Plankton Games: Security Policies

Improved Essays
Security policy

Having security policies is essential for Plankton Games to ensure security of their systems. Plankton should introduce an organisational policy that contains policies in regards to risk management and data protection. The business should comply with regulatory policies such as Access control policy; Antivirus policy; asset management policy; physical security policy. Management should be able to determine what is required to be protected as shown above through the risk assessment and risk register. The management of Plankton Games should understand the laws and regulations it is responsible for. The security policies should outline what employees are expected of in regards to complying with the security policies and the consequences
…show more content…
During a security breach that may occur a logging system will allow Plankton to be notified of any negative events that may occur. This can enable the business to gain notification of what is happening within the network such as data being extracted or failures such as power failure or fault within hardware. This would enable the business to track the route cause of the threat. To enable this, being able to assess the environment of the business is essential, such as the assets that need to be monitored and therefore configure notifications and alerts on those assets. (Security Compass, 2018) Being able to collect and archive all logs will allow the business to identify faults and therefore mitigate future threats or trace back to its route, as well as providing regular assessments on the …show more content…
If employees don't have the knowledge on security and its impact, it will greatly affect the business as they may likely be victim of security threats such as phishing. Therefore it is essential Plankton Games are able to train their employees. To ensure this it is of good practice for Plankton Games to ensure that employees are given training on the businesses organisational policies as well ensuring new employees are given training and information on their security policies. By doing this it will ensure new employees will have a good understanding of the security policies and be more aware of being

Related Documents

  • Improved Essays

    After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires to introduce a user training program to make every employee understands the importance of how they behave themselves every day in protecting the company’s network…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    The police department had a policy in place stating that the department reserved the right to monitor all email and internet use on its network and informed…

    • 418 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Safety Factors Nvq

    • 257 Words
    • 2 Pages

    To allocate sufficient resources to maintain safe and healthy conditions of work; • To take steps to ensure that all known safety factors are taken into account in the design, construction, operation and maintenance of plants, machinery and equipment; • To ensure that adequate safety instructions are given to all employees; • To provide wherever necessary protective equipment, safety appliances and clothing and to ensure their proper use; • To inform employees about materials, equipment or processes used in their work which are known to be potentially hazardous to health or safety; • To keep all operations and methods of work under regular review for making necessary changes from the point of view of safety in the light of experience and upto…

    • 257 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyp 3.3 11.1

    • 1114 Words
    • 5 Pages

    These ensure the safety of Adults and children alike. They state that all employees have the responsibility to maintain health and safety by, †̃taking reasonable care for the health and safety of themselves and of any person who might be affected by their acts or omissions at…

    • 1114 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Employees shall not make unauthorized commitments or promises of any kind purporting to bind the department or agency. 9. Employees shall conserve and protect state property and equipment and not use it for unauthorized purposes. Employees shall comply with the State’s Acceptable Use Policy governing use of computers, email and network…

    • 945 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Our main goal is to prevent any injuries or diseases that can occur. In the workplace, our employees are required to uphold the occupational health and safety policies and procedures to ensure the safety of all our workers and customers. It is extremely important to create a detailed policy in which all workers need to follow. Failure to follow these policies can result in disciplinary measure, up and including termination. We have provided some examples of policies that we will be implementing.…

    • 1362 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Question: Question 12 Answer: Staff Policies and procedures are there to ensure staffâ€TMs health and welfare are protected and that there rights are supported. Some policies…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1.1 Describe how current health and safety legislation, policies and procedures are practiced in the setting. Primary legislation: Health and safety at work act: Everyone in the organisation is required to: 1. Report any Hazards 2. Follow the school's Safety Policy 3. Make sure their actions do not harm themselves or others 4.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Tom goes as far as to say, “malicious employees have been fleecing their employers for years” (2009). No doubt pointing towards the former employee of DuPont that managed to steal $400 million dollars’ worth of files from the company. Tom also went on to say, “Employees can commit cybercrimes such as fraud, identity theft and theft of intellectual property much faster and easier than un-trusted outsiders” (2009). By monitoring the network, the worry of complete data loss is expunged. The monitoring systems log every bit of data on the network for records.…

    • 524 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Internal Security Threats

    • 1296 Words
    • 6 Pages

    Policies should be constantly updated and gone over with employees to ensure they understand them. Ensuring that employees are not taking pertinent information to outside sources whether intentional or unintentionally is of other concern for the manager. Keeping security issues a very serious matter is important for the manager to reiterate to the employees, as are the repercussion that they may face if rules are broken. Some examples of real world internal threats are 1. Employees sharing login information 2.…

    • 1296 Words
    • 6 Pages
    Great Essays