Security Policy

security policy>
│ Acceptable_Encryption_Policy.doc
│ Acceptable_Use_Policy.doc
│ Analog_Line_Policy.doc
│ Anti-virus_Guidelines.doc
│ Application_Service_Providers.doc
│ Aquisition_Assessment_Policy.doc
│ asp_standards.doc
│ Audit_Policy.doc
│ Automatically_Forwarded_Email_Policy.doc
│ DB_Credentials_Policy.doc
│ Dial-in_Access_Policy.doc
│ DMZ_Lab_Security_Policy.doc
│ email_retention.doc
│ Ethics_Policy.doc
│ Extranet_Policy.doc
│ Information_Sensitivity_Policy.doc
│ Internal_Lab_Security_Policy.doc
│ Internet_DMZ_Equipment_Policy.doc
│ Lab_Anti-Virus_Policy.doc
│ Password_Policy.doc
│ Remote_Access_Policy.doc
│ rfc2196.txt
│ Risk_Assessment_Policy.doc
│ Router_Security_Policy.doc
│ Server_Security_Policy.doc
│ Site Security Handbook.doc
│ Third_Party_Agreement.doc
│ Virtual_Private_Network.doc
│ Wireless_Communication_Policy.doc

└─translated
Acceptable_Use_Policy.doc
Audit_Policy.doc
Information_Sensitivity_Policy.doc
Remote_Access_Policy.doc

你可能感兴趣的:(职场,Security,休闲,policy)