User talk:Benmyfabian

How to Write up a Security Policy for home systems about control of files, installation disks, physical devices, data encrypted and a risk assessment. A home computer security policy is a written document that you create, describing how you will execute and handle data and security for your computer and all those who use it. A computer security policy may sound simple and mundane, but having one gives you the ability to handle computer security in a manner which is the least disruptive to you as possible. And the policy will act as a guide to help you recover from a number of different types of security related matters. A computer security policy will explain what to do security wise on a day-to-day bases. It will also have the information and some cases the instructions on how to get your computer back to normal should you have a security problem. And if used properly, it will inform other what is, and is not allowed on your computer, allowing you to setup any checkpoints you need in order to enforce your computer security policy. Think of it as being no different than the security policies and procedures you use in your everyday life. What makes up a security policy for your home systems? The depth of your computer security policy is directly proportional to the level of security you want. Just make sure that you have all of your bases covered. Here is a list of things you would put into a home security policy. It may seem long, that's because ... well it is, because it covers things needed by a casual user through a home business user.

•	Disaster Recovery Plan such as access control of files, •	Data Backup Plan such as installation disks, •	Procedures to allow others to access your computer such as physical devices, •	Security Software that encrypt data and risk assessment, •	Assets •	Risks (contains the use time and money) •	Secondary backup data storage for your home system, •	Domain Name Management for your security policy, •	Procedures for installing, setting up, and running on a different or new computer, •	Password Policy and Management, •	Parental controls, •	Security check schedule, •	Cookies, •	File management and cleanup •	Insurance, •	Networks, •	Wireless networks, •	Communications devices (devices with Bluetooth and Wi-Fi capabilities), •	Email Hosting

What NOT to keep on your computer to make it the best policy possible

•	Personal financial information on the computer, •	Tax return filing, •	Medical/Dental information, •	Family history data that contain references to any ones financial history •	Business account security (Google AdSense, PayPal, eBay, Amazon, etc. and more.) Access control of files, installation disks, physical devices, data to be encrypted and a risk assessment. Determine to whom and what the IT security policy addressing assets and risks applies. Including management at this point can prove extremely helpful as you will find that they will be more apt to approve a policy with their input. How to write Up a Security Policy for Assets and Risks to become the best security policy. Inform your users why there is a need to maintain assets and other types of risks organized. You have a greater chance of following the guidelines of your policy if it’s understandable why it is in place. Provide specific examples of what can happen to the home network, sensitive data and even private information should there be a risks outbreak on the home network. Include the need for your home network to abide to protect sensitive and personal information. Provide a general description of the policy. Speak to what you expect from the policy that applies to. This is where you will define what the home network will do to prevent risks outbreaks. Once you have provided a general description, be sure to go into specifics regarding expectations. If the policy states that all external storage devices need to be run through assets and risks before you access them explain this and the steps required to complete this. Explain the consequences for the policy. In the home network specifically what will happen if they break any of the guidelines set forth. If there are varying levels of consequences, then this must be included as well. Be sure that whatever consequences you include are ones that can and will be enforced by a prioritized list management.