Nobody downloaded yet

Information Security Plan - Essay Example

Comments (0) Cite this document
Summary
Information Security Plan October 9, 2012 Information Security Plan INTRODUCTION: Computer audit entails safeguarding the company’s holdings. The research delves on the information security risks. The research delves on the on implementing programmes that will reduce or eliminate information security threats in an Australian company setting…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Information Security Plan
Read TextPreview

Extract of sample "Information Security Plan"

Download file to see previous pages The organisation is housed in a detached, multi-storeyed building located in the central business district of an Australian city. The company owns several assets that may at risk (Hall 2012, 273). The company’s physical holdings include the tables, chairs, computers, cabinets, calculators, printers, fax machine, scanner, delivery equipment, production equipment, inventories, and air conditions. The company’s employees use the tables, calculators, and chairs to process their daily activities like recording business transactions. The business transactions include selling the company’s goods and services. Further, the company’s employees also use the chairs to accomplish their daily responsibilities of processing the sales and purchase of inventory items (Brigham 2010, 105). In addition, the employees use the chairs whenever they prepare their monthly reports. The employees use the chairs because it would be too taxing for the employees to stand up the whole day while encoding the company’s business transactions. Management assigns one chair t each employee. ...
In addition, the company’s employees file their printed records in the cabinet (Schlesinger 2007, 2). The cabinet contains confidential printed records of the company’s daily transactions. The transaction records include the number of items bought by the company’s current and prospective customers. The transaction records include the amount and quantity bough from the current and prospective suppliers. Likewise, the company uses the printers to print the required hard copy reports (Stickney 2009, 366). The company also uses the printers to print sales letters that are submitted to the company’s current and prospective customers. The company uses the printers to submit purchase requisitions to the company’s current and prospective suppliers. The employees use the printers to prepare their monthly reports or presentations. In addition, the company uses the fax machines and scanners to send information to entities outside the company’s premises (Hussey 2010, 11). The fax machines and scanners hasten the transfer of printed copies. The use of the fax machines and scanners eliminate the process of sending confidential data through the post office, snail mail. Normally, the fax machines can be used as telephones. In the same manner, the company uses delivery equipments (Hussey 2010, 11). The delivery equipments include trucks, cars, and other delivery vehicles. The company uses the delivery equipments to deliver the sold products to the company’s current and prospective customers. In addition, the company harnesses the delivery equipments to retrieve the purchased products from the company’s current and prospective suppliers. Further, the company owns inventories (Mendell 2006, 21). The inventories ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Plan Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Information Security Plan Essay Example | Topics and Well Written Essays - 3000 words. Retrieved from https://studentshare.org/information-technology/1401693-information-security-plan
(Information Security Plan Essay Example | Topics and Well Written Essays - 3000 Words)
Information Security Plan Essay Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/information-technology/1401693-information-security-plan.
“Information Security Plan Essay Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/information-technology/1401693-information-security-plan.
  • Cited: 1 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Security Plan

Information Security

...and communication with customers as well (Benefits of Implementing an ERP System, 2011). Thus in order to integrate the computer simulation techniques in the organization the ERP systems can be considered to be incorporated such that the risks and threats of integration and security can be reduced. An ideal ERP system would connect and integrate all the departments of the organization with the new business process or the technology, in this case being the computer simulation measures. These include the manufacturing, the finance, the human resources, the supply chain management, the projects, as well as the customer relationship management departments (ERP (Enterprise Resource Planning, 2012))....
12 Pages(3000 words)Essay

Security Plan for ABC Information Systems

...? Security Plan for ABC Information Systems No. of words <3860> Unit number: Study Period: DECLARATION This project is an original one and not a duplicate from a different system. No duplication or any reproduction of this security plan information system document should be done without permission from the author. Candidate…………………………… Supervisor………………………….. Sign…………………………………. Date………………………………. Table of Contents Title Page……………………………………………………………………..1 Declaration……………………………………………………………………2 Introduction…………………………………………………………………...5 Background information of ABC……………………………………………..5 System Environment…………………………………………………………..7 Objectives of the security plan………………………………………………...7 Availability…………………………………………………………….8 Integrity... -...
15 Pages(3750 words)Research Paper

Information Security

...its business activities. The progress in the field of information technology has been favorable because it has brought various benefits for the users all around the world. However, along with many significant benefits, the advancement in information technology has also created various issues related to the security of computer networks. These network-related issues need to be tackled properly in order to make the internet world safe and secure. Literature Review regarding Current State of Network Security Kaminsky (2010) asserts, “Network security comprises the measures a company takes to protect its computer system”. It is evident from...
5 Pages(1250 words)Research Paper

Information Security

.... Information security culture is extended in the end by altering the manners within a business to the preferred way. In addition, this occurs together by formalizing the structure of information security and by affecting to the psychological paradigms, approach, incentives, open and particularly implied awareness of human resources (Herold, 2010), (Feng, 2003) and (Kuusisto & Ilvonen, 2003). Therefore the creation of information security and confidentiality knowledge along with guidance plan is not an easy job. It is frequently a provoking job. It is frequently a confronting responsibility. Furthermore several times,...
10 Pages(2500 words)Essay

Information Security

...? Need for Information Security Introduction The intervention of technology has increased competition for organizations since communication has broken geographical barriers and has transformed the world into a global village. The increasing competition makes it vital for all types of organizations to be equipped with information and data about their customers, market trends, consumer behavior etc. However, the possession of complete information is considered to be an incomplete victory if it is not protected in an effective manner against prevailing threats and vulnerabilities. Lack of awareness and execution to protect company’s information assets can...
3 Pages(750 words)Research Paper

Information Security

...? Information Security INFORMATION SECURITY Following the anti-virus up from McAfee that affected computers running Windows XPinternationally, the company made an official announcement, contending that a very small percentage of their clients had been affected. The apology was initially given by a spokesman for the company, and it was him who claimed that only less than 0.5% of their clients had been affected by the erroneous update (Harkins, 2013). This was the wrong person to have come out with such an apology, and it seemed that McAfee realized it. The next morning, Barry McPherson, their EVP, released a statement that was well phrased, but still unapologetic. Again,...
3 Pages(750 words)Essay

Information Security

...to be struck. Commenting on a study carried out by the GAO, the National Institute of Standards and Technology established a viable framework for promoting good practices for information security programs; this framework deals with risk assessment, the taking steps to reduce risk, and the creation of a central management group devoted to these risk management functions. This section will address good practices as they pertain to risk assessment and tailoring an information security policy to organizational goals and to remain cost-effective. The essence of an effective risk assessment procedure is not to assume that every conceivable risk can be...
4 Pages(1000 words)Essay

Information Security

...Organizations should conduct periodic risk assessment of information assets as part of risk management program Organizations should implement policies and procedures based on risk assessment to secure information assets Organizations should have a security management structure Organizations should plan and initiate action to provide adequate information security for networks, facilities, systems and information and test regularly Organizations should provide information security awareness, training and education to personnel Organization should create and execute a...
6 Pages(1500 words)Term Paper

Information Security

...Information Security Table of Contents Table of Contents 2 An Overview of Information Security 3 Ensuring the Effectiveness of the Information Security Policies 3 Policies and Measures 4 Protection of the Data and the Steps Involved 5 Enhancing the Information Security 6 References 7 An Overview of Information Security The basic concept of the information security in an organization involves providing assistance to the organization’s mission. Every individual organization is open to the elements of worries which at times can influence the...
2 Pages(500 words)Essay

Information technology director security plan

...breaches to senior management staff and the HR department. If I was an information technology director, I would: Ensure the protection and management of information technology resources. Ensure access control. Write down a formal security plan with all security vulnerabilities, authorizations and the security plan. Arrange a project team which would keep a check on security. Ensure purchase and implementation of virus protection, spam-filtering software, firewalls, updates, passwords and physical security. Keep and review regular backup of data. Data should be stored on the...
1 Pages(250 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Information Security Plan for FREE!

Contact Us