Preview

Information Security Policy

Powerful Essays
Open Document
Open Document
2658 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Policy
Information Security Policies are a very important part of a company’s protection; these policies are put in place to protect the company and well as the clients. It is important to maintain a constant watch over all security departments daily to ensure that everything is in working order. The policy below is a great way to keep track of the steps needed to protect your company and clients.
Romana Aftab
338 deare street
337-256-5555
337-256-5556

Alfred Beals Jr
2011
Information Security Policy

* Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3

Executive Summary: The Bloom Design Group will take the most extreme measures to protect the integrity of our clients and their information. We believe in the fact that the customer is our main goal and take full responsibility of your wants and needs. The Bloom Design Group is the choice that you should make if you want the best and quality protection, while receiving on time and professional work for your money. Our company is equipped with the most top of the line anti-theft monitoring system that is a step above the rest. We have a disaster recovery plan that is monitored and updated on a daily basis or as needed for each client. This plan consist of walk-through of mock problems that could happen on any given day, it also has simulations, checklist,



References: www.universityofphoenix.com/axia

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    9. Policies are the guide lines or strategies that assist users to protect them selves from un-warranted harm. Also audits and surveys, discover any vulnerabilities that may harm a user.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Select one of the company profiles below to be used for your Information Security Policy…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This top-level information security policy is a key component of [the organisations] overall information security management framework and should be considered alongside more detailed information security documentation including, system level security policies, security guidance and protocols or procedures.…

    • 98 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    gap analysis. You should include tasks, resources, cost estimates, and time estimates in the project plan.…

    • 313 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Safeguarding Policy Report

    • 3305 Words
    • 14 Pages

    Professional roles Safeguarding Policy Report. The purpose of this assignment is to give a report exploring the development of a chosen policy. The policy I will be given my report on is the safeguarding policy. I will examine, analyse and provide an overview of how this system works in practice in relation to the overall safety of the children within the setting.…

    • 3305 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Good Essays

    My decision to pursue Post Graduate study in the United Kingdom is underscored by my desire to be a part of the post graduate program at your institution. This university offers the flexibility needed for such a vast rapidly changing field. The facilities and the faculty at the university are par excellent.…

    • 583 Words
    • 3 Pages
    Good Essays