Basic Computer Security Policies
Securing Hardware, Peripherals and Other Equipment

This Chapter deals with the Information Security issues relating to the purchase, use or maintenance of equipment through which information is processed and stored. Basic computer security policies.

Purchasing and Installing Hardware
Cabling, UPS, Printers and Modems
Working Off Premises or Using Outsourced Processing
Using Secure Storage
Documenting Hardware
Other Hardware Issues

Previous PageTop of this pageNext Page

Information Security Policies from US$595


For further information about the RUSecure™ interactive security suite, visit Information Security Policy World
Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word


Next PageUpPrevious Page