logo

CIS5205 - Security Policy | Information Security Threats Report

Analyzing information security vulnerabilities and threats, determining appropriate controls, and effectively communicating about information security management in organizations.

14 Pages3431 Words70 Views
   

University of Southern Queensland

   

Management of Information Security (CIS5205)

   

Added on  2020-03-04

About This Document

The main objective of this report is to analyse information security threats and vulnerabilities and to determine appropriate control measures to reduce or remove such security risks. This report sets a list of guidelines for Internet Usage Policy for an organization. The guidelines will help the employees and the staff members of an organization to understand the importance of the mentioned policy as well as the limitations of such policies. It includes - software licence, review of public information and managing the corporate image.

CIS5205 - Security Policy | Information Security Threats Report

Analyzing information security vulnerabilities and threats, determining appropriate controls, and effectively communicating about information security management in organizations.

   

University of Southern Queensland

   

Management of Information Security (CIS5205)

   Added on 2020-03-04

ShareRelated Documents
Running head: SECURITY POLICYSecurity PolicyName of the StudentName of the UniversityAuthor’s Note:
CIS5205 - Security Policy | Information Security Threats Report_1
1SECURITY POLICYExecutive SummaryThe main objective of this report is to analyze information security threats and vulnerabilitiesand to determine appropriate control measures to reduce or remove such security risks. Threatsof an information security system are the probable danger that can misuse the security, breachthe confidentiality, and finally cause harm to it. Security policy is the policy that is maintainedby all organizations to keep the security and the confidentiality of the information and theimportant data of the company. The employees are bound to follow all the rules that arementioned in the security policy. It addresses the limitations and the constraints on the conductof the employees for a particular organization. These constraints include the behavior of theemployees as well as the usage of any organizational resources. The following report covers theInternet Usage Policy of an organization. The policy clearly mentions the usage, the limitationsof usage of that particular policy. The report sets a list of guidelines of Internet Usage Policy foran organization. The guidelines will help the employees and the staff members of anorganization to understand the importance of the mentioned policy as well as the limitations ofsuch policies.
CIS5205 - Security Policy | Information Security Threats Report_2
2SECURITY POLICYTable of ContentsIntroduction..........................................................................................................................3Discussion............................................................................................................................3Security Policy.................................................................................................................3Internet Usage Policy.......................................................................................................4Internet Access.............................................................................................................5Allowed Usage.............................................................................................................6Personal Usage.............................................................................................................6Prohibited Usage..........................................................................................................6Software License.........................................................................................................8Review of Public Information.....................................................................................9Monitoring...................................................................................................................9E-mail Confidentiality.................................................................................................9Maintaining Corporate Image....................................................................................10Conclusion.........................................................................................................................11References..........................................................................................................................12
CIS5205 - Security Policy | Information Security Threats Report_3
3SECURITY POLICYIntroductionSecurity policies are set of instructions or rather can be referred to as rules of a particularorganization that help the employees to understand the basic constraints of an employee. InternetUsage Policy is the policy that describes about the guidelines and rules of the suitable utilizationof the organization’s network, equipment, andaccess to internet (Wall, Palvia and Lowry 2013).The Internet Usage Policyis the chief certificate that is signed by all staff members andemployees before starting their work in the organization. Violation of these policy norms can endthe employee or staff member in prison or he can be penalized. The report outlines the usage and the limitations of Internet Usage Policy of a particularorganization. This report clearly defines about the guidelines and the rules of the Internet UsagePolicy. It also covers a brief overview, the purpose and the scope of this particular policy. Thereport also specifies the penalty and the legal actions that are to be taken if there is any kind ofviolation in the policy. The policy mentions the authorized and the prohibited users. The reportalso emphasizes on the confidentiality of the information of this Internet Usage Policy. Thedescription of the discussion is given in the following paragraphs.DiscussionSecurity PolicySecuritypolicycan be defined as the set of norms or guidelines, which state the securityof information or data for a system, company or organization. This policy helps the employees ofthe organization to understand the rules of the organization and so that there is no violation of
CIS5205 - Security Policy | Information Security Threats Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet Usage Policy Assignment | BIT-200
|7
|2581
|625

Information Security Management Policy for Cosmos
|11
|2588
|436

Advanced Network Security
|6
|1027
|376

Issue Specific Security Policy
|11
|2966
|146

Managing Information Systems Issues 2022
|3
|394
|13

INFORMATION SECURITY POLICY.
|3
|369
|54