Appendix B
Information Security Policy
Student Name: Enter Your Name Here
University of Phoenix
IT/244 Intro to IT Security
Instructor’s Name: Enter Your Instructor 's Name Here
Date: Enter the date here
Table of Contents
Associate Level Material 1
Table of Contents 1
Executive Summary 1
Introduction 3
Disaster Recovery Plan 5
Physical Security Policy 9
Access Control Policy 13
Network Security Policy 17
References 22
Executive Summary
Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.
Destructive acts using computer networks have cost billions of dollars and increasingly threaten the …show more content…
The policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and monitoring the network for security violations. Lastly, the review process modifies the existing policy and adapts to lessons learned.
Network security services
For each security service, briefly describe how it is used to protect a network from attack. Include why the service will be used for network security as relates to your selected scenario, or why it is not applicable in this circumstance.
Authentication
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they