1. Security Policy 

  • Security policy is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors, locks, keys and walls.

2. Security Models 

  • A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. 

3. Physical Security 

  • Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious  loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism. 

4. Communications and operations security

  • Information technology systems process large quantities of university data. These systems – which include computers, networking equipment, mobile devices, storage media, and other IT components – must be managed so as to protect information 

5. Business Continuity Planning 

  • The business continuity planning (BCP) is the creation of a strategy through the recognition of threats and risks facing a company, with an eye to ensure that personnel and assets are protected and able to function in the event of a disaster. 

6. Compliance 

  • In general, compliance means conforming to a rule, such as a specification, policy, standard or law.Regulatory compliance describes the goal that organisations aspire to achieve in their efforts to ensure that they are aware of and take steps to comply with relevant laws and regulations. 
7. Access Control
  • In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.