logo

Assignment on Foundation of Computer Security

   

Added on  2022-08-27

9 Pages2007 Words18 Views
Running head: FOUNDATION OF COMPUTER SECURITY
FOUNDATION OF COMPUTER SECURITY
Name of the Student
Name of the University
Author Note
Assignment on Foundation of Computer Security_1
1FOUNDATION OF COMPUTER SECURITY
Discussions
The policy of information security is a sequence of regulations and rules those are enacted
by any organization in order to ensure that all the end users or the networks of the structure of
IT within the domain of the company abide by the prescriptions relating to the data security
digitally within the borders that the company maps its authority.
1. Scope
The scope of the policy of information security concerns to all the members of the Gold
Star Company and the others that handle the information of the company including the
employees, developers, consultants and the stakeholders of the company (Peltier, 2016). The
policy associates to the information those are managed or associated in the Gold Star
company whether is stored or processed utilising the facilities of the company including the
devices, computers, networks and the equipments owned by the company
2. Objectives
The purpose of this policy of information security is to define the requirements and the
rules in order to connect to the network of the Gold Star Company and systems from any
host. The regulations and rules are devised in order to reduce the exposure to employees,
developers, consultants, vendors and the other members of the Company as well as the
company itself from any kind of damages and that can result from the unauthorized
utilization of the resources of the Gold Star Company (Muller and Lind, 2020). The critical
damages consists of but they are not restricted to the loss of confidential or important data,
intellectual property, harm to the internal systems of the company and other liabilities those
are financial that could be acquired due to these damages.
Assignment on Foundation of Computer Security_2
2FOUNDATION OF COMPUTER SECURITY
3. Legislation and Other Policy
The legislation that is associated to the policy of information security of the Gold Star
Company is the Data Protection Act and Computer Misuse Act.
The Data Protection is an act of United Kingdom that was passed in the year 1988. The
Act was devised to control the way various information of the customers is used by various
companies and the government (Manton, 2019). It safeguards people and puts down
regulations about the way the data of people can be utilised.
The eight principles of the Data Protection Act include:
Fair and lawful
Particular for its objectives
Be adequate and only for what is required
Accurate and up to date
Not kept longer than required
Take into account the right of people
Kept secure and safe
Not to be transmitted outside EEA
The Computer Misuse Act was devised in the year 1990. The Computer Misuse Act
safeguards the personal data that is held by companies from modification and unauthorized
admittance (Karagiannopoulos, 2016). This refers to accessing a system of computer without
permission and unauthorized access to systems of computer with the purpose in order to
execute a crime.
The three principles of Computer Misuse Act include:
Unauthorized admittance to computer material
Assignment on Foundation of Computer Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer law Crime and Investigation Report 2022
|5
|733
|26

Professional Issues, Ethics and Computer Law : Wikileaks
|8
|2470
|153

Digital Forensics
|4
|752
|155

Information Security: CIA Triad, ATM Security, Biometric Authentication, Caesar Cipher
|13
|2577
|292

Aligning Security with Business Objectives of Banking Industry
|8
|1948
|473

Security Presentation and Guidebook - IT Security
|10
|1587
|18