logo

Developing a Security Policy

   

Added on  2023-04-21

10 Pages1915 Words475 Views
1
Running head: DEVELOPING A SECURITY POLICY
DEVELOPING A SECURITY POLICY
[Author]
[Institution]

2
DEVELOPING A SECURITY POLICY
EXECUTIVE SUMMARY
This report is based on the development of a security policy of information and the report
has spotted its light on the implementation of security policy in Commonwealth Scientific and
Industrial Research Organization. In this report, the definition of the intent as well as the
rationale of the policy has been described. Moreover, this report has stated the responsibilities of
individuals along with the scope of the policy.

3
DEVELOPING A SECURITY POLICY
Table of content
Part two............................................................................................................................................4
DEVELOPING A SECURITY POLICY........................................................................................4
Introduction......................................................................................................................................4
Definition of intent and rationale of the policy...............................................................................4
Responsibilities of the individuals...................................................................................................5
The scope of the policy....................................................................................................................7
Conclusion.......................................................................................................................................7
REFERENCES................................................................................................................................9

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management
|7
|1140
|279

Security Access Policy Plan and Risk Assessment for Healthcare Organization and Facebook
|12
|2961
|377

Plan, Develop and Manage a Security Policy and Risk Assessment
|8
|2011
|467

Developing System Access Security Policies for Healthcare Organizations
|13
|3040
|271

SheeNoar Technological University’s IT Standards and Practices
|9
|1766
|380

Security Policy and Risk Assessment
|8
|2348
|24