Preview

Bloom Design Group’s

Better Essays
Open Document
Open Document
2994 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bloom Design Group’s
Bloom Design Group’s Information Security Policy

CMGT/245

July 22, 2012

Bloom Design Group’s Information Security Policy
Executive Summary This paper will establish the policies and security methods that will be implemented by the Bloom Design Group. The Physical Security Policy, Access Control Policy, and Network Policy will each be explained in detail, and then followed by the steps required to reach the goals of the policy. The Bloom Design Group may experience difficulties and some barriers implementing each new policy. This paper will also analyze some of these in an attempt to help the Bloom Design Group overcome some of the difficulties that may be experienced. The Bloom Design Group will need to adhere with the CIA triad that is well known for its data securities. Numerous safety implementations will be made to ensure that any unauthorized people will not have access to sensitive data. Only authorized personnel that have access to the data can tamper or replace data. Finally, the accessibility should be readily available for all personnel that are authorized to access the data. The Bloom Design project insists that all employees follow the plan and are well informed of all procedures and processes that they will experience during their employment with the Bloom Design Group. Any questions about the plan can be inquired with the technical support division, which will respond to the inquiry as soon as possible. Any revisions or additions to the processes and procedures that are declared in this paper will need board approval. The proposed revisions or additions will be presented to the board of directors for approval. Once approved, the additions or revisions will be planned, implemented, and tested.
Introduction
The Bloom Design Group conducts business around the world for all type of individuals and organizations, large or small, by offering interior design services. Currently the company



References: Merkow, M., & Breithaupt, J. (2006). Information security: Principles and practices. Upper Saddle River, NJ: Pearson/Prentice Hall. Microsoft. (2012). RADIUS: Remote Access Dial-In User Service. Retrieved July 30, 2012, from http://support.microsoft.com/kb/168667 The Role of Security and Life Safety Systems. (2012). Buildings, 106(4), 44 Lee, S. C. (2003). An Introduction to Identity Management. Retrieved from http://www.sans.org/reading_room/whitepapers/authentication/introduction- identity-management_852

You May Also Find These Documents Helpful

  • Good Essays

    implemented, or what processes needed to be revised. After a general understanding of what was…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The applicant submitted a staffing plan as well as shared detailed plans for managing the AFIX project.…

    • 870 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It 244 Week 1 Checkpoint

    • 721 Words
    • 3 Pages

    Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 2. Retrieved from Mark S. Merkow, Jim Breithaupt, IT244- Intro to IT Security.…

    • 721 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79-98…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    being consultants to many professional teams for their own design efforts. We utilize the latest…

    • 1748 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    © Copyright 1990 December 1991/Version 2 The Design Management Institute All rights reserved. No part of this publication may be reproduced without written permission. 2…

    • 13786 Words
    • 56 Pages
    Powerful Essays
  • Powerful Essays

    MAS Holdings has moved from being a contract manufacturer to a provider of “design to delivery” solutions. The company has acquired the skills and knowledge for design and product development over the course of twenty-plus years. MAS also has the supply chain to support the manufacturing of a retail brand,…

    • 2304 Words
    • 66 Pages
    Powerful Essays
  • Good Essays

    it is important to involve service people in the design process to reduce the risk of achieving a design that looks good on paper, but doesn’t work in the real world.…

    • 1759 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Design House Partnership

    • 411 Words
    • 2 Pages

    ‘I can’t believe how much we have changed in a relatively short time. From being an inward-looking manufacturer,we became a customer-focused “design and make”operation. Now we are an integrated service provider. Most of our new business comes from the partnerships we have formed with design houses. In effect, we design products jointly with specialist design houses that have a well-known brand, and offer them a complete service of manufacturing and distribution. In many ways we are now a “business-to-business” company rather than a“business-to consumer” company.’ (Jim Thompson, CEO,Concept Design Services (CDS))…

    • 411 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Wedding Plan

    • 2074 Words
    • 9 Pages

    “Our mission is to generate your ideas into our creations and deliver it to you in a unique and organized way. It also includes low budget and un-stressful planning any time, anywhere”…

    • 2074 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Feasibility Study

    • 3683 Words
    • 15 Pages

    The consultant analyses the Functional Brief, refer to the Master Plan Studies Guideline to ensure that the services to be provided and the manner in which they are to be delivered is completely understood.…

    • 3683 Words
    • 15 Pages
    Powerful Essays