Solved

IT Security Policy

Posted on 2007-11-24
6
215 Views
Last Modified: 2013-12-04
Hi Experts ,
 
I have an Audit meeting and Im required to prepare some documents related to the following subjects.

1- Internet Architecture & Firewall Security Policy for review.
 2- Email/Internet Security Policy for review
 3-IT Strategic Plans for review.
 5-Performance Monitoring Reports of hardware/software.
6- Information Systems Security Policy for review.
Can anyone explain to me in more details what should I prepare in each point.
Thanks for help
0
Comment
Question by:ibmas4002
6 Comments
 
LVL 29

Expert Comment

by:Alan Huseyin Kayahan
ID: 20342722
  Hi ibmas4002
       Following links will help for beginning
http://www.network-and-it-security-policies.com/
https://www2.sans.org/resources/policies/

Regards
0
 
LVL 18

Accepted Solution

by:
PowerIT earned 250 total points
ID: 20343040
Also have a look at ISO17799. On Sans you'll find a checklist based on ISO 17799 which will give you a thorough idea of what an audit may look like: https://www2.sans.org/score/ISO_17799checklist.php

Point 3: that's something you will have to build on your own. Strategic IT plans are very dependent on the sector of the organisation and on its goals. They are also dependent on the state of which IT is now in.

BTW, what happened to point 4?

J.
0
 
LVL 2

Author Comment

by:ibmas4002
ID: 20345837
Hi ,

  Ok what about Performance Monitoring Reports of hardware/software. how can I prepare a document about it and what does it mean exactly?
Thanks
0
 
LVL 29

Assisted Solution

by:Alan Huseyin Kayahan
Alan Huseyin Kayahan earned 250 total points
ID: 20346111
      It means the status of hardware utlization by softwares installed on them. For example SQL server on a hardware,  what is CPU utilization, how is HDD usage, is there enough space, can CPU/RAM hadle the load. I used a software called Aida32 before for collecting hardware and software information. Start>Run>perfmon may satisfy your needs at this point but advanced performance monitoring may need extra software like Tivoli or OpenView
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20526475
Forced accept.

Computer101
EE Admin
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Three simple tips to quickly and efficiently back up and protect the contents of your PC and Mac®.
How important is it to take extra precautions to protect your online business? These are some steps you can take to make sure you're free of any cyber crime.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now