Network Policies

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Network policies

1 / 31

flashcard set

Earn XP

Description and Tags

CompTIA+ Network Learning

32 Terms

1

Network policies

Administrative controls used to secure networks, separate from technical controls like firewalls or encryption.

New cards
2

IT governance

A comprehensive security management framework for organizations, including policies, standards, baselines, guidelines, and procedures.

New cards
3

Policies

Broad statements that define the role of security in an organization and establish the desired end state for the security program.

New cards
4

Organizational security policies

Provide direction, goals, and a framework to meet business goals, as well as define roles, responsibilities, and terms.

New cards
5

System-specific policies

Address the security of specific technologies, applications, networks, or computer systems, focusing on protecting a certain piece of the system.

New cards
6

Issue-specific policies

Built to address specific security issues, such as email privacy or employee termination procedures.

New cards
7

Standards

Used to implement policies within an organization, including mandatory actions or rules needed to achieve the desired level of security.

New cards
8

Baselines

Used to create a reference point in network architecture and design, documenting system configurations for later analysis.

New cards
9

Guidelines

Recommended actions, allowing exceptions and allowances for unique situations.

New cards
10

Procedures

Detailed step-by-step instructions to ensure personnel can perform specific tasks or actions, transferring high-level policies into actionable steps.

New cards
11

Transition

The phase of the system life cycle that involves the actual implementation and moving the system from a prototype or initial build to full production and use.

New cards
12

Operations

The phase of the system life cycle where the system or network is used on a daily basis to do productive work, including tasks such as running the asset, updating it, patching it, and fixing any issues that may occur.

New cards
13

Retirement

The end of the system life cycle when the system or network no longer has any useful life remaining and is disposed of, typically after being replaced by a newer model.

New cards
14

Standard Operating Procedures (SOP)

Step-by-step instructions compiled by an organization to help employees carry out routine operations, aiming to achieve efficiency, quality output, and uniformity of performance while reducing misconfigurations and failure to comply with regulations.

New cards
15

Password Policies

Set of rules created to improve computer security by motivating users to create secure passwords and store and utilize them properly, including specifications for minimum password length, complexity requirements, periodic password changes, and limits on password reuse.

New cards
16

Acceptable Use Policies (AUP)

Set of rules applied by the owner, creator, or administrator of a network, website, or service that restricts the ways in which the network, website, or system may be used and sets guidelines for its proper use.

New cards
17

Bring Your Own Device (BYOD) Policies

Policies that allow or encourage employees to access enterprise networks and systems using their personal mobile devices, such as smartphones, tablets, and laptops.

New cards
18

Remote Access Policies

Policies that outline and define acceptable methods of remotely connecting to an internal network, including decisions on whether employees are allowed to connect directly to internal network resources over the internet or if alternative methods such as VPN connections or web mail servers should be used.

New cards
19

Onboarding Policies

Policies that describe the requirements and steps for integrating a new employee into the company and providing them with the necessary tools and information to perform their job successfully.

New cards
20

Offboarding Policies

Policies that cover the steps necessary to successfully part ways with an employee following their resignation or termination, including the removal of their accounts and accesses.

New cards
21

Offboarding Policy

A policy that outlines the procedures for handling employee departures, including account deletion, data archiving, and equipment retrieval.

New cards
22

Security Policy

A document that defines how to protect an organization's systems, networks, and data from threats and how to handle security incidents.

New cards
23

Data Loss Prevention Policy

A policy that guides how organizations can share and protect data, with the goal of minimizing accidental or malicious data loss.

New cards
24

Non-Disclosure Agreement (NDA)

A legally binding agreement between two parties that defines what data is considered confidential and cannot be shared outside of the relationship.

New cards
25

Memorandum of Understanding (MOU)

A non-binding agreement between two or more organizations that outlines common actions or responsibilities.

New cards
26

Service-Level Agreement (SLA)

An agreement between a service provider and a customer that defines the level of service to be provided and the metrics for measuring performance.

New cards
27

Memorandum of Understanding (MOU)

A non-legally binding agreement between multiple organizations that outlines a common goal or purpose, allowing partner organizations to leave without consequences.

New cards
28

Service-Level Agreement (SLA)

A document commitment between a service provider and a client that defines the quality, availability, and responsibilities agreed upon by both parties. SLAs primarily focus on supporting and responding to problems within a specified timeframe while providing the agreed-upon level of service.

New cards
29

Predictability

The ability of service-level agreements to bring stability and certainty to areas that are otherwise difficult to predict, such as device failures.

New cards
30

Uptime

The percentage of time that a service or system is operational and available for use. SLAs often include uptime requirements that service providers must meet, with potential penalties for failing to do so.

New cards
31

Refund

In some service-level agreements, if the service provider fails to meet the agreed-upon uptime requirement, the client may be entitled to a refund of the monthly service fee as a penalty for not meeting the SLA.

New cards
32

Network Management Agreements

The three main types of agreements used in network management are non-disclosure agreements, memorandums of understanding, and service-level agreements.

New cards

Explore top notes

note Note
studied byStudied by 521 people
... ago
4.5(2)
note Note
studied byStudied by 460 people
... ago
4.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
4.0(1)
note Note
studied byStudied by 39 people
... ago
5.0(1)
note Note
studied byStudied by 88 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (39)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 17 people
... ago
5.0(1)
flashcards Flashcard (129)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (100)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 350 people
... ago
4.0(1)
flashcards Flashcard (25)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (69)
studied byStudied by 9 people
... ago
5.0(1)
robot