Preview

It 244 Final

Powerful Essays
Open Document
Open Document
2332 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 244 Final
Associate Level Material
Appendix B

Information Security Policy

Student Name: Ronald Stride

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: Scott Smith

Date: January 27, 2013

Table of Contents

1. Executive Summary 1

2. Introduction 1

3. Disaster Recovery Plan 1

3.1. Key elements of the Disaster Recovery Plan 1

3.2. Disaster Recovery Test Plan 1

4. Physical Security Policy 1

4.1. Security of the facilities 1

4.1.1. Physical entry controls 1

4.1.2. Security offices, rooms and facilities 1

4.1.3. Isolated delivery and loading areas 2

4.2. Security of the information systems 2

4.2.1. Workplace protection 2

4.2.2. Unused ports and cabling 2

4.2.3. Network/server equipment 2

4.2.4. Equipment maintenance 2

4.2.5. Security of laptops/roaming equipment 2

5. Access Control Policy 2

6. Network Security Policy 3

7. References 3

Executive Summary

Sunica Music and Movies will be implementing a full security plan to ensure proper handling and access of data in our new system. Vulnerable customer information being properly protected is a top priority for us. An added benefit will be the security and accuracy afforded to employees through this protection.

Customers trust this organization with highly private personal and financial information. That makes it our responsibly to handle that information with the utmost respect and care. Through the controls and procedures outlined in this policy we can achieve those goals.

Employees have the right while being given access to this type of information to also be fully protected. The controls and procedures designated here will also facilitate that. For example leveled access removes temptation to lower level employees and protects them from being accused of infractions not ever in their control.

Here at Sunica we are ready to



References: Cite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author. None Applicable

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Appendix D IT244

    • 827 Words
    • 4 Pages

    American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    References: Cite all your references by adding the pertinent information to this section by following this example.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    For example areas of concern need to be addressed such as customer information and the security features. Another area of importance is the new system needs to follow compliance such as PCI-DSS (Payment Card Industry Data Security Standard). In addition, the security standards for information technology must be put in place. Lastly, the document will address ethical responsibility to Kudler’s when implementing the new system.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Better Essays

    It244 Appendix.D

    • 929 Words
    • 4 Pages

    American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.…

    • 929 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    References: Cite all your references by adding the pertinent information to this section by following this example.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Razors vs. Clippers

    • 1145 Words
    • 5 Pages

    References: American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.…

    • 1145 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Citations: American Psychological Association. (2010). Publication manual of the American Psychological Association (6th ed). Washington, DC: American Psychological Association.…

    • 2623 Words
    • 11 Pages
    Better Essays
  • Better Essays

    American Psychological Association. (2010). Publication manual of the American Psychological Association (6th ed.). Washington, DC: Author.…

    • 1143 Words
    • 5 Pages
    Better Essays
  • Better Essays

    References: American Psychological Association. (2010). Publication manual of the American Psychological Association (6th ed.). Washington, DC: American Psychological Association.…

    • 1741 Words
    • 7 Pages
    Better Essays