Introduction to the Information Security Policy

Topics: Security, Computer security, Policy Pages: 3 (608 words) Published: August 21, 2011

Student Name: Rodrick J. Maynard

Axia College

IT/244 Intro to IT Security

Instructor’s Name: Ridwan Bari

Date: May 1, 2011


WAN that is short for Wide Area Network this type of connectivity is a critical and key part for businesses especially ones that use voice and video over IP and the centralization of applications. It allows companies to use real-time traffic based applications to e-mail messages and inter-office voice communications, the move towards data-center consolidation has brought WAN connectivity to the center stage.

1 Company overview

Sunica Music and Movies is a local multimedia chain company that has four locations that have been having difficulties coordinating customer sales from one store to another based on inventory each one of these store have been running independently that has lead to numerous problems like poor communication, decentralized accounting, no Internet-based commerce and jumbled inventory furthermore leading to lost revenue and its customer base. The implementation of a WAN connect within this company will help keep track of inventory, help reorder stock based on sales and each location will channel all their financial transactions through a central accounting package, eliminating bookkeeping errors, and centralizing the company finances.

2 Security policy overview

The best security policies would be program-framework and system-specific policies the reason for implementing a program-framework policy is to make sure that a system fits in the overall structure of the business and see if the implemented security program provide the company with an organization-wide direction. The system-specific policy will provide everyone with the purpose, scope, responsibilities, and compliance needed to achieve a secure system.

3 Security policy goals

1 Confidentiality

The policy will help protect the company’s financial...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Sample Information Security Policy Essay
  • The Role of Information Security Policy Essay
  • Essay on The Role of Information Security Policy
  • The Role of Information Security Policy Essay
  • Information Security Essay
  • The Role Of Information Security Policy Essay
  • Information Security Policy Essay
  • Information Security Essay

Become a StudyMode Member

Sign Up - It's Free