Preview

Organization security policy

Powerful Essays
Open Document
Open Document
1134 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Organization security policy
Organization security policy
Praveen Reddy, Polam
Wilmington University

Table of Contents
Abstract…………………………………………………………………………………………...Error: Reference source not found
Introduction………………………………………………………………………………………3
Implementing security policy……………………………………………………………………..Error: Reference source not found
Importance of security policy……………………………………………………………………..Error: Reference source not found
Conclusion………………………………………………………………………………………...Error: Reference source not found
References…………………………………………………………………………………………7

Organization security policy
Abstract
The security policy for an organization plays a predominant rule. There are different security strategies for every organization. For example, Organization A with the policy X might be not be useful for organization B. Every company designs its own security policies in which the custom and living document can reflect the environment and culture of the organization to meet their required specific needs (Long, 2002). The strategies of implementing the policies are designed on the bases of technologies and principles the organization uses (Hrause &Tipton 2003).
Introduction
In today’s world, the technology has made many dramatic changes to establish several organizations and companies. There are many organizations which are unable to survive because of the competitiveness in organizations. To make a successful organization there should be a better established strategies and policies to implement. The main strategy is to update the security policies from time to time without any negligence, because there are several malware detectors and agents who theft the information and make the organization unprofitable (Bruhn & Petersen, 2003). So, in this paper, we focus on the major strategies and the importance of implementing security policy in organizations
Implementing security policy:
The security policy of an organization should be according to the policy of the entire organization, defining the basic strategy,



References: Bruhn, M & Petersen, R. (2003). Policy development for information security. Retrieved from: https://net.educause.edu/ir/library/pdf/PUB7008i.pdf Danchev, d. (2003). Building and implementing a successful information security policy (P-7). Retrieved from: http://www.windowsecurity.com/pages/security-policy.pdf Johnson, R (2014). Security policies and implementation issues Johns & Bartlett Publishers Krause, M & Tipton, H. (2003). Information security management handbook. Retrieved from: https://akademik.del.ac.id/ebooks/ComputerSecurity/CRC%20Press%20-%20Information%20Security%20Management%20Handbook,%20Fifth%20.pdf Long, G (2002). Security policies in a global organization. Retrieved from: http://www.sans.org/reading-room/whitepapers/policyissues/security-policies-global-organization-501 Muthaiyah, S & Kerschberg, L. (2007). Virtual organization security policies. Retrieved from: http://web.a.ebscohost.com.mylibrary.wilmu.edu/ehost/pdfviewer/pdfviewer?sid=8a5627b7-d0a7-4feb-9ddb-77c0b09f12e5%40sessionmgr4003&vid=1&hid=4112 Peltier, T (2004). Information Security Policies and procedures (Pp29-43). Retrieved from: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CB4QFjAA&url=http%3A%2F%2Fenglish.360elib.com%2Fdatu%2FG%2FEM349338.pdf&ei=zcqIVdDbFoukyASmuYG4DA&usg=AFQjCNGoRMOuKGzSCgWZ16KN4-RnrXo13w&sig2=HbEAnh13nV1mFDh4sj_IjA Pettersson, G. (2008). Defining information security as a policy (p-16). Retrieved from: https://gupea.ub.gu.se/bitstream/2077/10538/1/gupea_2077_10538_1.pdf

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    2. General access to the Internet for recreational use by immediate household members through the Richman Investment Network on personal computers is permitted for employees that have flat-rate services. The Richman Investment employee is responsible to ensure the family member does not violate any Richman Investment policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investment employee bears responsibility for the consequences should the access is…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Final Project

    • 4129 Words
    • 13 Pages

    An effective IT Security policy protects the organization against possible threats to the infrastructure and data that the organization has. It will provide and maintain its ability to provide confidentiality, integrity, availability, and security of the client’s data within the organization’s environment.…

    • 4129 Words
    • 13 Pages
    Better Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays