We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Security A+ policy Document Project - Case Study Example

Comments (0) Cite this document
Full Paper Title Name University Project Deliverable #1 1 Information Security Mission Statement The Global Distribution, Inc. and Global Distribution, Inc. staff are inherent and responsible for protecting the physical information assets, confidential data and intellectual property of the organization…
Download full paperFile format: .doc, available for editing
Polish This Essay94.9% of users find it useful
Security A+ policy Document Project
Read TextPreview

Extract of sample
"Security A+ policy Document Project"

Download file to see previous pages business dealings, processes and tasks. However, in order to achieve these objectives, policies and procedures that are already in place such as, Acceptable Use Policy of Global Distribution, Inc. Information security is the basis for the business that must be incorporated into each element of the organization for instance, administrative service, planning and development, sales and marketing and operations. In addition, these functions need particular controls for mitigating the risk from normal business operations. State and federal laws that are associated with information security and privacy policies are applicable to Global Distribution, Inc., as non-compliance will impose fines, stakeholder confidence, audits and direct revenue loss for Global Distribution, Inc. 1.1 Overview Information security has now become everyone’s business. In fact, every member of staff present at Global Distribution, Inc.is responsible in making themselves alert with the compliance with Global Distribution, Inc. policies, procedures and standards connected with information security. Similarly, a policy is measured as a strategic control followed by budgets and organizations (Osborne, 2006). Information Security is defined as: “The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats” (Vacca, 2009). The three fundamental objectives regarding Information Security includes Confidentiality, Integrity and Availability. This policy draft is based on these three objectives. 2 Purpose of Establishing Information Security Policy An Information Security policy is required by the Global Distribution, Inc. in order to secure information resources from upcoming threats. This is to establish confidence in stakeholder. Moreover, valuable benefits are achieved in the market by securing information security resources. In addition, maximum profit along with trust is generated among the organizations. However, security of any organization does not fully depend on Information technology. Other sources regarding threats to an organization includes vandalism, sabotage, espionage, natural disasters, online frauds, phishing etc. In fact, cyber-crimes can also compromise networks while data in transit. Some of the other threats are non-ethical hacking, viruses, Trojan, malicious codes and denial of service attacks. 2.1 Success Factors In order to implement an effective and successful security policy within Global Distribution, Inc. these factors should be made into consideration: Absolute and inclusive security policy along with security objectives that is parallel to the business objectives of Global Distribution, Inc. A methodology that is compatible along with the Global Distribution, Inc. In order to support Global Distribution, Inc., a comprehensive and visible senior management is needed. Extremely visible support from Global Distribution, Inc. executive management. Complete and thorough information regarding risk management and security requirement practices. Security requirements are communicated to the Global Distribution, Inc. managers, business partners, clients, software developers and outsourced ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security A policy Document Project Case Study Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1466861-security-a-policy-document-project
(Security A Policy Document Project Case Study Example | Topics and Well Written Essays - 2250 Words)
“Security A Policy Document Project Case Study Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1466861-security-a-policy-document-project.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Security Policy GDI Company
Executive summary This security policy outline outlines how GDI can protect its information technology infrastructure from various threats. This policy documents underscore the fact that information technology form the core of GDI’s success, which justify why this security policy documents concerns itself with protecting various part of the information technology assets.
12 Pages(3000 words)Case Study
Information Security Policy Document (ISPD)
tory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 9 Analysis of ISPD ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 9-11 Conclusion ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 11-12 References ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 13 Introduction and Methodology As this is an information age, information is now in the form of digits that flows on an electronic computerized network.
9 Pages(2250 words)Assignment
IT - Security Plan
(2011). Elemental Security and Information Security Policy. Retrieved December 20, 2011, from http://www.elementalsecurity.com/glossary/information-security-policy.php 15 Introduction Computer security is the process of protecting a computer system and data stored in it from being damaged or accessed by unauthorized persons.
7 Pages(1750 words)Case Study
Case project
Fort McKay Group of Companies is one of autonomous initiatives of their own income (OSR) 100% owned and operated Fort McKay First Nation with its joint ventures. Although Group of Fort McKay is owner of joint venture, and is owned and operated by, Fort McKay First Nation has allowed companies to business opportunities.
8 Pages(2000 words)Case Study
Security Risk Management
Once the risk is identified and accurately assessed, various strategies need to be developed to manage the risk, and alleviate it using managerial principles. As we know, once a risk has been identified, the managerial task attempts essentially to reduce the impact of risk through avoiding the risk, reducing the damaging effects of the risk, transferring the risk to another party and accepting part of the consequences of a particular risk as operational losses.
14 Pages(3500 words)Case Study
EU Telecommunications Policy
The role of state in the European telecommunications sector has traditionally been immense because of the importance of telecommunications for internal and external security. The provision of facilities that ensure communication over long distances was reasonably perceived as unalienable function of the state: some authors used to address this function as a key element in the 'logistics of power' of the state (Mann 1986).
10 Pages(2500 words)Case Study
A Project Failure
The supplier company approaches customers in a largely passive and reactive manner, confident that it can select, acquire, understand, and readily retain them as desired. Processes for performance measurement are rudimentary, and so is internal and external communication.
7 Pages(1750 words)Case Study
Assessing Change in Homeland Security Policy and Practices
This necessitated numerous emergency response activities and exerted immense pressure on prevailing policy and security administrative frameworks. The state of Maryland was at the centre stage of the response mechanism
12 Pages(3000 words)Case Study
Security policy document

The author of the paper states that the General security architecture entails an integrated security design that helps to solve security threats/ risk that may emerge in an organisation. The security architecture further involves security principles that are documented so that they can guide an organisation.

7 Pages(1750 words)Term Paper
Project #3: Sample Cyber Security Profile (System Security Plan):
There are three types of security controls namely operational security controls, management security controls and technical countermeasures or safeguards. All the three work together in an organization’s information system to ensure that the
12 Pages(3000 words)Case Study
Let us find you another Case Study on topic Security A+ policy Document Project for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us