Professional Writing on "Analyzing the Cyber Security"

Professional Writing 8 pages (2510 words) Sources: 6

[EXCERPT] . . . .

In particular, any issued and used passwords ought to be strong, regularly updated and should not be shared at any given time. In addition, any policies that concern the installation and utilization of external software ought to be communicated. Another aspect is that if there are any personal devices, for instance, laptops, smartphones and tablets, which access the network, they ought to be organized and aligned to do it in a safe manner, which can be undertaken easily with a consistent and dependable Mobile Device Management (MDM) solution (Lloyd, 2015).

2. Communications Policy

The use of the company email as well as internet resources will be delineated for the purposes of legal and security measures. There will also be the restriction of data transfers and in addition, requirements will be set for the distribution or transference of digital files internally and externally from the network. There will also be the definition of specific guiding principles with regard to personal internet use, instant messaging and social media. If the company will reserve the right to observe and monitor all communications conveyed through the network, or any sort of information stored and warehoused on systems owned by the company, then it will be set in this policy (Lloyd, 2015).

3. Privacy Policy

Another aspect of the security plan is the privacy policy. Limitations will be set on the sharing and distribution of patented and copyrighted company information or the replication and stealing of data (Lloyd, 2015).

4. Unfitting and Inapt Use

Without doubt, any use or utilization of the network or comp
Continue scrolling to

download full paper
any-owned system or device to dispense viruses, hack systems, or take part in criminal doings is prohibited with the penalties and punishments clearly pointed out. Another aspect is that any website that personnel are not able to visit should be acknowledged if not all in all gridlocked and constrained. For example, an employee going to websites and downloading a whole season of a TV shows or different movies from a Bit Torrent site is not a tolerable and suitable utilization of the firm's internet resources (Lloyd, 2015).

It is imperative for each personnel to know and master these policies and comprehend the business and legal inferences and effects behind them. In addition, the company will also make certain that these policies are apparent and apprehended by all and sundry and most significantly, stringently enforced.

The Design of a Code of Ethics Related to the IT Profession to Be Applied at The Company

Every professional within an organization is mandated to abide by ethics so as to make way for the execution of effective and proper services and also safety to the consumers or the general public as a whole (Koehler and Pemberton, 2000). It is a mandate for all professionals to be fully cognizant of the ethical duties and accountabilities that are linked to their work positions. A code of ethics can be delineated as an agreed upon organizational policy that is employed in business organizations (Koehler and Pemberton, 2000). In particular, it sets the minimum or least standards for managers and personnel to follow and adhere to when implementing different business functions (Koehler and Pemberton, 2000). The following are some of the IT code of ethics applicable to the company:

1. Having a confidential relationship with the consumers or individuals being served.

2. Conducting business operations in a way that offers assurance and guarantee that the IT profession is deemed to be one of professionalism and integrity.

3. Having a high and great standard of skill and knowledge.

4. Public dependence upon the standards of conduct and recognized practice.

5. Represent and epitomize themselves in such a manner that every one of them maintains and espouses the fidelities, integrity and respect that his duties and responsibilities involve (Koehler and Pemberton, 2000).

6. Take into account the constitutional and civil rights of each individual.

7. Make sure there is compliance with the laws of the nation and the code of behavior laid out by the organization (Quinn, 2014).

8. Demonstrate behavior and action that is not only proficient, but also one that is impartial. The personnel are not allowed to permit the manifestation of hostility, emotion and predeterminations in manipulating decisions.

9. Demonstrate good morals at all times. Individuals are not allowed to use any of the organizational departments for any gains or special favors.

10. Exhibit high esteem of preference of the department and knowledge received on persons within the departments (Koehler and Pemberton, 2000).

11. Enforce and carry out duties in a correct and polite manner.

12. Self-control and restraint is to be used at all times (Weckert and Lucas, 2013).

The aforementioned codes and policies will be adhered to at all times and constantly reminded to the professionals and personnel. The enterprise will acknowledge and espouse the code of conduct as a guide for appropriate deeds by their personnel. In conclusion, ethics is an aspect that ought to be emphasized and shed light on. The delineated code of ethics above indicates the policies that the members of the organization will follow and adhere to. In numerous instances, the personnel should be handed a copy of the code of ethics in order to go over and also remember them.

References

Biba, K. J. (1977). Integrity considerations for secure computer systems (No. MTR-3153-REV-1). MITRE CORP BEDFORD MA.

Brewer, D. F., & Nash, M. J. (1989, May). The Chinese wall security policy. In Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on (pp. 206-214). IEEE.

Harris, S. (2013). Certified Information Systems Security Professional All-in-One Exam Guide. NY.

Koehler, W. C., & Pemberton, J. M. (2000). A Search for Core Values: Towards a Model Code of Ethics for Information Professionals. Journal of Information Ethics, 9(1), 26-54.

Landwehr, C. E. (2003). Formal Models for Computer Security. Naval Research Laboratory.

Lloyd, M. W. (2015). 4 Key Components of a Robust Security Plan Every SMB Must… READ MORE

How to Reference "Analyzing the Cyber Security" Professional Writing in a Bibliography

Analyzing the Cyber Security.” A1-TermPaper.com, 2016, https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204. Accessed 6 Jul 2024.

Analyzing the Cyber Security (2016). Retrieved from https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204
A1-TermPaper.com. (2016). Analyzing the Cyber Security. [online] Available at: https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204 [Accessed 6 Jul, 2024].
”Analyzing the Cyber Security” 2016. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204.
”Analyzing the Cyber Security” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204.
[1] ”Analyzing the Cyber Security”, A1-TermPaper.com, 2016. [Online]. Available: https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204. [Accessed: 6-Jul-2024].
1. Analyzing the Cyber Security [Internet]. A1-TermPaper.com. 2016 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204
1. Analyzing the Cyber Security. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/looking-cyber-security/8708204. Published 2016. Accessed July 6, 2024.

Related Professional Writings:

Analyzing the Cyber Security Phenomenon Essay

Paper Icon

Dean, who equally has some accounting background, made more than 10-K records for Sony SNE 2.83%, Target TGT 0.84% and Home Depot HD 1.49%, after their new well-advertised security breaches.… read more

Essay 6 pages (2266 words) Sources: 6 Topic: Philosophy / Logic / Reason


Analyzing Airport Security Improvements Essay

Paper Icon

In addition, the cyber security systems ensure that the airport systems are secure and that confidential information within the airport network is safeguarded (Subramanian, 2015).

iii. Potential Negatives

However, the… read more

Essay 3 pages (942 words) Sources: 3 Topic:


Consumer and the Law Term Paper

Paper Icon

Identity theft is something that occurs in the United States on a daily basis. Identity theft occurs when someone's personal information is stolen and is used by the criminal to… read more

Term Paper 5 pages (1500 words) Sources: 1 Topic: Crime / Police / Criminal Justice


Analyzing 501St Strategic Analysis Essay

Paper Icon

Thus, a well-planned strategy is needed. Colonel Cullen gave a very vague description of this strategy in his interview. ERI (European Reassurance Initiative -- an Obama- administration initiative for European… read more

Essay 7 pages (2232 words) Sources: 4 Topic:


Legislative Critique of the Homeland Security Act of 2002 Article Critique

Paper Icon

Boat

Legislative Critique of the Homeland Security Act of 2002

The Homeland Security Act (HSA) of 2002 was passed in response to the September 11, 2001 attacks on the United… read more

Article Critique 10 pages (2865 words) Sources: 8 Topic: Terrorism / Extremism / Radicalization


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!