C3. Organisational Security


Companies hire cyber secuirity experts to secure their networks.


Organisational Security

  1. Policies and procedures
  2. User responsibilities
  3. Education of IT professionals
  4. Physical security of system
  5. Risk assessment and reduction

1. Policies and procedures

  1. Monitoring
  2. Education and Training
  3. Backup and Recovery Schemes
  4. Configuring and Upgrading software
  5. Setting up file and folder permissions

1.1 Monitoring

Network monitoring refers to the practice of overseeing the operation of a computer network using specialized management software tools. Network monitoring systems are used to ensure availability and overall performance of computers (hosts) and network services. They let admins monitor access, routers, slow or failing components, firewalls, core switches, client systems and server performance among other network data. Network monitoring systems are typically employed on large scale corporate and university IT networks.


1.2 Education and Training


1.3 Backup and Recovery Schemes


1.4 Configuring and Upgrading software


1.5 Setting up file and folder permissions


2. User responsibilities

1. Adherence to specific guidelines
1. Strength of password
1. Installation of new software

2.1 Adherence to specific guidelines

The network users are obliged to stick with the network policies in order to ensure the smooth running of network. These guidelines usually include:

Fair Usage Policy (FUP)

Fair Usage Policy (also known as Fair Access Policy or Bandwidth Cap) is implemented by Internet Service Providers (ISPs) world over. A small number of customers use an excessive amount of the network bandwidth and impairs the experience of a large majority. Through this policy, ISPs seek to address this imbalance and give all users the opportunity to experience the network in the same way


2.2 Strength of password

A Strong Password should -


A Strong Password should not -


Recommendation for users


Recommendation to the network admins


2.3 Installation of new software

Installation of unauthorized computer programs and software, including files downloaded and accessed on the Internet, can easily and quickly introduce serious, fast-spreading security vulnerabilities. Unauthorized software programs, even those seemingly provided by reputable vendors and trusted companies, can introduce viruses and Trojan programs that aid hackers’ attempts to illegally obtain sensitive, proprietary, and confidential data. Protecting the organization’s computers, systems, data, and communications from unauthorized access and guarding against data loss is of paramount importance; adherence to the following Software Installation Policy serves a critical role in the process.

This policy’s purpose is to ensure that every employee, contractor, temporary worker, and volunteer understands and agrees to abide by specific guidelines for software, program, and application installation and use on organization-provided computers, systems, and networks.


3. Education of IT professionals

  1. Maintenance of skills
  2. Knowledge of exploits
  3. Application of updates and patches

4. Physical security of system

  1. Lock and key
  2. Logging of entry
  3. Secure room environments
  4. Authentication of individual

5. Risk assessment and reduction

  1. Potential risks
  2. Penetration testing
  3. Security audits
  1. Backup and Restore
  2. Guidelines for Password Management
  3. The Simplest Security: A Guide To Better Password Practices