Solved

IT Security Policy

Posted on 2007-11-24
6
214 Views
Last Modified: 2013-12-04
Hi Experts ,
 
I have an Audit meeting and Im required to prepare some documents related to the following subjects.

1- Internet Architecture & Firewall Security Policy for review.
 2- Email/Internet Security Policy for review
 3-IT Strategic Plans for review.
 5-Performance Monitoring Reports of hardware/software.
6- Information Systems Security Policy for review.
Can anyone explain to me in more details what should I prepare in each point.
Thanks for help
0
Comment
Question by:ibmas4002
6 Comments
 
LVL 29

Expert Comment

by:Alan Huseyin Kayahan
ID: 20342722
  Hi ibmas4002
       Following links will help for beginning
http://www.network-and-it-security-policies.com/
https://www2.sans.org/resources/policies/

Regards
0
 
LVL 18

Accepted Solution

by:
PowerIT earned 250 total points
ID: 20343040
Also have a look at ISO17799. On Sans you'll find a checklist based on ISO 17799 which will give you a thorough idea of what an audit may look like: https://www2.sans.org/score/ISO_17799checklist.php

Point 3: that's something you will have to build on your own. Strategic IT plans are very dependent on the sector of the organisation and on its goals. They are also dependent on the state of which IT is now in.

BTW, what happened to point 4?

J.
0
 
LVL 2

Author Comment

by:ibmas4002
ID: 20345837
Hi ,

  Ok what about Performance Monitoring Reports of hardware/software. how can I prepare a document about it and what does it mean exactly?
Thanks
0
 
LVL 29

Assisted Solution

by:Alan Huseyin Kayahan
Alan Huseyin Kayahan earned 250 total points
ID: 20346111
      It means the status of hardware utlization by softwares installed on them. For example SQL server on a hardware,  what is CPU utilization, how is HDD usage, is there enough space, can CPU/RAM hadle the load. I used a software called Aida32 before for collecting hardware and software information. Start>Run>perfmon may satisfy your needs at this point but advanced performance monitoring may need extra software like Tivoli or OpenView
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20526475
Forced accept.

Computer101
EE Admin
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now