Nobody downloaded yet

Security A+ policy Document Project - Case Study Example

Comments (0) Cite this document
Summary
Full Paper Title Name University Project Deliverable #1 1 Information Security Mission Statement The Global Distribution, Inc. and Global Distribution, Inc. staff are inherent and responsible for protecting the physical information assets, confidential data and intellectual property of the organization…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Security A+ policy Document Project
Read TextPreview

Extract of sample "Security A+ policy Document Project"

Download file to see previous pages business dealings, processes and tasks. However, in order to achieve these objectives, policies and procedures that are already in place such as, Acceptable Use Policy of Global Distribution, Inc. Information security is the basis for the business that must be incorporated into each element of the organization for instance, administrative service, planning and development, sales and marketing and operations. In addition, these functions need particular controls for mitigating the risk from normal business operations. State and federal laws that are associated with information security and privacy policies are applicable to Global Distribution, Inc., as non-compliance will impose fines, stakeholder confidence, audits and direct revenue loss for Global Distribution, Inc. 1.1 Overview Information security has now become everyone’s business. In fact, every member of staff present at Global Distribution, Inc.is responsible in making themselves alert with the compliance with Global Distribution, Inc. policies, procedures and standards connected with information security. Similarly, a policy is measured as a strategic control followed by budgets and organizations (Osborne, 2006). Information Security is defined as: “The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats” (Vacca, 2009). The three fundamental objectives regarding Information Security includes Confidentiality, Integrity and Availability. This policy draft is based on these three objectives. 2 Purpose of Establishing Information Security Policy An Information Security policy is required by the Global Distribution, Inc. in order to secure information resources from upcoming threats. This is to establish confidence in stakeholder. Moreover, valuable benefits are achieved in the market by securing information security resources. In addition, maximum profit along with trust is generated among the organizations. However, security of any organization does not fully depend on Information technology. Other sources regarding threats to an organization includes vandalism, sabotage, espionage, natural disasters, online frauds, phishing etc. In fact, cyber-crimes can also compromise networks while data in transit. Some of the other threats are non-ethical hacking, viruses, Trojan, malicious codes and denial of service attacks. 2.1 Success Factors In order to implement an effective and successful security policy within Global Distribution, Inc. these factors should be made into consideration: Absolute and inclusive security policy along with security objectives that is parallel to the business objectives of Global Distribution, Inc. A methodology that is compatible along with the Global Distribution, Inc. In order to support Global Distribution, Inc., a comprehensive and visible senior management is needed. Extremely visible support from Global Distribution, Inc. executive management. Complete and thorough information regarding risk management and security requirement practices. Security requirements are communicated to the Global Distribution, Inc. managers, business partners, clients, software developers and outsourced ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security A policy Document Project Case Study Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1466861-security-a-policy-document-project
(Security A Policy Document Project Case Study Example | Topics and Well Written Essays - 2250 Words)
https://studentshare.org/information-technology/1466861-security-a-policy-document-project.
“Security A Policy Document Project Case Study Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1466861-security-a-policy-document-project.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security A+ policy Document Project

Information security policy

...policy is not possible, however, to cover all aspects related to information security, a set of information security policy document focusing on different group of employees within the organization is more suitable. This paper will discuss different factors that must be taken in to account when constructing and maintaining an information security policy. However, there are many methods available for constructing an information security policy, the initial step before adopting any one of the methods is to identify the current maturity level of the policy construction...
10 Pages(2500 words)Essay

Information Security Policy Document (ISPD)

...?Univesity Of Wales port campus) Information Security Policy Document Bespoke Forensic and Information Security Laboratory 9 Table of Contents Introduction and Methodology ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 2-4 Information Security Policy Document (ISPD) ~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 4-9 Purpose ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 4 Scope ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 5 Policy ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 5 Ownership Responsibilities ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 5 Universal Configuration Necessities ~~~~~~~~~~~~~~~~~~~~~~~~~ Page 8...
9 Pages(2250 words)Assignment

Homeland Security-Policy Analysis

...? Homeland Security-Policy Analysis Homeland Security-Policy Analysis The need for protection of the American people by the Bush administration on realizing the government’s laxity after the September 11 attacks that left over 3000 people dead saw the creation of the Homeland Security Act(HSA) of 2002, (Pub. L.107-296, enacted November 2002).This act of the United States Parliament saw the creation of a key department and its departmental head according to Fischer, Fischer, Halibozek and Green (2010). The Department of Homeland Security and the ministerial position is headed by the Secretary of Homeland Security. The act pointed out the major reason for the creation of the Homeland Department as the need to prevent radical assault... in the...
7 Pages(1750 words)Essay

Project Evaluation Assignment

...utilization and usefulness. In my future, I will consider the security aspects of the database while development of the database and apply certain rules/policies especially the CIA triad to ensure the security of the database. In order to develop an IT project and apply information security standards, there is a requirement of managing the project efficiently with the human resources having an appropriate set of skills. The concept or idea has been extracted from the case study mentioned in this document, and it has been learnt that the project management is one of the critical factors in success of the...
6 Pages(1500 words)Assignment

Security Policy Document for the ABC Electronics Company

...?Security Policy Document for the ABC Electronics Company A security policy is a compilation of documents that develops a company’s understanding of its property, as well as, its worth, the threats or risks to which these properties along with its worth might be bare. Furthermore, the kinds of gears and methods it applies to stay away, diminish, or remediate those terrorization and risks. The basic idea is to tabulate the company’s property and wealth, disperse them certain value, and then evaluate the probability that the terrorization or a threat may actually be realized in the shape of a loss. It is evident to take a risk based...
3 Pages(750 words)Assignment

Security Policy Description

.... For instance, a newly derived comprehensive and complex security policy cannot be successful because organizations need time for compliance. Common pitfalls for compliance are different organization cultures, lack of management buy-in, insufficient resources and many other factors. For a newly inaugurated car leasing company, the initial step would be to publish a policy that includes bulleted points i.e. in the form of checklists. Afterwards, when the processes are matured, more policies can be developed with comprehensive and detailed requirements along with documentations for Standard operating procedures (SOP). Moreover, providing awareness of the...
7 Pages(1750 words)Term Paper

Foreign Security Policy

...The Umbrella of the European Union's European Security Defence Policy/ Common Foreign Security Policy According to Sally McNamara, The European Security and Defense Policy (ESDP) has emerged as one of the biggest attempts to expand EU power to date, centralizing the most important tools of nation-statehood. The militarization of the European Union marks one of the greatest geopolitical shifts in the transatlantic alliance since the end of the Second World War. As a political initiative, it embodies the worst elements of European animosity toward the United States and would fundamentally undermine the NATO alliance and the Anglo-American Special Relationship.1 On the other hand, the Common Foreign and Security Policy (CFSP... ) is the...
1 Pages(250 words)Essay

Development of a Policy Document

...DEVELOPMENT OF A POLICY DOCUMENT – Influenza Pandemic Introduction This paper attempts to develop a policy document for the steps to be taken to during an influenza pandemic to prevent the spread of the infection to clinical staff caring for infected patients in the wards of a health care environment. Several reasons prompt the decision on the development of such a policy for health care institutions. During influenza pandemic individuals falling ill commonly seek assistance from the health care provider that provides their normal health care needs. This means that health care providers must be prepared to face the extra rush of patients during an...
6 Pages(1500 words)Essay

Security policy document

...Security policy document Introduction Security policy document entails a document that contains rules/policies practices, laws and procedures for regulating accessibility to a computer network. The policy document help to regulate accessibility to organisation information by ensuring that both corporate and clients information is protected against authorised access. The document further provides a clear blue print for computer network security management. Therefore, to be efficient and effective in distribution operations, the Global...
7 Pages(1750 words)Term Paper

Security Policy Analysis

...Security Policy Analysis Insert Insert Define program risk A program risk encompasses the likelihood of threats that may affect the original course of a particular project (Vona, 2008). The uncertain event can eventually impact how successful a particular project can get. For instance, if requirements of the project change or you encounter errors. Define institutional risk It refers to an occurrence that may prevent an organization from attaining its set objectives. The threat is on the entity that is the institution concerned. Describe how your selected organization incorporates program risk and institutional risk in its security...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Security A+ policy Document Project for FREE!

Contact Us