IT Security Policies: Vulnerable Products and Policy Compliance

Verified

Added on  2023/04/20

|5
|546
|389
Report
AI Summary
This report focuses on the IT security policies of an IT organization, emphasizing the need to protect vulnerable IT products such as software and applications hosted on servers susceptible to cybersecurity threats like WannaCry ransomware. It identifies threats originating from both internal employees and external sources, highlighting the importance of securing data circulated within the organization and products delivered to clients through secured networks. The report outlines specific policies, including restricting network access to authorized employees, regularly updating user and admin panels with security patches, maintaining product privacy with third-party associations, and managing device ownership using QR codes. Subsidiary policies cover network password maintenance, software and hardware networking, and email usage to prevent phishing, SQL injection attacks, ethical hacking, and malware. The conclusion underscores the significance of these policies in addressing cybersecurity challenges and mitigating threats from both internal and external sources, thereby ensuring the organization's growth and development. Desklib offers a wealth of similar resources for students.
Document Page
Running head: IT SECURITY POLICIES
IT security policies
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2IT SECURITY POLICIES
Table of Contents
1 Introduction.......................................................................................................................3
2 Goal of the organization...................................................................................................3
2.1 Vulnerable products...................................................................................................3
2.2 Policies.......................................................................................................................3
2.3 Subsidiary Policies.....................................................................................................4
3 Conclusion........................................................................................................................4
4 Reference..........................................................................................................................5
Document Page
3IT SECURITY POLICIES
1 Introduction
The foremost determination of the paper is to focus on the IT security policy of an
IT organization.
2 Goal of the organization
The foremost determination of the IT organization is to provide IT products such
as software and application to their customers. The IT products are given on the servers
which are vulnerable to different categories of cybersecurity issues such as the Wanna
Cry Ransomware, hence there is a need for maintaining IT security policy so that the
growth and development of the organization is maintained.
2.1 Vulnerable products
Threats coming from the employees as well as from the outsiders are both
considered as a threat for the cybersecurity threats (Safa, Von Solms & Furnell, 2016).
The IT products which are vulnerable to the cyber threats are the products which are
delivered to the clients via the secured networks as well as the data circulated in the
working environment of the organization.
2.2 Policies
Only the authorized employees of the organization should be using the official
network and the information systems of the organization.
The user panel and the admin panel of the official portal should be frequently
updated with the latest security patches.
Document Page
4IT SECURITY POLICIES
Right to privacy of the products and services should be maintained by all the
third-party association of the organization.
Ownership of the organization devices should be maintained by the facility team
with special QR codes (Biscop, 2016).
2.3 Subsidiary Policies
The network password policy should be maintained be all the stakeholders of the
business.
The software and the hardware networking policy should be maintained by both
the clients as well ass all the employees of the organization.
The email usage policy which secures the network from the unwanted
vulnerabilities such as the phishing attacks, SQL injection attacks, ethical hacking
and malware attacks should be maintained by the employees as well.
3 Conclusion
The paper was helpful to understand the different categories of threat which have
a negative impact on an IT organization. The paper also focuses in the policies and the
subsidiary policies which helps the IT organizations to deal with the cybersecurity issue
such as the threats coming from the internal environment of the organization such as the
threat to the data as well as the threats from outside the organization such as the SQL
injection attacks.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5IT SECURITY POLICIES
4 Reference
Biscop, S. (2016). The European security strategy: a global agenda for positive power.
Routledge.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance
model in organizations. Computers & Security, 56, 70-82.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]