Topic 5 Security policies Flashcards

1
Q

Factors to take into account when designing security policies

A

Physical security e.g. locks
Logical security e.g. encryption
Disciplinary procedures
Personnel administration e.g. right employee for the right task
Operational procedures e.g disaster recovery planning
Auditing - WHO/WHAT/WHEN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operational factors to prevent misuse

A

Screening potential employees e.g. DBS check
Define procedures for downloading from the internet e.g. Code of conduct
Establish a disaster recovery plan e.g. Backup plans
Set up auditing procedures (audit trials) to detect misuse e.g. WHO/WHAT/WHERE
Staff training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

User accounts and logs

A

Auditing - keeps a record of who had done what on the network

Auditing keeps records of:
WHO (usernames) logged on
WHAT - Details of files accessed/ details of changes made/ details of from which machine/ details of programs they used
WHEN - At what time did they logged on and off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Methods of preventing deliberate misuse

A

Controlling access to computer rooms
Proxy servers- gateway server
Password hierarchy to limit access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Factors that should be included in a disaster recovery plan

A

Cost
Risk analysis
Short and long term consequences
Backup strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Methods of preventing accidental misuse

A

Backup and recovery procedures
Grandfather, Father, Son systems
Keeping backup copies off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why should a business have security policies?

A

A legal requirement of the Data Protection Act becuase of its potential for misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Factors that decide how much to spend on protecting data (Risk analysis)

A
Identify potential risks
Likelihood of risk occurring
Short and long term concequnces of treat
How well equipped is the company to deal with the threat
(The diaster recovery plan)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Treats to data

A

Theft by employees
Natural disaster e.g. flood
Fire e.g. in the building
Power loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Consequnes of losing data

A

Loss of business and income
Loss of reputation
Legal action
(cost of recovering data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly