StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Policy Document for the ABC Electronics Company - Assignment Example

Cite this document
Summary
A security policy is a compilation of documents that develops a company’s understanding of its property, as well as, its worth, the threats or risks to which these properties along with its worth might be bare. The kinds of gears and methods it applies to stay away, diminish, or remediate those terrorizations and risks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Security Policy Document for the ABC Electronics Company
Read Text Preview

Extract of sample "Security Policy Document for the ABC Electronics Company"

Security Policy Document for the ABC Electronics Company A security policy is a compilation of documents that develops a company’s understanding of its property, as well as, its worth, the threats or risks to which these properties along with its worth might be bare. Furthermore, the kinds of gears and methods it applies to stay away, diminish, or remediate those terrorization and risks. The basic idea is to tabulate the company’s property and wealth, disperse them certain value, and then evaluate the probability that the terrorization or a threat may actually be realized in the shape of a loss.

It is evident to take a risk based approach policy when carrying out this, using no more than the allocated in order to decrease the risk to a suitable level (Overly, 1999). Therefore, in this case, the ABC electronic company security policy is going to be a living document. It will exist over a period of time to meet fresh challenges and transforming goals, as well as, philosophies on a diversified security associated issues, from the hardware configuration to the human actions. The security policies to be discussed will be concerning governance issues; this is because these policy formulations require beginning at the top that has broad principles that are dignified by experienced and top level personnel.

These brads and specific concepts along with statements are later translated into higher level protocols and processes with IT together with security experts in order to cover up certain concerns. Each and every security policy starts by covering up certain security agendas with a wider relevance of the company, but what pops up as an exaggerated level of governance agendas to secure crucial systems, data, as well as, information about the company from precise vulnerabilities. In the case of ABC electronic company, some categorical conditions affect to any grievance by computerized business that relates to the company.

A very secure and safe computing environment for the ABC electronic company environment ensures that all end user actions are very secure from manipulation by outside users, accepted or unaccepted that involves even outside users malicious programs along with their processes, should possess information that is secure. This information needs a powerful, solid equipment complete with an oriented cyclical exercise for auditing, monitoring, as well as, reviewing processes to ensure procedural operational effectiveness.

Some vital elements construct a centered value to every security policy (Overly, 1999). The most fundamental centered value principles are referred to as the CIA that represent confidentiality that enables the private communications together with messages are only shared by the accepted personnel of the company, integrity which eradicates that communication together with the messages are genuine, precise, as well as, complete from a trustworthy source, the last one is the availability that refers to the protection of resources being available to accept users that require it.

The two fundamental objectives of ABC electronic company are; efficiently communicate top down objectives and views of the company issues, describe gearshift to implement fulfillment in connection with such objectives and views. The vital objectives for any suitable comprehensive security policy must: guard people and the company business property, formulate foundation expectations for the behavior of all available personnel, command security personnel to come up with an audit that monitors and evaluates incidents to be able to reduce the company’s security risk to the minimum.

Some of the prescribed policies to the ABC are as follows: The asset classification and control The function of this policy is to establish the defensive gearshift related to each ABC Electronics company’s information equipment and to offer a groundwork for all employees to comprehend the security along with the handling of such possessions. ABC Electronics Company’s data categorization structure has been premeditated to sustain admission to information based on the requirement to be acquainted with so that information will be sheltered from illegal revelation, apply, alteration, and removal.

Reliable employ of this data classification structure will make possible business actions in addition to facilitating to maintain the costs of information security to a smallest amount. Devoid of the reliable employ of this data classification structure, ABC Electronics Company excessively risks loss of associate dealings, failure of public self-assurance, interior operational disturbance, extreme expenditure, and aggressive disadvantage. Information categorization This policy requires that all information possessions be categorized as well as labeled in a method that permits the possessions to be willingly recognized to conclude management and safeguard level for that possession.

The concern will be in use when evaluating the categorized structures from other companies as their categorization structure may contain diverse parameters. Information tagging and management It is imperative that a suitable set of measures may be defined for information tagging and management in agreement with the categorization system adopted by ABC Electronics company. These measures must plaster information possession in substantial along with electronic formats. For each category, management measures should be clear to wrap the following types of information dispensation activity; Copying, saving, communication by post, fax, as well as, electronic mail, demolition.

Information preservation Information should not be preserved any longer than the company needs it to be preserved. This decreases the gap of time that data can potentially be accessed for exploitation. Management should be articulated to erase data that exceeds necessary preservation occasion. A suitable Electronic member data should be preserved up to five years at most. Protection against malicious software ABC Electronics Company shall execute measures, user consciousness, along with revolutionary controls to sense and avoid the preamble of malicious software into the company’s computing surroundings.

This policy will guard the veracity of software, as well as, information by promoting measures also other measures to alleviate the risks of the prologue of nasty software into the company (Overly, 1999). Reference Overly, M. R. (1999). e-policy how to Develop Computer, E-mail and Internet Guidelines to protect your Company and its Assets. NY: SciTech Publishing Inc.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Policy Document for the ABC Electronics Company Assignment”, n.d.)
Security Policy Document for the ABC Electronics Company Assignment. Retrieved from https://studentshare.org/information-technology/1465165-security-policy-document-for-the-abc-electronics
(Security Policy Document for the ABC Electronics Company Assignment)
Security Policy Document for the ABC Electronics Company Assignment. https://studentshare.org/information-technology/1465165-security-policy-document-for-the-abc-electronics.
“Security Policy Document for the ABC Electronics Company Assignment”, n.d. https://studentshare.org/information-technology/1465165-security-policy-document-for-the-abc-electronics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Policy Document for the ABC Electronics Company

IT Audit & Security controls at ABC Company

security of information is foremost concern for most of the organizations planning for mobile deployment.... Some of the major risks deploying mobile devices are as follows:Loss or theft of mobile deviceSpreading of virus and wormNetwork compromises Organizations can overcome the risk associated with mobile workforce to some extent by applying various security and precautionary measures.... security of information is foremost concern for most of the organizations planning for mobile deployment....
25 Pages (6250 words) Essay

Information Systems

hellip; It provides an analysis of the current advancements of information technology in general and for the financial industry in particular; and details the strategic IT systems that are planned for the abc bank in years to come. ABC Bank is a new small bank with a network of 50 branches.... This report focuses on the strategic implications of information technology for abc Bank's business for the next 3 years.... The purpose of the report is to establish a strategic plan for IT for the bank, to apprise higher management with the benefits and the value addition that IT provides to the business, the contemporary approaches to implementing IT based systems in financial industry and to provide recommendations customized to abc Bank's operations....
9 Pages (2250 words) Essay

Procurement of a New Plant Equipment - Company ABC

Due to a re-organization the company are moving to a piece part operation i.... the manufacture of Gears and Shafts only, the transmission will be… The company previously manufactured gears and shafts for the transmissions they produced.... They will now manufacture not only the gears and shafts that they have always produced but the re-organization will involve the introduction of a The company will now move to a Cell Manufacturing Process Plant....
16 Pages (4000 words) Essay

Payroll Management Features

According to this paper, the purposes for establishing security procedures for payroll information management: security of payroll records and data is important to ensure confidentiality.... The payroll management must provide priority to the security of payroll data and records Internal.... The payroll records include the employee name and address, social security number, pay rates; total wages earned, deductions and net pay, bank account details and employee benefits like health insurance premiums and retirement contributions....
15 Pages (3750 words) Research Paper

Metropolitan Police in Security

Fuel-based authentication of the document will ensure that all information within the websites or Occurrence Book can be accessed countrywide from a single source.... This means that different authorities can rely on single source security center for information.... RSA based authentication Management system where authentication based software is used by the police unit to manage all security-based tokens, users, applications and multiple resources....
6 Pages (1500 words) Essay

Identity Theft Policies

n the United States (US), the very first victim of identity theft in the modern world was Hilda Schrader Whitcher, secretary in a wallet company, whose Social Security card facsimile was used in the 1930s as an insert in the wallets as a marketing strategy to show that the card actually fits into the wallet.... As of 1943, close to six thousand other individuals were found to have been illicitly using Witcher's Social security number and to date, 40,000 people were reported by the Social security Administration to have used her number (Hoffman and McGinley, 2010; Biegelman, 2009; Ritchie, 2006; Hamadi, 2005)....
12 Pages (3000 words) Research Paper

How to Fix Financial Reporting by David Bogoslaw

The article “How to Fix Financial Reporting” by David Bogoslaw, describes different issues that are related to financial reporting one of which is the credit crisis which had spread from US banks to Korea and Russia.... Other issues are off-balance-sheet financing and pension fund accounting....
12 Pages (3000 words) Article

Project Charter for ABC Retail ltd Centralized Distribution Centre

"Project Charter for abc Retail ltd Centralized Distribution Centre" paper contains a project overview of abc Ltd.... nbsp;… The project is critical to the achievement of profit targets for abc ltd.... since it will streamline the supply chain for abc and will increase the profits by about $2 million.... At the same time, an effective HR policy and grievance redressal mechanism should be integrated into the overall HR planning which includes regular meetings....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us