Full Paper Title Name University Project Deliverable #1 1 Information Security Mission Statement The Global Distribution, Inc. and Global Distribution, Inc. staff are inherent and responsible for protecting the physical information assets, confidential data and intellectual property of the organization…
Download full paperFile format: .doc, available for editing
Download file to see previous pages
business dealings, processes and tasks. However, in order to achieve these objectives, policies and procedures that are already in place such as, Acceptable Use Policy of Global Distribution, Inc. Information security is the basis for the business that must be incorporated into each element of the organization for instance, administrative service, planning and development, sales and marketing and operations. In addition, these functions need particular controls for mitigating the risk from normal business operations. State and federal laws that are associated with information security and privacy policies are applicable to Global Distribution, Inc., as non-compliance will impose fines, stakeholder confidence, audits and direct revenue loss for Global Distribution, Inc. 1.1 Overview Information security has now become everyone’s business. In fact, every member of staff present at Global Distribution, Inc.is responsible in making themselves alert with the compliance with Global Distribution, Inc. policies, procedures and standards connected with information security. Similarly, a policy is measured as a strategic control followed by budgets and organizations (Osborne, 2006). Information Security is defined as: “The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats” (Vacca, 2009). The three fundamental objectives regarding Information Security includes Confidentiality, Integrity and Availability. This policy draft is based on these three objectives. 2 Purpose of Establishing Information Security Policy An Information Security policy is required by the Global Distribution, Inc. in order to secure information resources from upcoming threats. This is to establish confidence in stakeholder. Moreover, valuable benefits are achieved in the market by securing information security resources. In addition, maximum profit along with trust is generated among the organizations. However, security of any organization does not fully depend on Information technology. Other sources regarding threats to an organization includes vandalism, sabotage, espionage, natural disasters, online frauds, phishing etc. In fact, cyber-crimes can also compromise networks while data in transit. Some of the other threats are non-ethical hacking, viruses, Trojan, malicious codes and denial of service attacks. 2.1 Success Factors In order to implement an effective and successful security policy within Global Distribution, Inc. these factors should be made into consideration: Absolute and inclusive security policy along with security objectives that is parallel to the business objectives of Global Distribution, Inc. A methodology that is compatible along with the Global Distribution, Inc. In order to support Global Distribution, Inc., a comprehensive and visible senior management is needed. Extremely visible support from Global Distribution, Inc. executive management. Complete and thorough information regarding risk management and security requirement practices. Security requirements are communicated to the Global Distribution, Inc. managers, business partners, clients, software developers and outsourced
...Download file to see next pagesRead More
Cite this document
(“Security A policy Document Project Case Study Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1466861-security-a-policy-document-project
(Security A Policy Document Project Case Study Example | Topics and Well Written Essays - 2250 Words)
“Security A Policy Document Project Case Study Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1466861-security-a-policy-document-project.
This security policy outline outlines how GDI can protect its information technology infrastructure from various threats. This policy documents underscore the fact that information technology form the core of GDI’s success, which justify why this security policy documents concerns itself with protecting various part of the information technology assets.
tory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 9 Analysis of ISPD ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 9-11 Conclusion ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 11-12 References ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 13 Introduction and Methodology As this is an information age, information is now in the form of digits that flows on an electronic computerized network.
(2011). Elemental Security and Information Security Policy. Retrieved December 20, 2011, from http://www.elementalsecurity.com/glossary/information-security-policy.php 15 Introduction Computer security is the process of protecting a computer system and data stored in it from being damaged or accessed by unauthorized persons.
Fort McKay Group of Companies is one of autonomous initiatives of their own income (OSR) 100% owned and operated Fort McKay First Nation with its joint ventures. Although Group of Fort McKay is owner of joint venture, and is owned and operated by, Fort McKay First Nation has allowed companies to business opportunities.
Once the risk is identified and accurately assessed, various strategies need to be developed to manage the risk, and alleviate it using managerial principles. As we know, once a risk has been identified, the managerial task attempts essentially to reduce the impact of risk through avoiding the risk, reducing the damaging effects of the risk, transferring the risk to another party and accepting part of the consequences of a particular risk as operational losses.
The role of state in the European telecommunications sector has traditionally been immense because of the importance of telecommunications for internal and external security. The provision of facilities that ensure communication over long distances was reasonably perceived as unalienable function of the state: some authors used to address this function as a key element in the 'logistics of power' of the state (Mann 1986).
The supplier company approaches customers in a largely passive and reactive manner, confident that it can select, acquire, understand, and readily retain them as desired. Processes for performance measurement are rudimentary, and so is internal and external communication.
This necessitated numerous emergency response activities and exerted immense pressure on prevailing policy and security administrative frameworks. The state of Maryland was at the centre stage of the response mechanism
The author of the paper states that the General security architecture entails an integrated security design that helps to solve security threats/ risk that may emerge in an organisation. The security architecture further involves security principles that are documented so that they can guide an organisation.
There are three types of security controls namely operational security controls, management security controls and technical countermeasures or safeguards. All the three work together in an organization’s information system to ensure that the
12 Pages(3000 words)Case Study
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Save Your Time for More Important Things
Let us write or edit the case study on your topic
"Security A+ policy Document Project"
with a personal 20% discount.