security policy


A security policy is a document that outlines the rules, laws and practices for computer network access. This document regulates how an organization will manage, protect and distribute its sensitive information (both corporate and client information) and lays the framework for the computer-network-oriented security of the organization.

Read Also:

  • security software

    A general phrase used to describe any software that provides security for a computer or network. There are many types of security software including antivirus software, encryption software, firewall software and spyware removal software. Additionally, many operating systems also come preloaded with security software and tools. The two most common types of security software used […]

  • security software disabler Trojan

    A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.

  • seek time

    Refers to the time a program or device takes to locate a particular piece of data. For disk drives, the terms seek time and access time are often used interchangeably. Technically speaking, however, the access time is often longer the seek time because it includes a brief latency period.

  • segment

    (1) In networks, a section of a network that is bounded by bridges, routers or switches. Dividing an Ethernet into multiple segments is one of the most common ways of increasing available bandwidth on the LAN. If segmented correctly, most network traffic will remain within a single segment, enjoying the full 10 Mbps bandwidth. Hubs […]

  • segmented address space

    An address space logically divided into sections, called segments. To access a particular memory location, a program must specify both the segment number and the offset within that segment. In contrast, a flat address space consists of simple memory addresses that start at 0 and increment to the maximum address. Intel’s 16-bit x86 architecture uses […]


Disclaimer: security policy definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.