Ask a question from expert

Ask now

Computing Security Policy Introduction

19 Pages7632 Words51 Views
   

Added on  2020-11-23

About This Document

COMPUTING SECURITY INTRODUCTION 1 TASK 12 Security Policy of Bright Level Holding LLP 2 Information security policy 2 New security polices of BLH 3 TASK 210 Detail discussion of different situations 10 CONCLUSION 15 References 1 INTRODUCTION Computer security can be defined as a proper safety system which protects a computer from various damages, malfunctioning and from hackers as well. It is needed because, not only individual employees or departments which stays accountable for security for keeping the data secured but it is also

Computing Security Policy Introduction

   Added on 2020-11-23

BookmarkShareRelated Documents
COMPUTING SECURITY
Computing Security Policy Introduction_1
Table of ContentsINTRODUCTION...........................................................................................................................1TASK 1............................................................................................................................................2Security Policy of Bright Level Holding LLP ......................................................................2Information security policy....................................................................................................2New security polices of BLH.................................................................................................3TASK 2..........................................................................................................................................10Detail discussion of different situations...............................................................................10CONCLUSION..............................................................................................................................15References........................................................................................................................................1
Computing Security Policy Introduction_2
INTRODUCTIONComputer security can be defined as a proper safety system which protects a computerfrom various damages, malfunctioning and from hackers as well. Computing security can also beknown as cybersecurity, or information technology security (IT security). It is needed because,not only individual employees or departments which stays accountable for security for keepingthe data secured but it is also required for a company to focus on safety reasons (Ahmed andSaeed, 2014). It is duty of top administrators, who are charged with protecting the institution'sbest interests, to ensure that an appropriate and effective security policy is developed and put intopractice throughout the organization.In modern world, organisations and public uses computers for different purposes which isdirectly enhancing reliance of these kind of systems. Apart from this, these also stays enclosedwith different wireless networks, like Bluetooth, Wi-Fi, infrared and so on. These connectionshave created ample number of security concerns. Considering complexity, both in terms ofpolitics and technology, it has become much more challenging in contemporary world because itis filled with huge number of ethical hackers that keeps their eye on stealing the data for differentpurposes. In present report, AmpSpire Solutions Ltd. which is the sister organisation of BrightLevel Holdings LLP is going to keep its focus on developing 2018 annual review of the BLHsecurity policies. If it is talked about BLH, it consists with 230 employees and performs on aregular basis as per the requirements of clients. Company's headquarter is in north west ofEngland, United Kingdom. Since BLH is performing its operations at international level theyhave to give services to its clients 24*7. Apart from this, organisation have also made apermanent security presence for its employees where they have to use ID card while executingthe work and security personnel keeps an eye on it. On the other hand, this organisation'smanagement team is looking forward to bring change among existing security based policieswhich will directly aid them in improvising all the safety concerns. Away with this, report isgoing to be enclosed with a brand new security policy so that it can meet requirements of BrightLevel Holdings LLP.
Computing Security Policy Introduction_3
TASK 1Security Policy of Bright Level Holding LLP Privacy policy is important in an organisation to protect the information related to clients andinternal information of BLH. The consultancy company can't be transparent, they have to securetheir information. So, for that they are required to build an effective and secure security policy. Itis essential to have strong and stable empowering of IT team. Security policy of Bright LevelHolding LLP :Information security policyThe information related to client and companies have to secure. The information securitypolicy of BLH is a systematized information document that provides the protection to theclient information and protect the strategy were framed for the organisation (Ahmed, andHossain, 2014). The security also safeguard the digital access of a company. BLH haveinternational clients as well so they required to have shield in digital part. BLH is aconsultancy company, their work is to provide direction and advice to private andgovernment clients. Their projects were delicate and sensitive. BLH have ID card control access building while entering or leaving the premises. This isbecause they have 24/7 working hours. Due to gracious security construction they havestrong reputation in the market. Some information of clients are collected directly from them and some are form othersources like internet search, third party, and information collected what plans and strategythe client had made for their company. The data BLH collected will use moderately andlegally. BLH have the policy that employee can work at client land site as well. For that companyprovides mobile phone and laptop to them. But due to security function BLH have theirown sites. Infect employee are not allowed to search or visit any other site either in officeor somewhere else.BLH provide the exact security measures to assist the client data. Security measures donethrough operations and technology (Bajpai, and Srivastava, 2014). The information which is collected directly will identifies the individual personality, theinformation can combination of direct or indirect or the signal information. The personal
Computing Security Policy Introduction_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Sample Assignment on Cyber Security PDF
|7
|1273
|365

BBE105 - Total Building Performance report
|27
|5581
|137

Challenges to Protection of Individual Privacy and Intellectual Property in Digital Systems
|10
|3547
|348

Information and Communication Technology
|4
|901
|306

Planning and Formulation of Security Policy for Royal Melbourne Hospital
|12
|3310
|420

Importance of Educating Employees on Security Matters in Information Systems
|4
|811
|371