Network Security Policy
|
|
|
- Simon Carson
- 10 years ago
- Views:
Transcription
1 Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS X. REVISION HISTORY XI. COMPLIANCE XII. POLICY EXCEPTION PROCESS XIII. APPENDICIES Effective Date: Last Updated: Responsible University Officer: Opinder Bawa Vice President, Chief Information Officer Policy Owner: Director, IT Infrastructure Policy Contact: ITS Help Desk 1
2 I. POLICY STATEMENT A. USF network resources shall preserve the integrity of the data stored on USF computing systems and prevent unauthorized access to confidential information. Unauthorized access and unlawful uses of USF network resources is prohibited. Network security will include firewalls, access control lists, and intrusion detection mechanisms for detecting unauthorized network activity. II. III. IV. REASON FOR POLICY A. This policy is intended to ensure the secure configuration and use of the USF network. SCOPE A. This policy covers the USF network, including equipment, servers and user systems connected to the USF network. AUDIENCE A. This policy is intended for the entire USF community, including students, faculty, staff, alumni, trustees, temporary employees, contractors, volunteers and guests who have access to the USF network. V. POLICY TEXT A. Policy Goals 1. Ensure availability of and reliable access to USF network resources and network-based services, especially mission-critical applications. 2. Preserve integrity of the data stored on USF computing systems, and prevent unauthorized access to confidential information. 3. Preserve the privacy of users to the greatest extent possible. 4. Promote an efficient, standards-based approach to providing and managing network-based services, servers, and user systems. 5. Foster awareness of security issues among the members of the USF community who access network resources and services. 6. Protect University computing systems from unauthorized access and unlawful uses. 7. Facilitate prompt, effective, and consistent institutional responses to security threats, attacks, and violations. 2
3 8. Identify authority and responsibilities associated with enforcing security policies and procedures, responding to security threats, attacks, and violations. 9. Establish processes evaluating exception requests and periodic assessment and revision of policies and standards to ensure timely adaptation to changing network security requirements. B. Network Management 1. Only authorized network equipment may reside on the USF network. See Standards for Network Equipment. 2. Access to USF network equipment and network equipment rooms is restricted to authorized USF personnel. See Standards for Network Management. 3. USF policy is not to police content, but to monitor resource usage and authenticate users. USF may log and trace basic identifying information (such as Mac address) for all desktops, servers, and other devices connected to the USF network. 4. Individual users should* be required to authenticate to access the USF network. 5. Entry points into the USF network must 1 be configured in accordance with Standards for Network Access. 6. USF personnel with network management responsibilities must adhere to 7. Standards for Network Management. C. Server Management 1. Servers connected to the USF network should meet Standards for Server Equipment, be authorized and registered, and be supported in compliance with Standards for System Administration. 2. Unauthorized servers or non-compliant servers connected to the network may be disconnected upon discovery. 3. Compromised systems or systems interfering with the functioning of the network will be immediately disconnected and will remain disconnected until the system has been appropriately secured or the problem resolved. 4. A server must not be used as a user system. 1 In some policy statements within this document, the word "must" is used and in other instances, the word "should" is used. The use of "must" indicates that compliance is both feasible and expected. "Should" is used in those instances where compliance is highly desirable, but may not be technically feasible within the University's current network and technology infrastructure. In these cases, the policy statements represent goals that the University expects to achieve as its network and technology infrastructure advances. 3
4 D. User System Management 1. Each user is responsible for the network security of any device he or she connects to the network. 2. User accounts are for individual use only. Users must not share their account information. 3. User systems must not allow unauthorized access to University information, whether stored locally or gained through connection to other systems. 4. User systems must not be used to launch attacks on USF network services or systems/services outside the USF network. 5. User systems interfering with the functioning or security of the network may be immediately disconnected and remain disconnected until the system has been appropriately secured and the problem resolved. 6. USF reserves the right to ban any software or hardware, which USF deems a security threat, from user systems connected to the USF network. 7. File Sharing on the USF Network: a. File sharing will be disabled by default on USF-owned systems. b. USF recommends network file sharing through its centralized file server. 8. USF-owned and/or supported user system hardware and software should meet the standards detailed on the following web pages: a. Hardware Standards b. Software Standards 9. All user systems connected to the network must have up-to-date virus protection software with the latest virus definitions and operating system critical vulnerability updates. Subsequently, adequate protection against network-based vulnerabilities must be maintained on a regular basis. 10. Computers not conforming to this policy will be allowed limited network connectivity to the University's network for only the period required to install the necessary software and updates to conform to this policy. At the end of this time, the computer must meet these requirements or it will not be allowed to connect to the network. 11. All users accessing the USF network are expected to act in accordance with the Technology Resources Appropriate Use Policy. 4
5 E. Standards for Network Equipment 1. Network equipment must be housed in USF-approved equipment rooms, spaces, or classrooms. 2. An inventory of all network equipment must be maintained including configuration, IP address, physical location, and maintenance and warranty information. 3. Only USF-authorized network equipment may be deployed on the USF network. Authorization requests must be submitted via to the Infrastructure Director. 4. Wireless access points not supported by ITS must meet the following requirements: a. Be authorized by ITS Infrastructure (send to b. Be configured to require authentication for each user and device. c. Have DHCP disabled on LAN interface. d. Be configured with the default password changed. F. Standards for Network Management 1. Access to equipment rooms must be limited to authorized personnel. 2. Distribution of keys to equipment rooms must be documented and tracked. 3. Accounts on switches, routers, and other network equipment must be limited to authorized personnel and distribution of these accounts must be documented and tracked. When staff members with accounts leave or change positions, their accounts must be deleted in a timely manner. 4. Network management tools should provide support in the following areas. a. Maintaining an inventory of all network equipment. b. Configuring network equipment from a central management console. c. Upload and download of network equipment configurations from a central management console. d. Tracking software versions on network equipment. e. Track changes in network equipment configuration. f. Monitor and log network equipment behavior. g. Monitor and log all access to network equipment. 5. Whenever possible, remote sessions with network equipment must be encrypted. 6. Network security should include the following mechanisms. 5
6 a. Firewall mechanisms for network access control, restriction of unencrypted data transmissions, content security (e.g., virus protection), and detecting and preventing denial of service attacks. b. Access control lists. c. Intrusion detection mechanisms for detecting unauthorized network activity. d. Network Address Translation (NAT). 7. Network management should include the following network traffic and performance monitoring activities: a. Monitoring network configuration and connectivity. b. Monitoring network traffic. c. Monitoring network performance levels and diagnosing network performance problems. 8. Firewall protection is required at the following points in the USF network. a. Campus network connection to the Internet. b. Interface between the administrative network and the residence hall network. c. Entry points to campus Intranet. d. Connections to department networks whose research and/or instructional network activities could potentially interfere with the proper functioning of the campus network. G. Standards for Network Access 1. Access to USF Intranet services and resources from the outside is limited to USF-authorized entry points and facilities. 2. All entry points into the USF network must be authorized including T1, DSL, ISDN, modems, and other types of connections. H. Reporting and Responding to Security Violations 1. Detected incidences of security violations must be reported immediately to the Campus Security Team by either calling the Help Desk at x6668 or sending to 2. If appropriate, a member of the Campus Security Team will inform Public Safety of security violations. 3. Public Safety is responsible for involving the appropriate campus and outside law enforcement agencies as necessary. 4. Public Safety is responsible for coordinating the University's response to security violations with outside agencies. 6
7 5. Compromised systems or systems interfering with the functioning of the network will be immediately disconnected and will remain disconnected until the system has been appropriately secured. 6. The Campus Security Team will make every effort to contact the system administrator responsible for the compromised or interfering system to inform them that the system has been disconnected and to involve them in the process of analyzing and securing the system. 7. The Campus Security Team is responsible for submitting a report describing the incident, action taken, and resolution to the CIO. The CIO is responsible for distributing the report to other members of the Leadership Team as appropriate. 8. Disciplinary actions will be conducted through existing disciplinary procedures detailed in the Fogcutter Student Handbook, the Staff Handbook, and the faculty Collective Bargaining Agreement. VI. VII. PROCEDURES A. (None) RELATED INFORMATION A. (None) VIII. DEFINITIONS A. Mission-Critical Network Services 1. Mission-critical network services are services designated by the Leadership Team to be essential University services such that loss of these services or inability to restore these services in a timely fashion would severely impede the University's ability to conduct business, have negative legal or financial impact, or endanger the health and safety of faculty, students, and staff. B. Network 1. A network is a system of transmission media and electronic devices that supports transmission of data, audio, and video among user systems and servers. All hardware and software contributing to data, audio, and video transmission are considered part of the network. This includes the network interface hardware as well as the operating systems in user systems and servers with connections to the network. 7
8 C. Server 1. A server is a computer with the primary function of multi-user sharing of application, data, and/or services on a network. D. User System 1. A user system is any computational or communication device that is primarily for the use of a single individual. E. USF Network 1. The USF network includes the entire main campus network, networks at remote campuses, and connections among the campus sites. IX. FREQUENTLY ASKED QUESTIONS A. How should I access administrative systems (SIS, HRS, FRS, ADS) from home? 1. First, check and see if the functionality you need is included in Web for Students, Web for Faculty, Web for Employees, or Web for Alumni and accessible through USFconnect. If it is not, to connect to the administrative system, you need a Secure Shell (SSH) client. USF s supported SSH clients are Secure CRT (Windows) and DataComet (Macintosh). You can download an SSH client at B. Does USF have a firewall? 1. Yes, USF s network includes multiple firewalls. C. How do I access my files from outside USF's network? 1. You are able to access USF network resources using your own high-speed Internet connection and a secure Virtual Private Network (VPN) client. D. Can I run a network-based service from my desktop, such as a web server or mail server? 1. This network security policy does not prohibit members of the USF community from running network-based services from their desktops. However, community members should be advised that running network-based services may create vulnerabilities on their desktop machine or on the network. If your desktop system interferes with the functioning or security of the USF network, it may be immediately disconnected and remain disconnected until the system has been appropriately secured and the problem resolved. Such network-based services include, but are not limited to: a. Web Servers b. Dynamic Host Configuration Protocol (DHCP) Servers c. Domain Name System (DNS) Servers d. Simple Mail Transfer Protocol (SMTP) Servers 8
9 e. File Sharing Servers f. Mail Servers g. Streaming Media servers 2. Further, if the network service you are running becomes utilized to the extent that the primary purpose of your desktop machine is multi-user sharing of applications, data, and/or services, your desktop has become a server and will be subject to the policies in paragraph V.C (above). E. Can I attach a wireless router to the USF network? 1. Only faculty or staff may attach authorized wireless routers for academic purposes as long as they do not interfere with the USF wireless network. Security settings should be configured as described in Standards for Network Equipment. To find out if your router may interfere or how to restrict access, please contact the ITS helpdesk at x6668 or [email protected]. F. Can I put a wireless router in my dorm room? 1. No. G. How should I send files to colleagues, or to my home office? 1. Non-confidential files may be sent as attachments or placed on a departmental or central file server. If you would like access to the central ITS file server, please visit to learn more. X. REVISION HISTORY A First publication B. Updated format XI. XII. COMPLIANCE A. Failure to follow this policy can result in disciplinary action in accordance with Human Resources Employment Handbook and Office of General Counsel employee and labor relations. Disciplinary action for not following this policy may include termination, as provided in the applicable handbook or employment guide. POLICY EXCEPTION PROCESS A. A proposed exception request to ITS Policy requires a formal explanation related and in support of job function. B. A proposed exception request to ITS Policy, mentioned in 'XII.A', must be approved via by respective department or division supervisor, Dean, or VP, before submitted to ITS for review. 9
10 C. Forward approved as stated in 'XII.B' to for processing. D. Evaluation of ITS Policy Exception will escalate internally, and as applicable may include further review by: UITC subcommittee(s), the Information Security Officer, and others as appropriate at the request of VP for IT. XIII. APPENDICIES A. (None) 10
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
IT Security Procedure
IT Security Procedure 1. Purpose This Procedure outlines the process for appropriate security measures throughout the West Coast District Health Board (WCDHB) Information Systems. 2. Application This Procedure
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Consensus Policy Resource Community. Lab Security Policy
Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
ITS Project Management
ITS Project Management Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Network Service Policy
Network Service Policy TABLE OF CONTENTS PURPOSE... 3 SCOPE... 3 AUDIENCE... 3 COMPLIANCE & ENFORCEMENT... 3 POLICY STATEMENTS... 4 1. General... 4 2. Administrative Standards... 4 3. Network Use... 5
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
933 COMPUTER NETWORK/SERVER SECURITY POLICY
933 COMPUTER NETWORK/SERVER SECURITY POLICY 933.1 Overview. Indiana State University provides network services to a large number and variety of users faculty, staff, students, and external constituencies.
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Network Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
WORKSTATION MANAGEMENT STANDARD PROCEDURES
OFFICE OF THE VICE PRESIDENT FOR INFORMATION TECHNOLOGY POST OFFICE BOX 8122 STATESBORO, GEORGIA 30460-8122 TELEPHONE (912) 478-1294 FAX (912) 478-7720 WORKSTATION MANAGEMENT STANDARD PROCEDURES I. Authorization
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources
Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Log Management for the University of California: Issues and Recommendations
Log Management for the University of California: Issues and Recommendations Table of Contents 1 Introduction...2 2 Candidate Sources of Logged Information...3 3 Recommended Log Management Practices...4
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router
1. Installation and configuration guidelines for the router replacement This guideline served as a reference for schools which plan to replace the existing WebSAMS router by the recommended router, and
Enterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
IT Security Standard: Network Device Configuration and Management
IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding
Policies and Procedures
Policies and Procedures Provided by PROGuard The following are policies and procedures which need to be enforced to ensure PCI DSS compliance. In order to answer yes to the questions and pass the SAQ,
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
CMS Operational Policy for Infrastructure Router Security
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Infrastructure Router Security September 2005 Document Number: CMS-CIO-POL-INF05-01
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology
The #1 Remote Control and File Transfer Software Contents 1 Introduction 1 Application Level Security 2 Network Level Security 2 Usage Examples 4 Summary 4 Appendix A Setting Up a Firewall for Timbuktu
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
FIREWALL POLICY November 2006 TNS POL - 008
FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit
10605164 Medical Networks and Operating Systems
Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)
Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for
Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating
Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating to all users of UNH IT resources, and improve the availability
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important
Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important System administrators are advised to read. Overview and Use of this Guide Objectives This guide provides additional
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
ResNet Guide. Information & Learning Services. Here to support your study and research
ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,
General Questions... 1. Requesting Access... 2. Client Support... 3. Downloading Issues... 4. Installation Issues... 4. Connectivity Issues...
Contents General Questions... 1 Requesting Access... 2 Client Support... 3 Downloading Issues... 4 Installation Issues... 4 Connectivity Issues... 5 Performance Issues... 7 Application Issues... 8 General
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Marist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
