used, use the name of children, pets, other familiar names, write it down, share it with others
3 disadvantages of using non-approved software
Deliberately or accidently be affected with malware, support issues - bugs, incompatibility, licencing issues - not have the right to use the software
3 security parameters for acceptable software policy
List software applications approved for use, forbid installation on non-approved software, staff may make request for authorisation to install additional software
Define disaster recovery policy
sets out how an organisation will repond to a variety of disasters to ensure staff can return to normal working as soon as possible.
5 things to consider for disaster recovery policy
Who is reponsible for what, dos and don’ts for staff, defining backup process, timeline for data recovery, location alternative provision
5 actions to take following a cyber attack
Investigate, respond, manage, recover, analyse
What happens at the Investigate stage (1)
Identify type of attack, when did it start, severity, what parts of system affected
What happens at the Repond stage (2)
Depending on severity:
- inform stakeholders
- inform appropriate authorities
What happens at the Manage stage (3)
- contain the attack: disconnect/shut down infected systems to prevent attack from spreading, preserve evidence for analysis
- designated peronnel to manage the attack
What happens at the Recover stage (4)
Disinfect digital systems, restore data from backups, return systems to full working order.