In: Computer Science
What are the different networks and areas where security policies must be adapted? Explain in your own word?
Personnel safety
Equipment safety
Environmental impact
Please dont just copy it from the internet
Production loss
Data loss
Security Policy refers to a document created for maintaining the security of an organization in terms of network and information of computer systems. The main aim behind the Security Policy of an organization is to take control of potential data and prevent security attacks by the unauthorized people. The different networks and areas where security policies must be adapted are:
1. Network Security: It includes principles and practices developed for the protection of data over a certain network and network itself. It is implemented to control the unauthorized access on the network through the monitoring of Network Administrator. Initially Authentication is used to verify the user identity and then the information allowed is been transmitted through Firewall on a system. Security of Networks for big organizations involve certain tools with high protection of outside threats and verification over an network.
2. Web Security: It refers to a security of browsing data that is been transferred on the internet. When data is allowed to transmit on an internet, it may be subjected to malicious attacks that may hamper or alter the contents of data and can lead to misuse of data by attackers. There are certain attacks that cause the misleading of users' content such as Phishing, Denial of Service attacks etc. Certain prominent tools are been used by organizations like Internet Protocol Security, Antivirus Software, Password Manager etc.
3. IT Security: It is a field associated to the protection of computer system regarding its hardware and software use. In the emergence of modern technology where the whole world is using Wireless devices and equipments, it is become critical to enhance the security of Computer System from cyber attacks. IT Security deals with a number of vulnerabilities like Eavesdropping, Tampering, Polymorphic attacks etc. that can cause the change in System or Application behaviour and mislead the functions.
4. Data Security: It is a significant discipline of IT Security which works on the protection of information or data stored in computer systems. Disclosure of information to unauthorized users may cause modification, deletion and misuse of data. The essential functions of this field comprise of risk detection and prevention by practicing significant measures such as Confidentiality, Integrity and Availability etc. An organization must adopt certain standards of Information Security such as Authentication, Access Control and Cryptography.