Praveen Reddy, Polam
Wilmington University
Table of Contents
Abstract…………………………………………………………………………………………...Error: Reference source not found
Introduction………………………………………………………………………………………3
Implementing security policy……………………………………………………………………..Error: Reference source not found
Importance of security policy……………………………………………………………………..Error: Reference source not found
Conclusion………………………………………………………………………………………...Error: Reference source not found
References…………………………………………………………………………………………7
Organization security policy
Abstract
The security policy for an organization plays a predominant rule. There are different security strategies for every organization. For example, Organization A with the policy X might be not be useful for organization B. Every company designs its own security policies in which the custom and living document can reflect the environment and culture of the organization to meet their required specific needs (Long, 2002). The strategies of implementing the policies are designed on the bases of technologies and principles the organization uses (Hrause &Tipton 2003).
Introduction
In today’s world, the technology has made many dramatic changes to establish several organizations and companies. There are many organizations which are unable to survive because of the competitiveness in organizations. To make a successful organization there should be a better established strategies and policies to implement. The main strategy is to update the security policies from time to time without any negligence, because there are several malware detectors and agents who theft the information and make the organization unprofitable (Bruhn & Petersen, 2003). So, in this paper, we focus on the major strategies and the importance of implementing security policy in organizations
Implementing security policy:
The security policy of an organization should be according to the policy of the entire organization, defining the basic strategy,
References: Bruhn, M & Petersen, R. (2003). Policy development for information security. Retrieved from: https://net.educause.edu/ir/library/pdf/PUB7008i.pdf Danchev, d. (2003). Building and implementing a successful information security policy (P-7). Retrieved from: http://www.windowsecurity.com/pages/security-policy.pdf Johnson, R (2014). Security policies and implementation issues Johns & Bartlett Publishers Krause, M & Tipton, H. (2003). Information security management handbook. Retrieved from: https://akademik.del.ac.id/ebooks/ComputerSecurity/CRC%20Press%20-%20Information%20Security%20Management%20Handbook,%20Fifth%20.pdf Long, G (2002). Security policies in a global organization. Retrieved from: http://www.sans.org/reading-room/whitepapers/policyissues/security-policies-global-organization-501 Muthaiyah, S & Kerschberg, L. (2007). Virtual organization security policies. Retrieved from: http://web.a.ebscohost.com.mylibrary.wilmu.edu/ehost/pdfviewer/pdfviewer?sid=8a5627b7-d0a7-4feb-9ddb-77c0b09f12e5%40sessionmgr4003&vid=1&hid=4112 Peltier, T (2004). Information Security Policies and procedures (Pp29-43). Retrieved from: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CB4QFjAA&url=http%3A%2F%2Fenglish.360elib.com%2Fdatu%2FG%2FEM349338.pdf&ei=zcqIVdDbFoukyASmuYG4DA&usg=AFQjCNGoRMOuKGzSCgWZ16KN4-RnrXo13w&sig2=HbEAnh13nV1mFDh4sj_IjA Pettersson, G. (2008). Defining information security as a policy (p-16). Retrieved from: https://gupea.ub.gu.se/bitstream/2077/10538/1/gupea_2077_10538_1.pdf