Term Paper on "Security Policy"
Term Paper 4 pages (1080 words) Sources: 4
[EXCERPT] . . . .
Security PolicyIT Security Policy
The following security policy defines how strategic it resources and technologies are aligned to supporting organizational objectives and goals. Implicit in this security policy is the need for accountability, transparency and intensive use of reporting and analytics to track performance against objectives, in addition to compliance against industry and regulatory standards. Best practices in it security policy management requires the integration of analytics, compliance and reporting requirements within an it security policy and it supporting framework (Hone, Eloff, 2002). The intent of this security policy document is to provide prescriptive guidance to attain and surpass best practices in the areas of network, operational, organizational security, access control, cryptography, and compliance to laws and regulations.
Network Security Policy
Ensuring protection of all intellectual property and critical information assets including servers and mission-critical systems is the objective of the network security policy. The strategic it security plan of an enterprise must align to the strategic plan, supporting and accelerating key business functions and strategies to ensure their profitable attainment (Banks, 1990). At the center of the network security policy is the need for aligning auditing, analytics, reporting and compliance to specific requirements at the federal, regional and state level (Eloff, 1988). The intent of the network security policy is to combine the best practices in network management, reporting and analytics, and compliance needs into a single, unified strategy that also propels
download full paper ⤓
Taking a network security policy from planning and integration to analytics, reporting and compliance to implementation requires the use of advanced technologies that can quickly interpret, classify and block potential threats while streamlining secured traffic. The proposed network security policy seeks to rely on state-of-the-art constraint-based programming techniques and rules engines to ensure the highest levels of reliability and fidelity to organization standards (Hegyi, Maliosz, Ladanyi, Cinkler, 2005). The evolving set of technologies that can be used throughout a network security configuration are increasingly able to "learn" through artificial intelligence which types of activity are valid and which are fraudulent (Burgess, Canright, Engo-Monsen, 2004). The intent of this network security policy is to attain this level of intelligence in the entire network security platform and systems.
Operational Security Policy
With the majority of employees being highly mobile and often at customer locations or traveling to potential prospect accounts, the operational security policy has set mobile access as the highest priority. The benefits of creating a secured Virtual Private Network (VPN) security policy also have multiplicative effects throughout the entire enterprise as well.
The variation between Secured Socket Layer (SSL) and IPSec-based protocols has been evaluated as part of this operational security plan and the determination made to standardize on SSL. This will provide our organization with far greater agility and speed of network connectivity without sacrificing security (Cisco Tutorial, 2013). IPSec, while highly secured and targeted to the specific IP address level, is impractical to the speed and transient nature of device usage in our organization. Figure 1 compares IPSec and SSL VPN configurations.
Figure 1: Comparing IPSec and SSL VPN Configurations
Sources: (Cisco Tutorial, 2013)
(Opus One, 2013)
Organizational Security
The most critical success factor in the development and deployment of an enterprise-wide it… READ MORE
Quoted Instructions for "Security Policy" Assignment:
- write a security policy document to support organizational objectives by addressing network, operational, and organizational security, as well as access control, cryptography, and laws and regulations.
- Limit the quotations to an average of no more than 3-5 lines.
How to Reference "Security Policy" Term Paper in a Bibliography
“Security Policy.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/security-policy/8051551. Accessed 1 Jul 2024.
Related Term Papers:
Security Policy Dr. Fossett's Dental Office Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Security Policy of a Dental Office
Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the… read more
Term Paper 3 pages (1254 words) Sources: 0 Topic: Computers / IT / Internet
Security Computer Security, Policy, and Procedures: Practical Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Security
Computer Security, Policy, and Procedures: Practical Recommendations
The rapid pace of technological development, especially in the area of information and communication technologies, has led to many changes for businesses… read more
Essay 3 pages (802 words) Sources: 7 Topic: Computers / IT / Internet
Security Policies Given the Highly Sensitive Nature Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Security Policies
Given the highly sensitive nature of the work at the company, what other actions might you add to this policy?
There are a number of different procedures that… read more
Essay 2 pages (749 words) Sources: 2 Topic: Computers / IT / Internet
Security Policy and Risk Strategy Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Security Policy and Risk Strategy
Over the last several years, a variety of organizations have begun to implement various security and risk assessment protocols, to ensure that they are protected… read more
Essay 4 pages (1383 words) Sources: 2 Topic: Computers / IT / Internet
Security Policy Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Computers and the Internet
Security Policies
Even though the significance of information security for businesses is more and more recognized, the difficulty of issues involved means that the size and… read more
Term Paper 4 pages (1313 words) Sources: 4 Topic: Business / Corporations / E-commerce
Mon, Jul 1, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!