Preview

Organization security policy

Powerful Essays
Open Document
Open Document
1134 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Organization security policy
Organization security policy
Praveen Reddy, Polam
Wilmington University

Table of Contents
Abstract…………………………………………………………………………………………...Error: Reference source not found
Introduction………………………………………………………………………………………3
Implementing security policy……………………………………………………………………..Error: Reference source not found
Importance of security policy……………………………………………………………………..Error: Reference source not found
Conclusion………………………………………………………………………………………...Error: Reference source not found
References…………………………………………………………………………………………7

Organization security policy
Abstract
The security policy for an organization plays a predominant rule. There are different security strategies for every organization. For example, Organization A with the policy X might be not be useful for organization B. Every company designs its own security policies in which the custom and living document can reflect the environment and culture of the organization to meet their required specific needs (Long, 2002). The strategies of implementing the policies are designed on the bases of technologies and principles the organization uses (Hrause &Tipton 2003).
Introduction
In today’s world, the technology has made many dramatic changes to establish several organizations and companies. There are many organizations which are unable to survive because of the competitiveness in organizations. To make a successful organization there should be a better established strategies and policies to implement. The main strategy is to update the security policies from time to time without any negligence, because there are several malware detectors and agents who theft the information and make the organization unprofitable (Bruhn & Petersen, 2003). So, in this paper, we focus on the major strategies and the importance of implementing security policy in organizations
Implementing security policy:
The security policy of an organization should be according to the policy of the entire organization, defining the basic strategy,



References: Bruhn, M & Petersen, R. (2003). Policy development for information security. Retrieved from: https://net.educause.edu/ir/library/pdf/PUB7008i.pdf Danchev, d. (2003). Building and implementing a successful information security policy (P-7). Retrieved from: http://www.windowsecurity.com/pages/security-policy.pdf Johnson, R (2014). Security policies and implementation issues Johns & Bartlett Publishers Krause, M & Tipton, H. (2003). Information security management handbook. Retrieved from: https://akademik.del.ac.id/ebooks/ComputerSecurity/CRC%20Press%20-%20Information%20Security%20Management%20Handbook,%20Fifth%20.pdf Long, G (2002). Security policies in a global organization. Retrieved from: http://www.sans.org/reading-room/whitepapers/policyissues/security-policies-global-organization-501 Muthaiyah, S & Kerschberg, L. (2007). Virtual organization security policies. Retrieved from: http://web.a.ebscohost.com.mylibrary.wilmu.edu/ehost/pdfviewer/pdfviewer?sid=8a5627b7-d0a7-4feb-9ddb-77c0b09f12e5%40sessionmgr4003&vid=1&hid=4112 Peltier, T (2004). Information Security Policies and procedures (Pp29-43). Retrieved from: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CB4QFjAA&url=http%3A%2F%2Fenglish.360elib.com%2Fdatu%2FG%2FEM349338.pdf&ei=zcqIVdDbFoukyASmuYG4DA&usg=AFQjCNGoRMOuKGzSCgWZ16KN4-RnrXo13w&sig2=HbEAnh13nV1mFDh4sj_IjA Pettersson, G. (2008). Defining information security as a policy (p-16). Retrieved from: https://gupea.ub.gu.se/bitstream/2077/10538/1/gupea_2077_10538_1.pdf

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Final Project

    • 4129 Words
    • 13 Pages

    An effective IT Security policy protects the organization against possible threats to the infrastructure and data that the organization has. It will provide and maintain its ability to provide confidentiality, integrity, availability, and security of the client’s data within the organization’s environment.…

    • 4129 Words
    • 13 Pages
    Better Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays