Organization security policy

Powerful Essays
Organization security policy
Praveen Reddy, Polam
Wilmington University

Table of Contents
Abstract…………………………………………………………………………………………...Error: Reference source not found
Introduction………………………………………………………………………………………3
Implementing security policy……………………………………………………………………..Error: Reference source not found
Importance of security policy……………………………………………………………………..Error: Reference source not found
Conclusion………………………………………………………………………………………...Error: Reference source not found
References…………………………………………………………………………………………7

Organization security policy
Abstract
The security policy for an organization plays a predominant rule. There are different security strategies for every organization. For example, Organization A with the policy X might be not be useful for organization B. Every company designs its own security policies in which the custom and living document can reflect the environment and culture of the organization to meet their required specific needs (Long, 2002). The strategies of implementing the policies are designed on the bases of technologies and principles the organization uses (Hrause &Tipton 2003).
Introduction
In today’s world, the technology has made many dramatic changes to establish several organizations and companies. There are many organizations which are unable to survive because of the competitiveness in organizations. To make a successful organization there should be a better established strategies and policies to implement. The main strategy is to update the security policies from time to time without any negligence, because there are several malware detectors and agents who theft the information and make the organization unprofitable (Bruhn & Petersen, 2003). So, in this paper, we focus on the major strategies and the importance of implementing security policy in organizations
Implementing security policy:
The security policy of an organization should be according to the policy of the entire organization, defining the basic strategy,



References: Bruhn, M & Petersen, R. (2003). Policy development for information security. Retrieved from: https://net.educause.edu/ir/library/pdf/PUB7008i.pdf Danchev, d. (2003). Building and implementing a successful information security policy (P-7). Retrieved from: http://www.windowsecurity.com/pages/security-policy.pdf Johnson, R (2014). Security policies and implementation issues Johns & Bartlett Publishers Krause, M & Tipton, H. (2003). Information security management handbook. Retrieved from: https://akademik.del.ac.id/ebooks/ComputerSecurity/CRC%20Press%20-%20Information%20Security%20Management%20Handbook,%20Fifth%20.pdf Long, G (2002). Security policies in a global organization. Retrieved from: http://www.sans.org/reading-room/whitepapers/policyissues/security-policies-global-organization-501 Muthaiyah, S & Kerschberg, L. (2007). Virtual organization security policies. Retrieved from: http://web.a.ebscohost.com.mylibrary.wilmu.edu/ehost/pdfviewer/pdfviewer?sid=8a5627b7-d0a7-4feb-9ddb-77c0b09f12e5%40sessionmgr4003&vid=1&hid=4112 Peltier, T (2004). Information Security Policies and procedures (Pp29-43). Retrieved from: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CB4QFjAA&url=http%3A%2F%2Fenglish.360elib.com%2Fdatu%2FG%2FEM349338.pdf&ei=zcqIVdDbFoukyASmuYG4DA&usg=AFQjCNGoRMOuKGzSCgWZ16KN4-RnrXo13w&sig2=HbEAnh13nV1mFDh4sj_IjA Pettersson, G. (2008). Defining information security as a policy (p-16). Retrieved from: https://gupea.ub.gu.se/bitstream/2077/10538/1/gupea_2077_10538_1.pdf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays