Basic Computer Security Policies
Securing Hardware, Peripherals and Other Equipment

This Chapter deals with the Information Security issues relating to the purchase, use or maintenance of equipment through which information is processed and stored. Basic computer security policies.

Purchasing and Installing Hardware
Cabling, UPS, Printers and Modems
Consumables
Working Off Premises or Using Outsourced Processing
Using Secure Storage
Documenting Hardware
Other Hardware Issues

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

For further information about the RUSecure™ interactive security suite, visit Information Security Policy World
Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page