Pauline IT
PROFESSIONAL
toolkit
WHAT IS IT SECURITY
“Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats. This defense includes detection, prevention and response to threats through the use of security policies, software tools and IT services.”

GUIDELINES
Confidentiality: protected data against unauthorized disclosure.
​
Availability: Ensure data and information are available to users as required.
​
Integrity: Ensure that data are complete and unaltered.
​
Authentication: Ensure that the system runs a check when a user login to verify the identity of that person.
​
Authorization: Ensure that a person, an IT component or an application is authorized to perform a specific action.
​

Data protection: Ensure that personal data are protected against misuse by third parties.
​
Data security: Ensure that data are protected in respect of requirements on its confidentiality, availability and integrity.
​
Data backup: Ensure that copies of existing data have been made to prevent its loss.
​
Penetration testing: Consists of directed or simulated attack on an IT system; used as a test of the effectiveness of existing security safeguards.
​
Risk assessment or analysis: provides information on the possible occurrence of a damaging event and what negative consequences the damage would have.
​
Security policy: Ensure that objectives and general security safeguards are formulated.
TOOLS AND BEST PRACTICES
​
​
IT Security Policies
Security Policy Tool delivers a solution for testing, analyzing, and editing access control policies. It instills confidence that classified assets in the Big data, Cloud, IoT, Cybersecurity, and other access control systems are protected at the level your organization intends them to be. Continue...
Updating Installations
This guide explains pre-installation, installation on various platforms, post-installation, upgrading, and migration procedures for Couch-base Server. (Here)
- Passwords Management
Whether you’re at the office or at home, managing passwords is the key to protecting sensitive professional and personal information. Individuals and businesses use passwords to guard against identity hacking, unauthorized use of software, and stolen information. Employers often monitor how their employees use passwords in order to protect a business. When you put your personal information into a computer, you should always consider how you manage your passwords to make sure your data is safe. More
​
