Preview

Information and Communication Security

Best Essays
Open Document
Open Document
3522 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information and Communication Security
ABSTRACT
WHAT WAS DONE:
The issue-specific security policy was the main focus for this research paper. An analysis of the policy itself was conducted and also a set of guidelines were developed that comply with this policy. The components of the policy and how organisations would use them were looked into.
The reason for choosing the issue-specific security policy was because it was the least investigated yet potentially the most important policy of all three key policies. The purpose of the task itself was to enable students to gain a deeper understanding of the effects and uses of security policies which in turn further expanded our knowledge of how rules and regulations are structured in the corporate world.
WHY WAS IT DONE: The issue-specific security policy is the least investigated policy of the three main ones. It was also brought to attention that the ISSP encompassed an intemdiatary between the enterprise information security policy and the system specific security policy thus being the most interesting of the policies to research. Another reason why this policy in particular was research is because it was interesting to investigate how organisations would develop a policy based on issues rather than a specific technology used in the organisation. Also the ISSP seems the most critical and important of the three.
HOW WAS IT DONE:
The research was conducted though I based most of my work on the principles of the information security text book. The guidelines that were developed were a mash of ideas that are considered essential to the operation of an organisation and the critical elements needed within a business environment.
WHAT WAS FOUND:
Sources were lacking for this specific policy, even through UOW’s summon search engine. Journals could not be found that matched the phrase word-for-word. Despite this a comprehensive guide to and understanding of ISSP was compiled in the course text book which enabled most of the information to be understood.



References: Whiteman, Mattord, M.E.W, H,J,M 2011, Principles of Information Security, Cengage learning, Kennesaw State University Ogg, E.O 2011, Hackers steal more customer info from Sony Servers, 09/09/2011, http://news.cnet.com/8301-31021_3-20068414-260/hackers-steal-more-customer-info-from-sony-servers/ Nintendo Privacy Policy Administrators 2011, Online Privacy Policy, 10/09/2011, http://www.nintendo.com/corp/privacy.jsp ADDITIONAL SOURCES used but not cited Microsoft Staff 2011, Microsoft Online Privacy Notice Highlights, 07/09/2011, http://privacy.microsoft.com/en-us/default.mspx Sony Staff (EFFECTIVE) 2004, Terms of use / Privacy Policy, 10/09/2011, http://www.sony.com/terms.shtml#basics

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. General access to the Internet for recreational use by immediate household members through the Richman Investment Network on personal computers is permitted for employees that have flat-rate services. The Richman Investment employee is responsible to ensure the family member does not violate any Richman Investment policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investment employee bears responsibility for the consequences should the access is…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Defining policies for every domain of an IT infrastructure breaks down in depth how each entity should be properly used. The policies should also identify the key players that will play a key role in ensuring optimum use of all devices, as well as establishing and maintaining security throughout the process of information traveling through the Infrastructure. Here are some best practices to keep in mind when defining policies for a few of the domains within the infrastructure:…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What Is A Security Policy? A Security Policy is a plan outlining what the critical assets are and how they must (and can be) protected. Its main purpose is to provide staff with a brief overview of the acceptable use of any of the information assets as well as explaining about conduct and what is deemed as allowable and what is not. This document is a ‘must read’ source of information for everyone using in any way systems and resources defined as potential targets. The start procedure for a security policy requires a complete exploration of our network, as well as every other critical asset, so that the appropriate measures can be effectively implemented. Everything starts with identifying our critical information resources…

    • 676 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 648 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays