2 hours 23 minutes
Hello and welcome to I t Security policy from Cyber Eri.
This is macho one. The introduction and this is the second episode
is being taught by Troy Lemaire
with learning objective for this episode is gonna be wider. We need i t security policies,
what should be included in each policy and who should approve the policies.
So why do you actually need I t security policies?
one of the reasons is you want to define the desired behavior of employees. So if you can put into the policy exactly where the expectations that you have for the employees, you can hopefully get them too.
Abide by those policies that are there.
You also can define directions to employees. So if there's things inside of your policy that are directing the employees to do something a certain way, that is where you can document this.
You're gonna help to protect the organization and the employees so you can have different things in the policy that might be certain protection mechanisms. Such a Zen I virus. Oh, our remote access or things like that that will help to protect the organization as a whole.
And then you can define the consequences of these user actions so they not follow the policies. So this is something you would want to work, which HR department on to make sure that they are in agreement with this and have an understanding of it. But it's a way to say if the policy is broken or not followed for some reason, these the consequences that can happen.
So what should be in every IittIe policy?
So in every I t security policy, you should have an overview. Thatjust explains what this policy is about.
What's the purpose of the policy? Why are you putting this policy out there?
The scope of who this applies to for this policy, whether it's just I t staff or it's the whole
organization or it's just remote workers, you could define that, decided the scope.
Then you won't have the policy body, which is where you're actually
putting all the material and information that you want about that policy.
You can have the policy compliance, which is where you can live, things that can happen in consequences that can happen by not following the policy
and then you want to have your revision history. Most policies should be approved on an annual basis. So whenever you approve them on an annual basis, you can have your revision in street to show. When was the last time it was approved and then was the latest time it was approved?
And then who should approve your IITTIE skewed policies? Well, most people will agree that you wanna have the highest level of an organization approved this so either executive management and or border the records or some type of board committee so that it could be disseminated from the top and go all the way down the organization.
So in summary again today we
looked at Why do we need I t security policies? What should be included in each policy? And then who should approve i t. Security policies.
Looking forward in the next lecture, we're gonna start getting in through the actual policies themselves, and we're gonna take on the general policies, some of them listed or acceptable use data backup as well as email policies.
Again, any questions or clarification, you can reach me through Cyberia message, and my user name is at Troy Lemaire.
And thank you for watching this episode on Sai Berry
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
CompTIA A+ 220-1001
This CompTIA A+ training covers the 220-1001 exam components needed to earn the CompTIA A+ ...
12 CEU/CPE Hours Available
Certificate of Completion Offered