CMGT/245
July 22, 2012
Bloom Design Group’s Information Security Policy
Executive Summary This paper will establish the policies and security methods that will be implemented by the Bloom Design Group. The Physical Security Policy, Access Control Policy, and Network Policy will each be explained in detail, and then followed by the steps required to reach the goals of the policy. The Bloom Design Group may experience difficulties and some barriers implementing each new policy. This paper will also analyze some of these in an attempt to help the Bloom Design Group overcome some of the difficulties that may be experienced. The Bloom Design Group will need to adhere with the CIA triad that is well known for its data securities. Numerous safety implementations will be made to ensure that any unauthorized people will not have access to sensitive data. Only authorized personnel that have access to the data can tamper or replace data. Finally, the accessibility should be readily available for all personnel that are authorized to access the data. The Bloom Design project insists that all employees follow the plan and are well informed of all procedures and processes that they will experience during their employment with the Bloom Design Group. Any questions about the plan can be inquired with the technical support division, which will respond to the inquiry as soon as possible. Any revisions or additions to the processes and procedures that are declared in this paper will need board approval. The proposed revisions or additions will be presented to the board of directors for approval. Once approved, the additions or revisions will be planned, implemented, and tested.
Introduction
The Bloom Design Group conducts business around the world for all type of individuals and organizations, large or small, by offering interior design services. Currently the company
References: Merkow, M., & Breithaupt, J. (2006). Information security: Principles and practices. Upper Saddle River, NJ: Pearson/Prentice Hall. Microsoft. (2012). RADIUS: Remote Access Dial-In User Service. Retrieved July 30, 2012, from http://support.microsoft.com/kb/168667 The Role of Security and Life Safety Systems. (2012). Buildings, 106(4), 44 Lee, S. C. (2003). An Introduction to Identity Management. Retrieved from http://www.sans.org/reading_room/whitepapers/authentication/introduction- identity-management_852