IT Security Policy

   

Added on  2023-01-18

6 Pages1484 Words28 Views
Running head: IT SECURITY POLICY
IT SECURITY POLICY
Name of Student
Name of University
Author’s Note
IT Security Policy_1
1IT SECURITY POLICY
Introduction
A policy usually means a particular document which defines the way a specific
organization details with various aspects of security of the most important asset, information
(Peltier, 2016). The policies might vary in nature as well as operations, some policies might be
regarding the behavior of end user, the response of IT to various incidents, policies can also be
designed for various incidents and issues. Some user policies include passwords, use of internet,
and attachments in email, instant messaging and many more (Safa, Von Solms & Furnell, 2016).
Some system admin policies include new policies, departing employees, access control, change
control and many more.
Discussion
An IT security policy is responsible for outlining the key items in a particular
organization which requires to be protected. This can include the network of the company, its
building and many more. The policies should outline various potential threats to the items (Han,
Kim & Kim, 2017). If the policy focuses on cyber security, threats might also include those that
form the inside like possibility which disgruntled various employees. This would help in sealing
data or have the chance to launch a particular internal virus on the network of the company.
Designing a policy is very important because hackers that do not belong to the company might
penetrate the organization’s system as well as cause breach of data, change the saved data and
sometimes steal it as well. The physical damage to the computer systems might also take place.
The implementation of policies helps an organization in determining the ways by which they can
prevent these threats (Larivé, 2016). Instituting various policies along with the strong network
and physical security might be some safeguards. In order to design a security policy, it is
necessary to make a plan for what needs to be done when a threat materializes.
IT Security Policy_2
2IT SECURITY POLICY
The policy of security must be provided to everyone in the organization. Along with this,
the process of safeguarding the data must be reviewed on a regular basis and is updated when
new people are boarded for various purposes (Kuypers, Maillart & Pate-Cornell, 2016). The
security policies strictly consider the fact that the details regarding a particular user would not be
accessed by other users until and unless it is actually required. Besides this when new users are
added the user accounts also need to be added and along with a member’s dismissal the account
needs to be deleted or disabled depending on the type of dismissal (Biscop, 2016). In case the
dismissal is temporary in nature, the account is not removed but disables so that no other user
can use it and in case of permanent dismissal, the account is permanently deactivated.
The specialized student scenario that has been selected for this particular purpose is a
student who is leaving. The steps that can be used in order to design the policy are as follows
Step 1: IT security polices for handling use accounts or rights for a student. IT security
deals with protecting various computer systems from a damage or theft related to information,
software, hardware and misdirection for various services that they provide.
Step 2: one of the policies related to security that IT provides includes user/rights. The
policies which can be written for the purpose of handling various user accounts are protection of
user accounts, expiry as well as deletion of the user account, responsibilities of user accounts,
user accounts should reside within the particular system that has been authorized by the team of
IT (Hoffmann, Kiedrowicz & Stanik, 2016). The user accounts as well their access should agree
to the condition of the use that has been put forward by the department of IT.
The IT policies which would be applicable in case a student leaves prematurely are as
follows
IT Security Policy_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Policies for Mitigating Attacks
|7
|1260
|475

IT Security Policy
|8
|1800
|89

IT Security Policy Analysis
|5
|922
|108

Information Security: The Royal Children's Hospital
|11
|3171
|107

Under Armour Data Breach
|5
|761
|381

Network Security Issues and Security Model
|11
|1603
|450