logo

IT security policy

   

Added on  2022-11-24

8 Pages1468 Words450 Views
Running head: IT security policy
IT security policy
Name of the Student
Name of the University
Author Note

IT security policy 1
Table of Contents
Introduction:...............................................................................................................................2
Information security:..............................................................................................................2
Confidentiality:..................................................................................................................2
Integrity:.............................................................................................................................2
Availability:........................................................................................................................2
Data loss Prevention:..............................................................................................................3
Protection of computer from virus infection:.............................................................................3
Security Policies for staffs:........................................................................................................4
Using CD/Floppies/Flash drives:...........................................................................................4
Password:...............................................................................................................................4
Back up:.................................................................................................................................4
Departmental policies:...............................................................................................................4
Role of the System Administrator in Virus Protection:.............................................................5
Policies for audit:.......................................................................................................................5
References:.................................................................................................................................7

IT security policy 2
Introduction:
Information security:
The information security policies are the corner stone of the effectiveness of the
information security. The security related policies are intended for defining what needs to be
expected from the organisation with respect to the information system security (Safa, Solms
& Furnell, 2016). The entire objective is for controlling or guiding the behaviour of human in
an attempt for reducing the risks that are related to the information assets by deliberate or
accidental actions. The policies of Information security underpin the well being as well as the
security of the resources of information (Dalby, 2016). There are three aspects of the
information security, they are as follows:
Confidentiality:
Protect the data and information from the discloser who are not authorised such as to
the press or those who are not titled for having the same.
Integrity:
Protect the data and information from modification that are not authorised as well as
ensuring that the data and information like the list of beneficiaries may be accurate as well as
relied upon and complete (Crossler et al., 2013).
Availability:
Ensure the data and information is having availability whenever it will be needed. The
data and information can be held in many of the various areas, some of them are as follows:
Network Servers
Personal Computers and Workstations
Laptop and Handheld PCs

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware Virus: Types, Analysis, and Prevention
|14
|3926
|1

Disaster Recovery Plan - IT/Email TASKS
|6
|897
|396

Malware Analysis Assignment PDF
|29
|6377
|378

Malicious Software Protection Policy: Articles Review
|6
|1223
|414

CHAPTER FIVE 4 Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Ant
|14
|2481
|157

Manage Network and Data Integrity
|62
|2549
|302