Network security policy: Difference between revisions

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
imported>VenskaLara
No edit summary
 
imported>Eidaoj
No edit summary
 
Line 1: Line 1:
{{More references|date=April 2010}}A '''network security policy''' ('''NSP''') is a generic document that outlines rules for [[computer network]] access, determines how policies are enforced and lays out some of the basic architecture of the company [[security]]/ [[network security]] environment.<ref>{{Cite web|title=Network security policy {{!}} Semantic Scholar|url=https://www.semanticscholar.org/topic/Network-security-policy/321849|access-date=2020-12-13|website=www.semanticscholar.org|language=en}}</ref> The document itself is usually several pages long and written by a [[committee]].  
A '''network security policy''' ('''NSP''') is a generic document that outlines rules for [[computer network]] access, determines how policies are enforced and lays out some of the basic architecture of the company [[security]]/ [[network security]] environment.<ref>{{Cite web |title=Network security policy {{!}} Semantic Scholar |url=https://www.semanticscholar.org/topic/Network-security-policy/321849 |access-date=2020-12-13 |website=www.semanticscholar.org |language=en}}</ref> The document itself is usually several pages long and written by a [[committee]].  


==Overview==
A [[security policy]] is a complex document, meant to govern data access, [[World Wide Web|web]]-[[web browser|browsing]] habits, use of [[password]]s, [[encryption]], [[Electronic mail|email]] attachments and more. It specifies these rules for individuals or groups of individuals throughout the company.<ref>{{Cite web|title=Network Security Policy {{!}} Villanova University|url=https://www1.villanova.edu/villanova/unit/policies/AcceptableUse/security.html|access-date=2020-12-13|website=www1.villanova.edu}}</ref> The policies could be expressed as a set of instructions that understood by special purpose [[network hardware]] dedicated for securing the network.
A [[security policy]] is a complex document, meant to govern data access, [[World Wide Web|web]]-[[web browser|browsing]] habits, use of [[password]]s, [[encryption]], [[Electronic mail|email]] attachments and more. It specifies these rules for individuals or groups of individuals throughout the company.<ref>{{Cite web|title=Network Security Policy {{!}} Villanova University|url=https://www1.villanova.edu/villanova/unit/policies/AcceptableUse/security.html|access-date=2020-12-13|website=www1.villanova.edu}}</ref> The policies could be expressed as a set of instructions that understood by special purpose [[network hardware]] dedicated for securing the network.


Security policy should keep the [[Malicious user|malicious users]] out, and also exert control over potential risky users within an organization.  
Security policy should keep the [[malicious user]]s out, and also exert control over potential risky users within an organization.  


Understanding what information and services are available and to which users, as well as what the potential is for damage and whether any protection is already in place to prevent misuse are important when writing a network security policy. In addition, the security policy should dictate a hierarchy of access permissions, granting users access only to what is necessary for the completion of their work. The [[National Institute of Standards and Technology]] provides an example security-policy guideline.
==Insight==
Understanding what information and services are available and to which users, as well as what the potential is for damage and whether any protection is already in place to prevent misuse are important when writing a network security policy. In addition, the security policy should dictate a hierarchy of access permissions, granting users access only to what is necessary for the completion of their work. The [[National Institute of Standards and Technology]] provides an example security-policy guideline.{{citation needed|date=April 2010}}


==See also==
==See also==
*[[Internet security]]
* [[Internet security]]
*[[Security engineering]]
* [[Computer security]]
*[[Computer security]]
* [[Security engineering]]
*[[Cybersecurity information technology list]]
* [[Industrial espionage]]
*[[Network security]]
* [[Information security]]
*[[Industrial espionage]]
*[[Information security]]
*[[Security policy]]


==References==
==References==
Line 21: Line 20:


==External links==
==External links==
*[http://csrc.nist.gov/ Computer Security Resource Center] at National Institute of Standards and Technology
*[https://phishdestroy.io/ Free Anti‑Phishing & Scam Takedown Service] {{Webarchive|url=https://web.archive.org/web/20250807155706/https://phishdestroy.io/ |date=2025-08-07 }} by PhishDestroy
*[https://www.cityofmadison.com/mayor/apm/it/APM3-9AttachB.pdf Network Security Policy and Procedures document] by the City of Madison, Wisconsin
*[https://www.cityofmadison.com/mayor/apm/it/APM3-9AttachB.pdf Network Security Policy and Procedures document] {{Webarchive|url=https://web.archive.org/web/20220520173438/https://www.cityofmadison.com/mayor/apm/it/APM3-9AttachB.pdf |date=2022-05-20 }} by the City of Madison, WI
*[http://csrc.nist.gov/ Computer Security Resource Center] {{Webarchive|url=https://web.archive.org/web/20250517163815/https://csrc.nist.gov/ |date=2025-05-17 }} at National Institute of Standards and Technology


[[Category:Computer network security]]
[[Category:Computer security procedures]]
[[Category:Computer security procedures]]
[[Category:Computer network security]]

Latest revision as of 06:14, 20 December 2025

A network security policy (NSP) is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment.[1] The document itself is usually several pages long and written by a committee.

Overview

A security policy is a complex document, meant to govern data access, web-browsing habits, use of passwords, encryption, email attachments and more. It specifies these rules for individuals or groups of individuals throughout the company.[2] The policies could be expressed as a set of instructions that understood by special purpose network hardware dedicated for securing the network.

Security policy should keep the malicious users out, and also exert control over potential risky users within an organization.

Insight

Understanding what information and services are available and to which users, as well as what the potential is for damage and whether any protection is already in place to prevent misuse are important when writing a network security policy. In addition, the security policy should dictate a hierarchy of access permissions, granting users access only to what is necessary for the completion of their work. The National Institute of Standards and Technology provides an example security-policy guideline.Script error: No such module "Unsubst".

See also

References

<templatestyles src="Reflist/styles.css" />

  1. Script error: No such module "citation/CS1".
  2. Script error: No such module "citation/CS1".

Script error: No such module "Check for unknown parameters".

External links