2 hours 23 minutes
Welcome back to I t Security policy on Cyber eri
We continue in module for this the work station security policy
with myself. Troy Lemaire
Learning objective for this policy. We're gonna look at the requirements on the work station
but we look at this sample policy from Sands
for work station security. This one is specific for hip hop
but can also be used as a general policy. Just has some O virgin coverage that will also apply to hip hop.
so the policies provide guidance work station security
in order to ensure the security of information on the workstation. Information the workstation may have access to
the policy provides guidance to ensure the requirements of hippos, Security rule work station security
If we look at the policy, appropriate measures must be taken when using workstations to ensure the confidential ality integrity and availability of sensitive information, including P. H. I.
Again, if you don't, if you're not a member of the organization that needs hippo requirements, you could take out this pH I portion and anywhere else inside of here. Or you could replace it with the term sensitive information as well.
Workforce members using workstations shall considered the sensitivity of the information, including protected health information that may be excess and minimize the possibility of unauthorized access.
Nobody will permit physical and technical safeguards.
Appropriate measures include restricting physical access, securing work stations,
enabling a password protection screen saver
applying with all optical password policies
during work. Stations are used for authorized business on Lee. Never insulting unauthorized software,
storing all sensitive information
in network server
and food and drink away scaring laptops,
lying with the portable workstation encryption policy If you need one of those
and complying with the baseline workstation configuration standard as well. If you need one of those
calling privacy screen filters,
exit running applications and close open documents, ensuring that all work stations use a surge protector
if wireless network access is used in sure that it meets the wildest communication policy. If you need to have a wireless communication policy, as you can see, looking at this is basically providing. Here's the do's and don'ts that you should have with a workstation on the network. It also has some additional Burbage in it. If you need tohave,
some type of hip a compliance,
but again you could be replaced the hip of portions and the pH I portions with just private information, sensitive information, secure information, anything like that. And it will meet your needs for a work station security policy.
So in summary, we looked at the work station security policy and looked at some of the things that are considered part of the requirements.
Workforce members using Workstation South consider the blank of the information
our first policy recap question
and the answer is sensitivity.
Our next recap Question
Company will implement blank and blank safeguards for all workstations that access Elektronik protected health information to restrict access to authorized users.
And that would be physical and technical safeguards.
Looking forward in our next lecture, we're gonna move on to module five, which is our last module, and that'll be applications security policies.
Thank you attending this training on cyber ery and look forward to seeing you in our next training session.
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
CompTIA A+ 220-1001
This CompTIA A+ training covers the 220-1001 exam components needed to earn the CompTIA A+ ...
12 CEU/CPE Hours Available
Certificate of Completion Offered