Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


P4 Policies and guidelines

No description

Nathan Quinn

on 2 July 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of P4 Policies and guidelines

P4 Policies and Guidelines
Disater Recovery Policies
There are many types of disasters that could happen at anytime such as-
Power failure
Natural Disasters
Terrorist Attacks
Disaster recovery is the plan companies have to protect there data from these disasters. This may include such things as the relocation of data and the use of alternative sites.
Updating of security
Scheduling of security audit
Codes of coonduct
Surveillance polices
Risk Management
Budget settings
It is very important for a company to update its security to protect against any new threats that may emerge. Some updates may not work correctly on the current sytem and should be checked first before installing. Security levels of both physical and network security should be checked regulary. This is to ensure that all equipment and data is protected. To do this you could simulate an attack on your own system.
A security audit is a test of both your physical and network security. Scheduling a test to see whats working and whats not will allow you to know what needs update and what is capable of dealing with the current potential threats.
This is a list of rules that all employees must agree to and follow during there time as part of your business. This will discourage people from doing inappropriate things on your system. This could be such things as stopping them from going on untrusted website, how they can use emails and software they buy and install onto the companies system. The code is here to protect a company against potential treats. Treats like viruses, hackers and Trojans.
This is where you whatch all activative on your system. This is things like what websites your employees access when on your system and documents that they make and crate will using it. This will help you know which employees are working effectively and which are not. It will also make them work harder because they know there being watch.
This is a assessment of all potential risks. Then you look at ways to stop the risk from being so high. This will make it saver for both your system and employees who may have personal information on the system. Depending on your business clients you may have important information on your system. There are many ways that a business can deal with a risk. They can ride the storm which means that the company ignores the fact that the economic climate undermines there product. They can treat the risk by upgrading the company in such a way the prevent the risk.
Budget settings are when a company considers its costs and how much it is willing to spend. Companies will normally make some sort of record that talk about how much they will spend. The security that a company uses will normally not be free and will need a continuous stream of investment to pay for the up keep. There are many other things that a company must consider when think about here budget. These include he licensing of the software they use, staff wages and replacement cost of old equipment and hardware.
Full transcript