Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 11: Exploring Operation Security (Exploring Security Policies…
Chapter 11: Exploring Operation Security
Exploring Security Policies
Policies
Mandatory Vacation Policies
Job Rotation Policies
Clean Desk Policies
Account Policies
Change Management Policies
Acceptable Use Policies
Storage & Retention Policies
Personally Identifiable Information (PII)
Privacy Policies
Separation of Duties
Agreements
Service Level Agreements (SLA)
Third-Party Agreements
Memorandum of Understanding (MOU)
Interconnection Security Agreement (ISA)
Information Classification
Data Labeling
Degaussing
Sanitization Procedures
Cluster Tip Wiping
Responding to Incidents
Incident Response Policy
Warning Banners
Incident Response
Preparation
First Responder
Incident Identification
Damage & Loss Control
Escalation & Notification
Reporting
Data Breach
Recovery/Reconstruction Procedures
Lessons Learned
Mitigation Steps
Order of Volatility
Hard Drive Imaging
Hashing
Chain of Custody
Raising Security Awareness
Information Security Awareness
Role-Based Training
Social Media Sites
Banner Ad Marware (Malvertisements)
P2P Software
Metrics