Network policies

Cards (6)

  • Acceptable use
    Network policies are documents written to outline the rules that users are required to follow while using a computer network. Each document is often several pages long, written and agreed by a committee. Network users will be expected to follow to the rules. These will be:
    • Do not gamble
    • Do not install unauthorised software
    • No hate speech
    • Visiting 'obscene' websites
    • No leaking data/ insider trading
  • Disaster recovery
    Given the amount of important data often stored on a computer network, it is essential that an effective disaster recovery policy be in place. Disasters include:
    • Fire, flood, lightning, terrorist attacks etc.
    • Hardware failure, e.g. power supply unit failing
    • Software failure, e.g. virus damage
  • There are usually three parts to a disaster recovery policy:
    • Before the disaster: risk analysis, preventative measures and staff training
    • During the disaster: staff responseimplementing contingency plans
    • After the disaster: recovery measures, purchasing replacement hardware, reinstalling software, restoring data from backups.
  • Backups
    A backup is a copy of data that can be used if the original data is lost. A backup policy sets out how often and to what medium backups are made. The backup medium is generally different to the active storage medium.
  • What is the grandfather-father-son method?

    Oldest back up will be named grandfather, second oldest named father, youngest named son. When a new backup is made the grandfather becomes the son, the son becomes the father and the father becomes the grandfather
  • Archiving
    The process of storing data that is no longer in current or frequent use. It is held for security, legal or historical reasons.