Friday, 16 October 2015

Digital and Interactive Games 2015, Term 4, Week 2
AppLocker
Organisational Units


<a href="http://s483.photobucket.com/user/Brenorenz/media/Term%204%20W2%2001_zpsduakdgrl.png.html" target="_blank"><img src="http://i483.photobucket.com/albums/rr193/Brenorenz/Term%204%20W2%2001_zpsduakdgrl.png" border="0" alt="Term 4 Week 2 photo Term 4 W2 01_zpsduakdgrl.png"/></a>


Credential Locker – Security for IoT.

BitLocker – Trusted Platform Model – Think about redundancy


DubboIT Code of Ethics
1. Working to the Best of Your Ability
You will work competently and diligently while putting in the effort to succeed.

2. Public Interest
You will place the interests of the public above personal interests and communicate

3. High Standard of Work
Maintain a Professional Work Standard regardless of personal view. Strive to enhance the quality of which we conduct ourselves in a learning environment.

4. Integrity
Be honest in your representation of skills, knowledge, services and products. Request, respect and acknowledge the source when used.

5. Privacy
Respect Privacy policy and security of personal information and data.

6. Professionalism
Maintain a high level of Professionalism while being considerate of other workers and their intellectual property.

7. WHS
Maintain a safe and healthy work environment.


DubboIT Privacy Policy
Personal Information and Intellectual Property
- Should be encrypted and stored on secure servers.
- A clear definition of ownership and copyright.

Gain Permission
- Seek permission before viewing and/or using someone's work.
- Access Control, based on the Level classifications.

Report
- If a flaw in the security measures in place is found, report it to relevant personnel, or to your supervisor.

Trust Policy
Information you have been trusted with should be handled with a high level of care.
Protection
- DubboIT will regularly run anti-malware scans.
- Encryption
- Backup, Restore, Recovery
- Ensure all doors are locked when sensitive information is to be protected.

Offsite, onsite access
Communications Protocols (Kerberos, NTLM)

Standard Practice
Do not give out or share any password or information regarding passwords or security measures in the workplace.
Don't use birthdays or children's names.

Each piece of data will be assigned to one of the four levels.

Local Computer Policy Settings


Level 1
Basic general available to public

Level 2
Employee only
- Password protection
- Network Access
- Group Policy
Can store data personal/client

Level 3
Management
High Rights to most of what is allowed on the network in Group or Organisational Unit

Level 4
Admin Group only
Highest Protection
Encryption



No comments:

Post a Comment