# Information Security

### 1.[Terms and Definition](https://drive.google.com/file/d/1l23BTr1RStFZq_QmF-5V2vpS06cBJnHb/view?usp=sharing)

### 2.[Acceptable Usage Policy](https://drive.google.com/file/d/1oww6vB7PxwXGafO33h0jG-T1VlD0Wm8q/view?usp=sharing)

### 3.[Cloud Computing Security Policy](https://drive.google.com/file/d/1WxUI_BnLLbeNzQHtWgkgLFqzhuZxIwax/view?usp=sharing)

### 4.[Mobile device Management Policy](https://drive.google.com/file/d/1P_7-nKbRI8AIWUgm66Q9aUsYr83nN85r/view?usp=sharing)

### 5.[Encryption Policy](https://drive.google.com/file/d/10UXddHd9CxaCO6OLyqEM5PC1iGS2vFEz/view?usp=sharing)

### 6.[Clear Screen and Clear Disk Policy](https://drive.google.com/file/d/1bRjJvB4gDqvkp-WY_NlwTNL35K-Y6_YS/view?usp=sharing)

### 7.[Virtual Private Network Policy](https://drive.google.com/file/d/1LQsURIqAmb8waKgI5DJac2D5hUVDNjua/view?usp=sharing)

### 8.[Password Management Policy](https://drive.google.com/file/d/10JIrklIh9EzHWYQYLUvw-oDoTd3THwY2/view?usp=sharing)

### 9.[Business Continuity Policy](https://drive.google.com/file/d/1PpWRocTmV2CKzZPvVf-9b60qi0Pe3Gx3/view?usp=sharing)

### 10.[Email Security Policy](https://drive.google.com/file/d/1pzfi-zYodRujjPR5RzktjqyE4LME2jT_/view?usp=sharing)

### 11.[Information Technology Policy](https://drive.google.com/file/d/18qj9Cu55TuMileF7ppUJTNqfklabZFAX/view?usp=sharing)

### 12.[Compliance Procedure](https://drive.google.com/file/d/1FLNuR6I5uy3DHyuH6joR6v5KvlP-_aI-/view?usp=sharing)

### 13.[Threat and Vulnerability Management](https://drive.google.com/file/d/17eIpv1sBhYTS8mqLPlf1OuZYAkvGmBxo/view?usp=sharing)

### 14.[Risk Management Procedure](https://drive.google.com/file/d/1BgY8w7K2gaxg2zlVcYaIc32VbdclBuCz/view?usp=sharing)

### 15.[Cyber Crisis Management Plan ](https://drive.google.com/file/d/1ajHzFdqttTek0APJhj9Z5bWr9QS6q6N_/view?usp=sharing)

### 16.[Backup Recovery Procedure](https://drive.google.com/file/d/1d25BY9fxNhLUb6GmoDtrQ8WDPYtRf3Lh/view?usp=sharing)

### 17.[Procedure for Control of Documents and Records](https://drive.google.com/file/d/1ZFnMWlz_RtvrbYQbXxnQV4N7HNmT-MKn/view?usp=sharing)

### 18.[Virus Management Procedure](https://drive.google.com/drive/u/0/folders/1q1hVwUQ0fEYzFZFXMatHn3UIeIOXM7tU/)

### 19.[Patch Management Procedure](https://drive.google.com/file/d/1n02SoROiB1L3V27dFGd4G1vszZneoAr0/view?usp=sharing)

### 20.[Access Control Procedure](https://drive.google.com/file/d/1OZcypu7cVjHjwVFLnI5XY9zYKqjklMcq/view?usp=sharing)

### 21.[Network Control Access and Security Procedure](https://drive.google.com/file/d/1FlyOOf8Nf6_eNgXFnnII8KZzyzVarCmc/view?usp=sharing)

### 22.[Information System Acquisition Development and Maintenance Procedure](https://drive.google.com/file/d/1FSl84TJ1kd-LWSQgs62609I5Xwz9KSyj/view?usp=sharing)
