Preview

Security paper

Powerful Essays
Open Document
Open Document
1480 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security paper
In today’s information age, there is an over dependence in I.T in all operations of a company from keeping records to many other functions in the organization. Given the importance of information systems in tee organizations, malice, mischance or error can be detrimental to the organization’s existence and therefore a well laid out security policy is almost mandatory. Security policy therefore focuses on the processes, tools and methods necessary for the design, implementation and testing of the systems as well as adopt the existing systems to the ever changing environment. Global Distribution Inc. (GDI) is a distribution company that is involved with management of numerous accounts across the United States, Mexico and Canada. With the complexity and sensitivity of its operations, data loss or interference in its systems through error, malicious damage or mishap would lead to loss of millions of dollars as well as massive inconvenience to thousands of its clients (Greene, 2005). Having a good security policy for this organization is therefore a priority and this can only be achieved through a dedicated team of experts in the firm whose roles and responsibilities are well defined. It is clear that outsourcing cuts down operation costs, but dedication and availability of such staff raises questions to the quality of work they will offer to such a sensitive department. Having a good security policy requires involvement of all stake holders in the firm, from the C.E.O to the high number of employees in the firm (Greene, 2005). Given this chance to come up with a good security policy for the firm requires a high level commitment from me and my team and therefore the following document will breakdown how we intend to achieve such a great task.
2

GDI’s most important assets that require protection
Global Distribution Inc. deals with sensitive information from many companies and handles bulk of thousands of company’s accounts. A good security policy document



References: Greene, S. (2005). Security Policies and Procedures: Principles and Practices. New Jersey: Prentice Hall. Information Security Policy Templates. (2011). Retrieved from http://www.sans.org/security- resources/policies/ Walt, C. v. (2010, Nov 03 ). Introduction to Security Policies, Part One: An Overview of Policies. Retrieved from http://www.symantec.com/connect/articles/introduction- security-policies-part-one-overview-policies

You May Also Find These Documents Helpful

  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Global Limited has a reputation of being one of the world’s leading providers of infrastructure information systems, software, and services around the world. They are in need of a better business and security practices. They have identified a problem which has been likened to a game of Whack-a-mole. To help with its security problem, Global as called upon the knowledge of CIS-its own Security Division. One of the first steps is to understand what information is critical to the business initiatives. Global Cadence is front-end for over 40 applications and has for 200,000 registered users. Global is working to minimize its impact.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    SANS - Information Security Resources | Information Security Policy Templates |. (n.d.). Retrieved from http://www.sans.org/security-resources/policies/…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    2. General access to the Internet for recreational use by immediate household members through the Richman Investment Network on personal computers is permitted for employees that have flat-rate services. The Richman Investment employee is responsible to ensure the family member does not violate any Richman Investment policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investment employee bears responsibility for the consequences should the access is…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Bsa 310 Week 2

    • 653 Words
    • 3 Pages

    IT security policies need to address the customers concerns in regards to handling their personal information with a third…

    • 653 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Many times, disaster recovery planning fails to consider how diverse regulations and compliance issues will impact an organization after a natural disaster strikes (Talon, 2006). For instance, organizations regulated by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), will discover that disaster recovery planning can be a complex web of potential pitfalls.…

    • 1269 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    Global Distribution, Inc. (GDI) is a distribution company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GDI specializes in supply chain management and in coordinating the warehousing, staging, distribution, transportation, and wholesaler/VAR relationship for their customers.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A Man in the Middle (MitM) attack occurs where communication between two network devices is intercepted by an attacker. The attacker can then impersonate both communicating devices, relaying information between the two, such that the communicating network devices will not know that their communication has been compromised. This allows the attacker to read potentially confidential data only intended for the two devices communicating, or even change information as they see fit.…

    • 1605 Words
    • 7 Pages
    Good Essays