Romana Aftab
338 deare street
337-256-5555
337-256-5556
Alfred Beals Jr
2011
Information Security Policy
* Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3
Executive Summary: The Bloom Design Group will take the most extreme measures to protect the integrity of our clients and their information. We believe in the fact that the customer is our main goal and take full responsibility of your wants and needs. The Bloom Design Group is the choice that you should make if you want the best and quality protection, while receiving on time and professional work for your money. Our company is equipped with the most top of the line anti-theft monitoring system that is a step above the rest. We have a disaster recovery plan that is monitored and updated on a daily basis or as needed for each client. This plan consist of walk-through of mock problems that could happen on any given day, it also has simulations, checklist,
References: www.universityofphoenix.com/axia