Security: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
Hoailinh.ngo (talk | contribs) |
||
(7 intermediate revisions by 2 users not shown) | |||
Line 6: | Line 6: | ||
* Offies are expected to act responsibly and ethically when accessing Officience’s electronic data and technology resources. | * Offies are expected to act responsibly and ethically when accessing Officience’s electronic data and technology resources. | ||
* The security of a system is only as good as its weakest link. If even one person does not pay attention to security, the security of the whole system is compromised. | * The security of a system is only as good as its weakest link. If even one person does not pay attention to security, the security of the whole system is compromised. Read example on [[Thalès Security]]. | ||
Good Security Standards follow the "90/10" Rule : | Good Security Standards follow the "90/10" Rule : | ||
Line 289: | Line 289: | ||
* Intranet: offyspace.com | * Intranet: offyspace.com | ||
* Helpdesk request: http://offyspace.com/sc/ | * Helpdesk request: http://offyspace.com/sc/ | ||
* diaries: https://diaries.offinity.io | |||
'''Emails:''' | '''Emails:''' | ||
Line 296: | Line 297: | ||
== See also == | == See also == | ||
*[https://wiki.officience.com/Security_Policy Security policy framework] following ISO/IEC 27001:2013 | |||
* [[Security team]] | * [[Security team]] | ||
* [[Thalès Security]] | |||
== Reference == | == Reference == | ||
* [https://docs.google.com/presentation/d/1snClXs8nCWRoOe5Mw-WfVTxgnEQVGat6b5gAMR2ZChg Security Training] (by Hoai Linh NGO, 2017) | * [https://docs.google.com/presentation/d/1snClXs8nCWRoOe5Mw-WfVTxgnEQVGat6b5gAMR2ZChg Security Training] (by Hoai Linh NGO, 2017) | ||
*[https://wiki.officience.com/Security_Appendix Security appendices] |