Term Paper on "Security Policy"

Term Paper 4 pages (1080 words) Sources: 4

[EXCERPT] . . . .

Security Policy

IT Security Policy

The following security policy defines how strategic it resources and technologies are aligned to supporting organizational objectives and goals. Implicit in this security policy is the need for accountability, transparency and intensive use of reporting and analytics to track performance against objectives, in addition to compliance against industry and regulatory standards. Best practices in it security policy management requires the integration of analytics, compliance and reporting requirements within an it security policy and it supporting framework (Hone, Eloff, 2002). The intent of this security policy document is to provide prescriptive guidance to attain and surpass best practices in the areas of network, operational, organizational security, access control, cryptography, and compliance to laws and regulations.

Network Security Policy

Ensuring protection of all intellectual property and critical information assets including servers and mission-critical systems is the objective of the network security policy. The strategic it security plan of an enterprise must align to the strategic plan, supporting and accelerating key business functions and strategies to ensure their profitable attainment (Banks, 1990). At the center of the network security policy is the need for aligning auditing, analytics, reporting and compliance to specific requirements at the federal, regional and state level (Eloff, 1988). The intent of the network security policy is to combine the best practices in network management, reporting and analytics, and compliance needs into a single, unified strategy that also propels
Continue scrolling to

download full paper
the organization to its objectives with the minimum level of disruption.

Taking a network security policy from planning and integration to analytics, reporting and compliance to implementation requires the use of advanced technologies that can quickly interpret, classify and block potential threats while streamlining secured traffic. The proposed network security policy seeks to rely on state-of-the-art constraint-based programming techniques and rules engines to ensure the highest levels of reliability and fidelity to organization standards (Hegyi, Maliosz, Ladanyi, Cinkler, 2005). The evolving set of technologies that can be used throughout a network security configuration are increasingly able to "learn" through artificial intelligence which types of activity are valid and which are fraudulent (Burgess, Canright, Engo-Monsen, 2004). The intent of this network security policy is to attain this level of intelligence in the entire network security platform and systems.

Operational Security Policy

With the majority of employees being highly mobile and often at customer locations or traveling to potential prospect accounts, the operational security policy has set mobile access as the highest priority. The benefits of creating a secured Virtual Private Network (VPN) security policy also have multiplicative effects throughout the entire enterprise as well.

The variation between Secured Socket Layer (SSL) and IPSec-based protocols has been evaluated as part of this operational security plan and the determination made to standardize on SSL. This will provide our organization with far greater agility and speed of network connectivity without sacrificing security (Cisco Tutorial, 2013). IPSec, while highly secured and targeted to the specific IP address level, is impractical to the speed and transient nature of device usage in our organization. Figure 1 compares IPSec and SSL VPN configurations.

Figure 1: Comparing IPSec and SSL VPN Configurations

Sources: (Cisco Tutorial, 2013)

(Opus One, 2013)

Organizational Security

The most critical success factor in the development and deployment of an enterprise-wide it… READ MORE

Quoted Instructions for "Security Policy" Assignment:

- write a security policy document to support organizational objectives by addressing network, operational, and organizational security, as well as access control, cryptography, and laws and regulations.

- Limit the quotations to an average of no more than 3-5 lines.

How to Reference "Security Policy" Term Paper in a Bibliography

Security Policy.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/security-policy/8051551. Accessed 1 Jul 2024.

Security Policy (2013). Retrieved from https://www.a1-termpaper.com/topics/essay/security-policy/8051551
A1-TermPaper.com. (2013). Security Policy. [online] Available at: https://www.a1-termpaper.com/topics/essay/security-policy/8051551 [Accessed 1 Jul, 2024].
”Security Policy” 2013. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/security-policy/8051551.
”Security Policy” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/security-policy/8051551.
[1] ”Security Policy”, A1-TermPaper.com, 2013. [Online]. Available: https://www.a1-termpaper.com/topics/essay/security-policy/8051551. [Accessed: 1-Jul-2024].
1. Security Policy [Internet]. A1-TermPaper.com. 2013 [cited 1 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/security-policy/8051551
1. Security Policy. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/security-policy/8051551. Published 2013. Accessed July 1, 2024.

Related Term Papers:

Security Policy Dr. Fossett's Dental Office Term Paper

Paper Icon

Security Policy of a Dental Office

Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the… read more

Term Paper 3 pages (1254 words) Sources: 0 Topic: Computers / IT / Internet


Security Computer Security, Policy, and Procedures: Practical Essay

Paper Icon

Security

Computer Security, Policy, and Procedures: Practical Recommendations

The rapid pace of technological development, especially in the area of information and communication technologies, has led to many changes for businesses… read more

Essay 3 pages (802 words) Sources: 7 Topic: Computers / IT / Internet


Security Policies Given the Highly Sensitive Nature Essay

Paper Icon

Security Policies

Given the highly sensitive nature of the work at the company, what other actions might you add to this policy?

There are a number of different procedures that… read more

Essay 2 pages (749 words) Sources: 2 Topic: Computers / IT / Internet


Security Policy and Risk Strategy Essay

Paper Icon

Security Policy and Risk Strategy

Over the last several years, a variety of organizations have begun to implement various security and risk assessment protocols, to ensure that they are protected… read more

Essay 4 pages (1383 words) Sources: 2 Topic: Computers / IT / Internet


Security Policy Term Paper

Paper Icon

Computers and the Internet

Security Policies

Even though the significance of information security for businesses is more and more recognized, the difficulty of issues involved means that the size and… read more

Term Paper 4 pages (1313 words) Sources: 4 Topic: Business / Corporations / E-commerce


Mon, Jul 1, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!