logo

Security Policies

   

Added on  2023-04-04

5 Pages1042 Words435 Views
 | 
 | 
 | 
Running HEAD: SECURITY POLICIES 1
Security Policies
Name
Code
Course
Date
Security Policies_1

SECURITY POLICIES 2
Task 1: Identify potential sections of a basic network security policy.
It is very important for any organization to consider carefully the guiding principles in
any sector of their work. All the systems of a company should be characterized by a certain set of
standard that defines the bounds (Ciampa, 2012). There should be defined principles that dictate
how far one can access what in the system. When there are no basic security tools put in place
the staffs can mishandle the controls they are not supposed just because there is no regulation
that is put in place (Cimbala, n.d.). In this matter, it is paramount to outline the basic
components that form the security policy that can be adopted in the implementation of the
network system in the company. The following facets form the security program that can be
adapted to any premise to guide it in any time and situation (Fabbri & Volpe, 2013). Purpose
forms the foundation of all the components which defines the objectives that a company may be
geared towards. The major components that are found in this program help to guide the
organization in all perspectives. In the instances where the systems put in place may be
inconsistent, how can they be alleviated to ensure consistencies in the production of the correct
output as needed for decision making (Fischer, 2012) .The second component of this program is
scope which gives a direction on the boundaries the organization has in terms of the staffs they
have, the technologies they are using and to which extent are they incorporated in the general
affairs of the company.
The third important component to be put in place is how the responsibilities are
dispatched among the employees. This is one of the most intrinsic segments of the security
program for each and every individual is always aware of the position he or she is supposed to
pursue in the organization. In matters of the current problem in the organization, this would help
define what each and every member should do (Kotenko & Skormin, 2012). The fourth aspect is
actually awareness that is concerned with informing the staffs and the stakeholders on their part
as a well. Reminding them of the fundamental issues they need to understand in the general
services. Finally compliance as a part of the security program lies at the foundation of all the
issues, in case one of the staffs violates the principles laid he can be convicted (McClure,
Scambray & Kurtz, 2012). It helps in the implementation of the entire security program of the
organization.
Task 2: Create security policies for two of the sections you have listed.
Security Policies_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Implementation Plan for Verbania
|6
|1141
|19

Security Awareness Program | Cyber Security
|6
|1469
|50

Principles of Case Management
|13
|2945
|119

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Importance of HTTPS in Website Security
|37
|6568
|166

Security Policy and Recommendations for Dealing with Cyber Crime
|7
|1182
|64