What More Can I Ask Flashcards
Multifactor - Options
User Authentication Policy – Multifactor - Options Biometric • Thumbprint • Retinal Scan • Smart Cards • Smartphone text of one time password
Data Loss Prevention Policy(DLP)
Data Loss Prevention Policy(DLP)
Data Loss is more than data deletion. It also implies copying the data (stealing it) to an unintended
destination. Both internal and external sources can be at fault. Data loss can be malicious, accidental, or
the result of failed hardware storage.
Remote Access Policy
Remote Access Policy
Without a properly implemented policy, the network is more subject to attack.
Incident Response Policy
Incident Response Policy
What to do…when what has been done…is out of compliance with what is required
Bring Your Own Device Policy
Bring Your Own Device Policy
Policy specifies what are allowed devices, and whether or not they are supported as part of a person’s
role
Privileged User Agreement (PUA)
Privileged User Agreement (PUA)
Network Administration involves a great deal of trust in a person to not abuse their administrative power.
A PUA is a way to ‘trust’ but verify, both by agreement as well as auditing, that rules are being followed.
Acceptable Use Policy
Acceptable Use Policy
This policy assists in protecting the organization from inappropriate or unauthorized actions of network
users.
On-boarding/Off-Boarding Procedures
On-boarding/Off-Boarding Procedures These are repetitive activities performed when a newly hired employee/contractor arrives, or leaves Examples include: • Assigning entry badges and IDs • Initial username and password • Email setup • Workstation setup • Network access verification • Security training • Phone access/setup • Required new employee training
Non-Disclosure Agreement
. Non-Disclosure Agreement
An agreement designed to protect the proprietary information and intellectual property rights of an
organization
Between the employee/ contractee , and employer/contractor
Outlines the nature of the information that is restricted from sharing
May outline only the information that is allowed to be shared
Generally protects non-public information from becoming public