Summary of the chapters 45
Remco van der Schoot
Made for the Centre of Expertise in Cyber Security at the
Utrecht University of Applied Sciences
SUMMARY OF THE
COMPUTER SECURITY
HANDBOOK
Volume Two, Sixth edition
, Summary of the Computer Security Handbook | Remco van der Schoot
INHOUDSOPGAVE
PART IV: Prevention; Human Factors .................................................................................................................... 2
45. Employement practices and policies ................................................................................................................. 2
45.1. Introduction ............................................................................................................................................... 2
45.2. Hiring .......................................................................................................................................................... 2
45.3. Management .............................................................................................................................................. 2
45.3.1. Acces is neither a privilege nor a right ................................................................................................ 2
45.3.2. The indispensable employee ............................................................................................................... 2
45.3.3. Career advencement ........................................................................................................................... 3
45.3.4. Vacation time ...................................................................................................................................... 3
45.3.5. Responding to changes in behavior .................................................................................................... 3
45.3.6. Separation of duties ............................................................................................................................ 3
45.3.7. The capability and responsibilitiy matrices ......................................................................................... 3
45.3.8. No unauthorized security probes ........................................................................................................ 3
45.4. Termination of employement .................................................................................................................... 4
45.4.1. Resignations ........................................................................................................................................ 4
45.4.2. Firings .................................................................................................................................................. 4
45.5. Summary .................................................................................................................................................... 4
Page 1|5