Security Policy: The Big Picture

Click here to start

Table of contents

Intro

Goals

Starting Thoughts

No Rewards

Protecting what?

Why Protect?

Protecting from?

How Protect?

Firewalls

Intrusion Detection/Prevention

Logging

Backups

Viruses and Worms

Stop it Bill

Server Upgrades

Human Factor

Future

Auditing

Writing Policy

Thanks

Reading

Author: Todd K. Watson

E-mail: tkw@southwestern.edu

Homepage: http://tkdubs.net/

Further information:
Presentation titled: Security Policy: The Big Picture Presented at the 2003 Fall IT Retreat Hosted by Associated Colleges of the South October 17, 2003

Download Presentation:
OpenOffice Format -- Security_Policy_Presentation.sxi
MS PowerPoint Format -- Security_Policy_Presentation.ppt