Professional Writing on "Analyzing the Cyber Security"
Professional Writing 8 pages (2510 words) Sources: 6
[EXCERPT] . . . .
In particular, any issued and used passwords ought to be strong, regularly updated and should not be shared at any given time. In addition, any policies that concern the installation and utilization of external software ought to be communicated. Another aspect is that if there are any personal devices, for instance, laptops, smartphones and tablets, which access the network, they ought to be organized and aligned to do it in a safe manner, which can be undertaken easily with a consistent and dependable Mobile Device Management (MDM) solution (Lloyd, 2015).2. Communications Policy
The use of the company email as well as internet resources will be delineated for the purposes of legal and security measures. There will also be the restriction of data transfers and in addition, requirements will be set for the distribution or transference of digital files internally and externally from the network. There will also be the definition of specific guiding principles with regard to personal internet use, instant messaging and social media. If the company will reserve the right to observe and monitor all communications conveyed through the network, or any sort of information stored and warehoused on systems owned by the company, then it will be set in this policy (Lloyd, 2015).
3. Privacy Policy
Another aspect of the security plan is the privacy policy. Limitations will be set on the sharing and distribution of patented and copyrighted company information or the replication and stealing of data (Lloyd, 2015).
4. Unfitting and Inapt Use
Without doubt, any use or utilization of the network or comp
download full paper ⤓
It is imperative for each personnel to know and master these policies and comprehend the business and legal inferences and effects behind them. In addition, the company will also make certain that these policies are apparent and apprehended by all and sundry and most significantly, stringently enforced.
The Design of a Code of Ethics Related to the IT Profession to Be Applied at The Company
Every professional within an organization is mandated to abide by ethics so as to make way for the execution of effective and proper services and also safety to the consumers or the general public as a whole (Koehler and Pemberton, 2000). It is a mandate for all professionals to be fully cognizant of the ethical duties and accountabilities that are linked to their work positions. A code of ethics can be delineated as an agreed upon organizational policy that is employed in business organizations (Koehler and Pemberton, 2000). In particular, it sets the minimum or least standards for managers and personnel to follow and adhere to when implementing different business functions (Koehler and Pemberton, 2000). The following are some of the IT code of ethics applicable to the company:
1. Having a confidential relationship with the consumers or individuals being served.
2. Conducting business operations in a way that offers assurance and guarantee that the IT profession is deemed to be one of professionalism and integrity.
3. Having a high and great standard of skill and knowledge.
4. Public dependence upon the standards of conduct and recognized practice.
5. Represent and epitomize themselves in such a manner that every one of them maintains and espouses the fidelities, integrity and respect that his duties and responsibilities involve (Koehler and Pemberton, 2000).
6. Take into account the constitutional and civil rights of each individual.
7. Make sure there is compliance with the laws of the nation and the code of behavior laid out by the organization (Quinn, 2014).
8. Demonstrate behavior and action that is not only proficient, but also one that is impartial. The personnel are not allowed to permit the manifestation of hostility, emotion and predeterminations in manipulating decisions.
9. Demonstrate good morals at all times. Individuals are not allowed to use any of the organizational departments for any gains or special favors.
10. Exhibit high esteem of preference of the department and knowledge received on persons within the departments (Koehler and Pemberton, 2000).
11. Enforce and carry out duties in a correct and polite manner.
12. Self-control and restraint is to be used at all times (Weckert and Lucas, 2013).
The aforementioned codes and policies will be adhered to at all times and constantly reminded to the professionals and personnel. The enterprise will acknowledge and espouse the code of conduct as a guide for appropriate deeds by their personnel. In conclusion, ethics is an aspect that ought to be emphasized and shed light on. The delineated code of ethics above indicates the policies that the members of the organization will follow and adhere to. In numerous instances, the personnel should be handed a copy of the code of ethics in order to go over and also remember them.
References
Biba, K. J. (1977). Integrity considerations for secure computer systems (No. MTR-3153-REV-1). MITRE CORP BEDFORD MA.
Brewer, D. F., & Nash, M. J. (1989, May). The Chinese wall security policy. In Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on (pp. 206-214). IEEE.
Harris, S. (2013). Certified Information Systems Security Professional All-in-One Exam Guide. NY.
Koehler, W. C., & Pemberton, J. M. (2000). A Search for Core Values: Towards a Model Code of Ethics for Information Professionals. Journal of Information Ethics, 9(1), 26-54.
Landwehr, C. E. (2003). Formal Models for Computer Security. Naval Research Laboratory.
Lloyd, M. W. (2015). 4 Key Components of a Robust Security Plan Every SMB Must… READ MORE
How to Reference "Analyzing the Cyber Security" Professional Writing in a Bibliography
“Analyzing the Cyber Security.” A1-TermPaper.com, 2016, https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204. Accessed 6 Jul 2024.
Related Professional Writings:
Analyzing the Cyber Security Phenomenon Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Dean, who equally has some accounting background, made more than 10-K records for Sony SNE 2.83%, Target TGT 0.84% and Home Depot HD 1.49%, after their new well-advertised security breaches.… read more
Essay 6 pages (2266 words) Sources: 6 Topic: Philosophy / Logic / Reason
Analyzing Airport Security Improvements Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
In addition, the cyber security systems ensure that the airport systems are secure and that confidential information within the airport network is safeguarded (Subramanian, 2015).
iii. Potential Negatives
However, the… read more
Essay 3 pages (942 words) Sources: 3 Topic:
Consumer and the Law Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Identity theft is something that occurs in the United States on a daily basis. Identity theft occurs when someone's personal information is stolen and is used by the criminal to… read more
Term Paper 5 pages (1500 words) Sources: 1 Topic: Crime / Police / Criminal Justice
Analyzing 501St Strategic Analysis Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Thus, a well-planned strategy is needed. Colonel Cullen gave a very vague description of this strategy in his interview. ERI (European Reassurance Initiative -- an Obama- administration initiative for European… read more
Essay 7 pages (2232 words) Sources: 4 Topic:
Legislative Critique of the Homeland Security Act of 2002 Article Critique
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Boat
Legislative Critique of the Homeland Security Act of 2002
The Homeland Security Act (HSA) of 2002 was passed in response to the September 11, 2001 attacks on the United… read more
Article Critique 10 pages (2865 words) Sources: 8 Topic: Terrorism / Extremism / Radicalization
Sat, Jul 6, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!