Term Paper on "Security Policy"

Term Paper 4 pages (1313 words) Sources: 4

[EXCERPT] . . . .

Computers and the Internet

Security Policies

Even though the significance of information security for businesses is more and more recognized, the difficulty of issues involved means that the size and shape of information security policies may differ widely from company to company. This may depend on a lot of factors, including the size of the company, the sensitivity of the business information they own and deal with in their marketplace, and the numbers and types of information and computing systems they use. For a large company, developing a single policy document that speaks to all types of users inside the organization and addresses all the information security issues necessary may prove impossible. "A more effective concept is to develop a suite of policy documents to cover all information security bases; these can be targeted for specific audiences, making a more efficient process for everyone" (Information Security Policy - A Development Guide for Large and Small Companies, 2007). This paper examines four different security policies that need to be considered when developing and maintaining a good overall information security policy.

Wireless Communication Policy

The purpose of this policy is to secure and protect the information assets owned by a company. Companies provide computer devices, networks, and other electronic information systems in order to meet missions, goals, and initiatives. Companies grant access to these resources as a privilege and must manage them responsibly to maintain the confidentiality, integrity, and availability of all information assets. This policy specifies the conditions that wireless infrast
Continue scrolling to

download full paper
ructure devices must satisfy to connect to the company's network. Only those wireless infrastructure devices that meet the standards specified in this policy or are granted an exception by the Information Security Department are approved for connectivity to the company's network (Wireless Communication Policy, n.d.).

Workstation Security Policy

The purpose of this policy is to provide guidance for workstation security for any company's workstations in order to make certain the security of information on the workstation and information the workstation may have access to. "Additionally, the policy provides guidance to ensure the requirements of the HIPAA Security Rule "Workstation Security" Standard 164.310(c) are met. This policy applies to all employees, contractors, workforce members, vendors and agents with a company -owned or personal-workstation connected to the company's network. Appropriate measures must be taken when using workstations to ensure the confidentiality, integrity and availability of sensitive information, including protected health information (PHI) and that access to sensitive information is restricted to authorized users" (Workstation Security Policy, n.d.).

Internet usage Policy

The Internet usage Policy applies to all Internet users or people working for the company, including permanent full-time and part-time workers, contract workers, temporary agency workers, business partners, and vendors who access the Internet through the computing or networking resources. The company's Internet users are anticipated to be familiar with and to conform to this policy, and are also required to use their general sense and exercise their good judgment while using Internet services (Internet usage Policy, n.d.).

Server Audit Policy

The purpose of this policy is to ensure all servers deployed at a company are configured according to the company's security policies. Servers deployed at the company shall be audited at least annually and as prescribed by applicable regulatory compliance. Audits may be conducted to:

Ensure integrity, confidentiality and availability of information and resources

Ensure conformance to company security policies

This policy covers all servers owned or operated by the company. This policy also covers any server present on the company's premises, but which may not be owned or operated by the company. Servers in use for the company support critical business functions and store company sensitive information. Improper configuration of servers could lead to the loss of confidentiality, availability or integrity of these systems (Server Audit Policy, n.d.).

Discussion

In today's high-tech and interconnected world, every corporation needs a well developed security policy. Threats exist from both within the walls of each company as well as from… READ MORE

Quoted Instructions for "Security Policy" Assignment:

Please wright four-page paper comparing and contrasting the four selected policies, attached.

Please use authoritative sources.

Thank you. *****

How to Reference "Security Policy" Term Paper in a Bibliography

Security Policy.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/computers-internet-security/5068237. Accessed 3 Jul 2024.

Security Policy (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/computers-internet-security/5068237
A1-TermPaper.com. (2012). Security Policy. [online] Available at: https://www.a1-termpaper.com/topics/essay/computers-internet-security/5068237 [Accessed 3 Jul, 2024].
”Security Policy” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computers-internet-security/5068237.
”Security Policy” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/computers-internet-security/5068237.
[1] ”Security Policy”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/computers-internet-security/5068237. [Accessed: 3-Jul-2024].
1. Security Policy [Internet]. A1-TermPaper.com. 2012 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/computers-internet-security/5068237
1. Security Policy. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computers-internet-security/5068237. Published 2012. Accessed July 3, 2024.

Related Term Papers:

Security Policy Term Paper

Paper Icon

Security Policy

IT Security Policy

The following security policy defines how strategic it resources and technologies are aligned to supporting organizational objectives and goals. Implicit in this security policy is… read more

Term Paper 4 pages (1080 words) Sources: 4 Topic: Computers / IT / Internet


Security Policy Dr. Fossett's Dental Office Term Paper

Paper Icon

Security Policy of a Dental Office

Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the… read more

Term Paper 3 pages (1254 words) Sources: 0 Topic: Computers / IT / Internet


Security Computer Security, Policy, and Procedures: Practical Essay

Paper Icon

Security

Computer Security, Policy, and Procedures: Practical Recommendations

The rapid pace of technological development, especially in the area of information and communication technologies, has led to many changes for businesses… read more

Essay 3 pages (802 words) Sources: 7 Topic: Computers / IT / Internet


Security Policies Given the Highly Sensitive Nature Essay

Paper Icon

Security Policies

Given the highly sensitive nature of the work at the company, what other actions might you add to this policy?

There are a number of different procedures that… read more

Essay 2 pages (749 words) Sources: 2 Topic: Computers / IT / Internet


Security Policy and Risk Strategy Essay

Paper Icon

Security Policy and Risk Strategy

Over the last several years, a variety of organizations have begun to implement various security and risk assessment protocols, to ensure that they are protected… read more

Essay 4 pages (1383 words) Sources: 2 Topic: Computers / IT / Internet


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!