Information Security Policy

Great Essays
Information security policy refers to measures taken by a company in an attempt to control the behavior of the labor force. The policy ensures that no inappropriate activities take place within the working environment. As part of the rules that the policy has to abide by is the compliance with the laws and regulation and the ability to create defense in the court (Peltier, 2016). The management must support and administer the policy in a suitable manner. It is imperative to tailor the policy as a way of meeting the needs of the company. Responsibility sharing is one factor that the management of an organization should take into account to ensure effective use of the data systems.
An information security policy goes a long way in reducing risks
…show more content…
The enterprise information security program policy determines the direction and scope of a company’s security measures (Johnson, 2014). The policy acts as a point of reference when developing, implementing and maintaining the security systems. Furthermore, the security program assigns duties to a number of areas associated with information security.
Policy documents ought to give an overview of the company’s philosophy with regard to security. Given that the firm has to evaluate the need for information security, it becomes easy to establish control that will reduce security. According to Peltier (2016), information will also include the organization of the security system and the roles that various individuals will play. Determining the responsibility that members will execute and the ones which the departments are responsible facilitates coordination and therefore makes the policy effective.
Issue Specific Security
…show more content…
The policy is for safeguarding the firewall as it is detrimental to the efficiency of an organization’s operations. Peltier argued security elements of the policy are protocols as well as software and hardware components (2016). The information technology is important as it prevents the penetration of the company systems thereby preventing the manipulation of data. All individuals are responsible for preventing system threats by not sharing passwords.
Information technology experts should install antivirus software that will detect threats to the system. Supervisors should conduct network monitoring to identify areas of risk. Security officers should ensure that only people with approval access the control room. Once the management approves the mechanism of putting a firewall in place, implementation through the use of security codes and key cards for high level authorized personnel (Johnson, 2014). Workers will get training on ways of using the system and detecting threat to ensure that there is no loop hole for data manipulation. In terms of maintenance, the company will update the system; antivirus software’s and change passwords regularly as a way of improving the control

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Footlocker Code Of Ethics

    • 970 Words
    • 4 Pages

    The company that I have decided to discuss is footlocker. Footlocker is an established company known for their wide variety of trainers. The company was introduced in 1974 and it was founded in 1988 as a separate business, known as the Woolworth Company. The company is a global business owned by Ken C.Hicks. Footlocker is a public limited company so the business information and trading is free to others.…

    • 970 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Workstation Security Policy A workstation policy provides standards for access to information inside the facility in a controlled manner, respecting guidelines set by the Health Insurance Portability and Accountability Act (HIPPA). The purpose of this policy is to provide guidelines to properly ensure workstation security within healthcare companies. Workstation security policy ensures the security of information on the workstation and information accessed by the workstation. Additionally, this policy provides guidelines on how to ensure that the requirements of HIPPA are met.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction The reason for the article is to stress the importance of information security to any organization. The problem presently is that many organizations either do not have enough security or they have a lack of interest in the security measures as it pertains to their individual organization. The solution to this is that organizations must ensure they have a proper balance and remain vigilant at all times. This means remaining flexible as well as adaptable to the situation of the day.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity Policy Paper

    • 1062 Words
    • 5 Pages

    Introduction In today’s technological society it is very important that organizations maintain strong security policy documentation. The most important documentation that should be maintained is the cybersecurity policy. In this paper I will discuss the cybersecurity policy of the organization I have chosen (Apple INC). This paper will supply an analysis of the strategy that they use to protected themselves against fraud, hackers and theft.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Acceptable Use Policy

    • 1212 Words
    • 5 Pages

    Acceptable Use Policy This acceptable use policy (AUP) can be found in the User Domain and is what is used to define what users are allowed and not allowed to do with Organization owned IT assets. It is designed to protect Richman, its employees, customers and partners from harm caused by misuse of LAN to WAN, internet and web surfing. Misuse includes anything that is deliberate as well as inadvertent actions (Kim & Solomon, 2014). Everyone that works for Richman is responsible for the security of our system and the data that is on it.…

    • 1212 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Table of Contents Objective Scope Policy Information Security Steering Committee ALLOCATION OF INFORMATION SECURITY RESPONSIBILIES Chief Information Security Officer (CISO)…

    • 357 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Zunis Investments

    • 1339 Words
    • 6 Pages

    For the purposes of this project, the international investment company in question is Zunis Investments. Zunis is an international investment company headquartered in New York, USA with operations in the North American, European and Asian continent, specifically in countries such as Mexico, USA, UK, Finland, Sweden, France, Japan, China and India. They are doing an IT security upgrade and as part of the interview process for this work, they have asked for a scenario in which the company may be attacked, how to identify the attack and figure out the source as well as how to defend against that attack successfully. First off, before we get to that scenario let us start by stating an accepted definition of what an attack, threat, risk and vulnerability…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Team 3: Vadde Aditya, Bishal Bk, Fang Fang, Suraj Karki, Varshini Paladugu, Raghuveerreddy Suram Week 7 Group Assignment • Discuss what can happen if the framework you choose as a foundation does not fit your organization’s business objectives. If the framework the organization choose as a foundation does not fit the business objectives, it may face several problems as following. 1.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays