Information Security Policies and Standards. Bryan McLaughlin Information Security Officer Creighton University email@example.com. The challenges before us. Define security policies and standards Measure actual security against policy Report violations to policy
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Information Security Officer
Provide a framework for the
management of security
across the enterprise
Access to network resource will be granted through a unique user ID and password
Passwords will be 8 characters long
Passwords should include one non-alpha and not found in dictionary
Clearly identify and define
security goals and the goals
of the university.