Nobody downloaded yet

Information Security Plan - Essay Example

Comments (0) Cite this document
Information Security Plan October 9, 2012 Information Security Plan INTRODUCTION: Computer audit entails safeguarding the company’s holdings. The research delves on the information security risks. The research delves on the on implementing programmes that will reduce or eliminate information security threats in an Australian company setting…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Information Security Plan
Read TextPreview

Extract of sample
"Information Security Plan"

Download file to see previous pages The organisation is housed in a detached, multi-storeyed building located in the central business district of an Australian city. The company owns several assets that may at risk (Hall 2012, 273). The company’s physical holdings include the tables, chairs, computers, cabinets, calculators, printers, fax machine, scanner, delivery equipment, production equipment, inventories, and air conditions. The company’s employees use the tables, calculators, and chairs to process their daily activities like recording business transactions. The business transactions include selling the company’s goods and services. Further, the company’s employees also use the chairs to accomplish their daily responsibilities of processing the sales and purchase of inventory items (Brigham 2010, 105). In addition, the employees use the chairs whenever they prepare their monthly reports. The employees use the chairs because it would be too taxing for the employees to stand up the whole day while encoding the company’s business transactions. Management assigns one chair t each employee. ...
In addition, the company’s employees file their printed records in the cabinet (Schlesinger 2007, 2). The cabinet contains confidential printed records of the company’s daily transactions. The transaction records include the number of items bought by the company’s current and prospective customers. The transaction records include the amount and quantity bough from the current and prospective suppliers. Likewise, the company uses the printers to print the required hard copy reports (Stickney 2009, 366). The company also uses the printers to print sales letters that are submitted to the company’s current and prospective customers. The company uses the printers to submit purchase requisitions to the company’s current and prospective suppliers. The employees use the printers to prepare their monthly reports or presentations. In addition, the company uses the fax machines and scanners to send information to entities outside the company’s premises (Hussey 2010, 11). The fax machines and scanners hasten the transfer of printed copies. The use of the fax machines and scanners eliminate the process of sending confidential data through the post office, snail mail. Normally, the fax machines can be used as telephones. In the same manner, the company uses delivery equipments (Hussey 2010, 11). The delivery equipments include trucks, cars, and other delivery vehicles. The company uses the delivery equipments to deliver the sold products to the company’s current and prospective customers. In addition, the company harnesses the delivery equipments to retrieve the purchased products from the company’s current and prospective suppliers. Further, the company owns inventories (Mendell 2006, 21). The inventories ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Information Security Plan Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Information Security Plan Essay Example | Topics and Well Written Essays - 3000 words. Retrieved from
(Information Security Plan Essay Example | Topics and Well Written Essays - 3000 Words)
Information Security Plan Essay Example | Topics and Well Written Essays - 3000 Words.
“Information Security Plan Essay Example | Topics and Well Written Essays - 3000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Information Security Program Survey
It is the second largest department of the US Federal government and currently employs approximately 280,000 people. VA mainly runs medical facilities and benefits officers for veterans and is responsible for managing the administration programs of veterans and their dependants.
5 Pages(1250 words)Essay
Security Plan
Table of Contents Introduction 3 Objectives 3 Scope 4 Physical Threat To Organization’s Information Holdings 4 Theft 4 Sabotage 5 Human Mistakes 5 Environmental Distraction 5 Human Threats To Organization’s Information Holdings 6 Computer Fraud 6
17 Pages(4250 words)Essay
Information Security
In this scenario, the technical potentials of the web based technology such as internet offer the facility for the information to be collected, shared, and dispersed, with relative easiness. In spite of the management lapse, customers are generally worried about the security of private information utilized by companies.
10 Pages(2500 words)Essay
Information Security at Al Nahda Hospital
This has led to the need to properly secure information because it is a vital asset to any organization. In the health sector, hospitals require information for various purposes. In addition, the high level of connectivity that has been made possible by the internet has led to new concerns over the issue of information security.
13 Pages(3250 words)Essay
Information Security
Computer simulations are generally used to improve the present state of working of an organization increasing the level of output of the work, or even newer systems may be designed that may fulfill several needs of the organization may be a lower cost than the current systems.
12 Pages(3000 words)Essay
Security plan
In addition, it is yet vital and significant to maintain exceptional security in a networked structure. Because one PC can have many points of entry and can be used in a wrong way, on the other hand, a computer network has numerous
15 Pages(3750 words)Essay
Information Security Physical Security models
Physical security embodies the foundation of any security model. If an intruder happens to breach the physical security of an institution, he will have access to all other security elements. A security model, on the other hand, is
3 Pages(750 words)Essay
Security Plan
This report focuses on the security plan that North Carolina agricultural and state university came up with to protect the university resources especially computers in order to promote quality in computer systems and attain the universities goals. When the university decided to come up with this plan it had noticed that the quality of education was comprised due to misuse of different institutional resources.
8 Pages(2000 words)Essay
Information security
Universal Plug and Play (UPnP) refers to a protocol standard that enables communication between network-enabled devices and computer systems. Some of the main devices in which universal plug and play devices are used include printers, media servers, routers, digital video recorders (DVRs), computers, and even security cameras (Vaughan-Nichols 2013).
12 Pages(3000 words)Essay
Information Security Program Survey
As per 2011 NASA strategic plan, NASA’s mission is to “drive advances in science, technology, and exploration to enhance knowledge, education, innovation, economic vitality, and stewardship of Earth”. Safety, integrity, teamwork, and excellence are the core values of this government agency.
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Information Security Plan for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us