Unit 3
Unit 3
UNIT 3
What are Security Policies?
A security policy is a formal document that defines how an organization protects its
information, systems, and resources. It sets clear rules and responsibilities for
employees, contractors, and stakeholders.
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 1/14
3/4/25, 4:45 PM UNIT 3
• The policy should be shared with all employees so they know the rules.
• Example: A company emails all employees about the new password policy
requiring 12-character passwords.
2. Review (Reading) – Making Sure People Read It
• Example: When logging into a company system for the first time, employees
must read and accept security guidelines before proceeding.
3. Comprehension (Understanding) – Ensuring Clarity
Security Blueprint
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 2/14
3/4/25, 4:45 PM UNIT 3
1. Security Framework:
A structured approach that provides guidelines for building security systems.
Examples include:
• ISO/IEC 27001
• Password policies.
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 3/14
3/4/25, 4:45 PM UNIT 3
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 4/14
3/4/25, 4:45 PM UNIT 3
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 5/14
3/4/25, 4:45 PM UNIT 3
1. Awareness ("What")
• A company sends out email alerts about phishing scams and posters about
password security.
2. Training ("How")
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 6/14
3/4/25, 4:45 PM UNIT 3
1. Security Education:
• Aims to educate all employees about basic security principles and the
importance of following policies.
1. Prevents Security Breaches: Educated employees can identify and report threats
early.
2. Enhances Compliance: Ensures adherence to legal and regulatory standards
(e.g., GDPR, HIPAA).
3. Improves Incident Response: Employees know how to act during security
events.
4. Cost-Effective: Reduces the financial impact of breaches by preventing them.
1. Phishing Simulation:
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 7/14
3/4/25, 4:45 PM UNIT 3
2. Workshops:
• Posters or digital signage with tips like "Think before you click" or "Lock your
screen when leaving your desk."
4. Role-Specific Training:
Continuity Strategies
Continuity strategies are plans and practices designed to ensure that an organization
can continue its critical operations in the event of disruptions such as natural
disasters, cyberattacks, or system failures. These strategies focus on minimizing
downtime and reducing the impact of unforeseen events.
1. Risk Avoidance
• Example: Avoid using outdated systems to reduce the risk of data breaches.
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 8/14
3/4/25, 4:45 PM UNIT 3
2. Risk Mitigation
• Example: Installing backup power supplies to prevent data loss during power
outages.
3. Risk Transfer
What is a Firewall?
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 9/14
3/4/25, 4:45 PM UNIT 3
Importance of Firewalls:
1. Blocks Hackers & Cyberattacks – Prevents unauthorized access to your system.
2. Stops Viruses & Malware – Filters out harmful software before it reaches your
computer.
3. Controls Network Traffic – Allows only safe data while blocking harmful or
unnecessary traffic.
4. Protects Sensitive Information – Stops cybercriminals from stealing personal or
business data.
Real-Life Examples of Firewalls:
• Your Home Wi-Fi Router: Most routers have built-in firewalls to block harmful
websites and unauthorized devices.
Firewalls work in different ways to protect computers and networks. Here are the five
main types, explained simply with examples.
How it works:
• Think of it as a security guard at a gate who checks IDs before letting people in.
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 10/14
3/4/25, 4:45 PM UNIT 3
• It examines data packets (small pieces of information sent over the internet) and
allows or blocks them based on rules like IP addresses, ports, and protocols.
Example:
• Your home Wi-Fi router may have basic firewall rules to block suspicious traffic.
Pros: Fast and simple.
Cons: Doesn’t deeply inspect data, so some threats can get through.
How it works:
• Instead of directly connecting to websites, your request first goes through the
firewall, which checks it for security threats.
Example:
How it works:
• It controls network connections but does not inspect the data inside.
Example:
• Used in VPNs to create a secure connection between a remote worker and their
company’s office network.
Pros: Good for securing connections.
Cons: Doesn’t check data for threats.
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 11/14
3/4/25, 4:45 PM UNIT 3
How it works:
• Works like a VIP list at a club – only devices with approved MAC addresses
(unique device IDs) are allowed in.
Example:
How it works:
Packet Filtering Checks basic info (IP, port) Wi-Fi router blocking harmful Ba
traffic
Application Gateway (Proxy) Middleman that inspects data Blocking social media at school St
Circuit Gateway Secures connection, but doesn’t VPNs for remote work Go
inspect data
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 12/14
3/4/25, 4:45 PM UNIT 3
A VPN (Virtual Private Network) is a tool that helps protect your online privacy by
encrypting your internet connection and hiding your IP address. It creates a secure
and private tunnel for your data, making it harder for hackers, websites, or even
your internet provider to track what you're doing online.
• Protects Privacy – Stops websites, advertisers, and hackers from tracking your
online activity.
• Secures Public Wi-Fi – Prevents data theft when using Wi-Fi in cafes, airports, or
hotels.
• Bypasses Censorship & Geo-Restrictions – Lets you access websites and content
unavailable in your country.
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 13/14
3/4/25, 4:45 PM UNIT 3
• Client devices
• VPN routers
• VPN servers
• Firewalls
• Encryption hardware.
• User Device: This could be a laptop, phone, or any device that connects to
the VPN.
• Encrypted Data: The user’s internet traffic is protected and sent securely.
2. Security Layer (Protects the Network)
• Traffic Filtering: Ensures only valid requests pass through the firewall.
3. Server Side (Processes and Forwards Data)
https://helix-stamp-628.notion.site/UNIT-3-14a39aa0e1ad8025a1f2fbe3c464b627 14/14