{"id":8874,"date":"2022-07-27T11:57:14","date_gmt":"2022-07-27T11:57:14","guid":{"rendered":"https:\/\/newcbl.demo.ly\/en\/?page_id=8874"},"modified":"2023-07-16T07:31:20","modified_gmt":"2023-07-16T07:31:20","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/cbl.gov.ly\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"
Information security concerning employees, managers, and contractors<\/p>\n
Classification of the assets of the bank <\/p>\n
Upgrade security access to bank facilities<\/p>\n
Password Management<\/p>\n
Physical and environmental security<\/p>\n
E-Mail Security<\/p>\n
Upgrade Encryption<\/p>\n
Upgrade Encryption<\/p>\n
Remote Access<\/p>\n
Systems development and maintenance<\/p>\n
Antivirus<\/p>\n
Backup<\/p>\n
Establish procedures to backup copies of data, storage media and information security.<\/span><\/p>\n<\/div>\n<\/li>\n Incident Response<\/p>\n Procedure to learn, monitor and reduce time of security breaches and breakdowns in the system operations to reduce direct or indirect damage to the\u00a0<\/span>CBL\u00a0and the public.<\/span><\/p>\n<\/div>\n<\/li>\n Security of networks and facilities<\/p>\n Protect networks from eavesdropping, spying, theft, disruption, and unwanted modification.<\/span><\/p>\n<\/div>\n<\/li>\n Continuity of workflow management<\/p>\n Protection of sensitive business tasks and information in the event of a crisis or disaster such as fires or earthquakes.<\/span><\/p>\n<\/div>\n<\/li>\n Security of wireless communications<\/p>\n Emphasis on proper mobile network encryption.<\/span><\/p>\n<\/div>\n<\/li>\n Network Security Monitoring<\/p>\n Allow limited access to the information network through the development of a separate network to the public. This network is separated from the internal network to help protect it from malicious attacks.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n Information is one of the most important elements of business management at the Central Bank of Libya. Information systems, databases, and communication networks of the world have become the basis for the banking sector from the industrial age to the new current age of technology. Information security is at the core of the Central Bank […]<\/p>\n","protected":false},"author":1,"featured_media":16375,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8874","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/pages\/8874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/comments?post=8874"}],"version-history":[{"count":53,"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/pages\/8874\/revisions"}],"predecessor-version":[{"id":21863,"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/pages\/8874\/revisions\/21863"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/media\/16375"}],"wp:attachment":[{"href":"https:\/\/cbl.gov.ly\/en\/wp-json\/wp\/v2\/media?parent=8874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Item No. 13<\/h3>\n
Item No. 14<\/h3>\n
Item No. 15<\/h3>\n
Item No. 16<\/h3>\n
Item No. 17<\/h3>\n
\n<\/p>\n","protected":false},"excerpt":{"rendered":"