Enforcing Security Policy

I l @ ve RuBoard

Security policies are critical to the identification of inappropriate behavior and the collection of evidence. Policies should define what is and what is not acceptable on the part of the users of the system and also on the part of administrators of the system. Appropriate use policies and information privacy policies are two of the most common security policies.

Policies addressing the collection and use of information in the case of criminal activities are needed to adequately support the information which will be used in the prosecution of the case. Both procedures and practices have to be a matter of course and regularly performed for the evidence to be considered as part of the normal business process.

Consistent Enforcement

It is necessary to provide consistent enforcement of security policies to be able to prosecute an individual for violating those policies. Intermittent or selective enforcement makes the policy ineffective . These actions are seen not as part of regular on-going business practices; rather, they can be viewed as discriminatory or punitive. Security policies have to be enforced from the very top of the organization all the way down ” executives, administrators, etc. ” with no exceptions.

I l @ ve RuBoard


Halting the Hacker. A Practical Guide to Computer Security
Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
ISBN: 0130464163
EAN: 2147483647
Year: 2002
Pages: 210

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net