logo

The Information security management

   

Added on  2022-07-28

14 Pages3084 Words27 Views
 | 
 | 
 | 
Information security management 1
Information security management: information security policy
Student’s name
Course
Name of the professor
Date
The Information security management_1

Information security management 2
Executive summary
This report is discussing the operations and considerations that are undertaken in the
designing of a suitable information security policy system. It starts by giving a brief introduction
to information security, the reasons for protection, and the consequences that an organization can
face if the protection is not done. The body consists of the discussions of all steps that are
involved in the designing and implementation of the information security system.
The Information security management_2

Information security management 3
Contents
Introduction......................................................................................................................................4
Discussion........................................................................................................................................5
Risk analysis................................................................................................................................5
Information security development policy....................................................................................6
System protection.........................................................................................................................6
Virus protection........................................................................................................................7
Installation of software.............................................................................................................7
Internet threats..............................................................................................................................8
Web browsing...........................................................................................................................8
Use of email..............................................................................................................................8
Instant messaging software......................................................................................................8
Downloading............................................................................................................................9
Violation of the security policy.......................................................................................................9
Revising the policy........................................................................................................................10
Policy implementation...................................................................................................................10
Conclusion.....................................................................................................................................11
Bibliography..................................................................................................................................12
The Information security management_3

Information security management 4
Information security management
policy
Introduction
Since the development of computer networks, there have been growths in the interest of
people who seek to exploit the networks. There before, the reasons to do such exploits were non-
malicious and for learning purposes. This has changed so much as many individuals, such as
hackers nowadays seek to break into computer networks for various reasons. Some of the
reasons people may want to intrude into a computer network include: firstly, many people may
want to steal and leak information about an organization’s customers, internal employees or even
personal data for this specific organization (Xu et al., 2014). There are times hackers get into the
network to steal information in order to impersonate someone and use it for something else such
as transferring money, taking loans in the cases of internet banking. On to the second reason,
some hackers get into an organization's computer networks just to disturb services and leave a
statement on the website to scare the organization on network security. These hackers may create
a lot of bots that overpower the server with traffic and may lead to a crash. In other cases, they
may infect a large network with malicious software with the ultimate effect of the whole
network. The last final reason here is the need for money. Some hackers are breaking into
computer networks and ask for money so that they may not leak or interfere with the entire
system (Soomro, Shah, & Ahmed, 2016). Whenever online or mobile banking is involved, they
divert transactions or use the opportunity to transfer money to other accounts they own.
In many cases, many organizations only rush into a reaction after their systems have been
damaged or information leaked. Because of the reasons outlined above and many more, there is
The Information security management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents