Security paper
In today’s information age, there is an over dependence in I.T in all operations of a company from keeping records to many other functions in the organization. Given the importance of information systems in tee organizations, malice, mischance or error can be detrimental to the organization’s existence and therefore a well laid out security policy is almost mandatory. Security policy therefore focuses on the processes, tools and methods necessary for the design, implementation and testing of the systems as well as adopt the existing systems to the ever changing environment. Global Distribution Inc. (GDI) is a distribution company that is involved with management of numerous accounts across the United States, Mexico and Canada. With the complexity and sensitivity of its operations, data loss or interference in its systems through error, malicious damage or mishap would lead to loss of millions of dollars as well as massive inconvenience to thousands of its clients (Greene, 2005). Having a good security policy for this organization is therefore a priority and this can only be achieved through a dedicated team of experts in the firm whose roles and responsibilities are well defined. It is clear that outsourcing cuts down operation costs, but dedication and availability of such staff raises questions to the quality of work they will offer to such a sensitive department. Having a good security policy requires involvement of all stake holders in the firm, from the C.E.O to the high number of employees in the firm (Greene, 2005). Given this chance to come up with a good security policy for the firm requires a high level commitment from me and my team and therefore the following document will breakdown how we intend to achieve such a great task.
2
GDI’s most important assets that require protection
Global Distribution Inc. deals with sensitive information from many companies and handles bulk of thousands of company’s accounts. A good security policy document
References: Greene, S. (2005). Security Policies and Procedures: Principles and Practices. New Jersey: Prentice Hall.
Information Security Policy Templates. (2011). Retrieved from http://www.sans.org/security- resources/policies/
Walt, C. v. (2010, Nov 03 ). Introduction to Security Policies, Part One: An Overview of Policies. Retrieved from http://www.symantec.com/connect/articles/introduction- security-policies-part-one-overview-policies