Organizational security types
1. Business Continuance
-
Business have come to recognize that some
services of the organization have to be delivered continuously without
interruption
-
Create an IT Business Continuity plan( Backup
business Plan)
-
Focus on getting the network and systems up and
running as quickly as possible.
Business continuity and disaster recovery
planning
-
Management leadership, goals and requirements,
business impact analysis, team building and implementation
Backup alternatives
-
Hardware and software approaches, electronic
vaulting
Recovery and testing
-
Strategies for executing recovery, carrying out
drills and types of plan testing
Emergency Response
-
Preserving assets and life, reducing fraud,
theft and vandalism
2. Backup / Restoration of Data
-
When we think of backup, we generally think of
secure, offsite tape storage that will be available should we accidentally
damage or destroy a needed file.
-
Backup includes site space, hardware, software
and people as well as data
3. Audits
-
Information is shared on network via email,
attachment, network drives, which pose dangers as well
-
Attackers can easily exploit the networks if
proper security is not available in organization
-
Auditing is an essential part expose loopholes
in the network and it should be performed in timely manner
-
To check the security of the network
-
A system evaluation of company’s information
security and ensures that the company is following set of criteria for
maintaining security of the data
How security audits happen?
Analyze
software
Data
processors
User
practice
System
configuration
-
Audit process is an ongoing process of
determining and preserving operative security policies and involves every
resource of an organization
-
It offers a measurable way to examine the
security level of an organization Security auditors perform their task with
-
Vulnerability scanner
-
OS (Operating system) examination
-
Network sharing analysis
-
Personal interviews
4. Security vulnerability testing
-
Network scanning
-
Vulnerability scanning
-
Password cracking
-
Log review
-
Virus detection
-
Penetration testing
Comments
Post a Comment