Nobody downloaded yet

Information Security Policy - Essay Example

Comments (0) Cite this document
Summary
The purpose of the Information Security Policy is to safeguard the Information Technology based assets of Strega Oil and Gas Company from all threats whether internal, external, deliberate or accidental.
This Information Security policy of Strega Oil and Gas aims at protecting all the systems of the company belonging to the Information Technology infrastructure…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Information Security Policy
Read TextPreview

Extract of sample "Information Security Policy"

Download file to see previous pages Regular updates and standards will be provided to support the policy.
The Head of Information Compliance & Policy has direct responsibility for maintaining the policy and providing advice and guidance on its implementation.
Managers are directly responsible for adherence to and implementation of the policy within their business domains and also to the adherence by their staff.


Signed: ______________________

Title: ______________________ Date: ___________________



















Introduction

This Information Security policy of Strega Oil and Gas aims at protecting all the systems of the company belonging to the Information Technology infrastructure. The protection is needed from any activity that may jeopardise the successful operations of the company. These harmful activities may be a result of an unintentional threat such as a natural calamity or a deliberate attempt by a member of the company or an outsider to cause any harm. The following sections will include a brief on Strega Oil and Gas Company and the need and use of the Information Security Policy.

A Brief on the Company

Strega Oil and Gas is a privately owned company with its exposure in production and retailing of Natural Oil and Gas. The company's central Head Office is located at Deep Park, Texas. Apart from having a production centre at Deep Park, the company also has a unit at Baton Rouge, Los Angeles. The company is operating for over 10 years, and it is now a mid size industrial company with a workforce of 1500 employees. Being a massively successful and profit making company, for the previous year ended 2005 - 2006, Strega recorded revenue of 15m $. Information Technology acts as a corner stone of the...
The following sections will include a brief on Strega Oil and Gas Company and the need and use of the Information Security Policy.
Strega Oil and Gas is a privately owned company with its exposure in production and retailing of Natural Oil and Gas. The company's central Head Office is located at Deep Park, Texas. Apart from having a production centre at Deep Park, the company also has a unit at Baton Rouge, Los Angeles. The company is operating for over 10 years, and it is now a mid size industrial company with a workforce of 1500 employees. Being a massively successful and profit making company, for the previous year ended 2005 - 2006, Strega recorded revenue of 15m $. Information Technology acts as a corner stone of the company's success. The company relies heavily of latest computing systems, networking equipments, databases and ancillaries. All internal operations of the company and communicated via intranet. The company conducts business with third party companies such as its suppliers and agents over the extranet. The company is also involved in E Commerce over the public Internet. This policy aims at providing measures to secure all the IT assets of the company from technological and physical threats.
Strega Oil and Gas Company will seek to ensure all three aspects of a secure IT infrastructure viz. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Policy Essay Example | Topics and Well Written Essays - 9750 words”, n.d.)
Information Security Policy Essay Example | Topics and Well Written Essays - 9750 words. Retrieved from https://studentshare.org/miscellaneous/1530764-information-security-policy
(Information Security Policy Essay Example | Topics and Well Written Essays - 9750 Words)
Information Security Policy Essay Example | Topics and Well Written Essays - 9750 Words. https://studentshare.org/miscellaneous/1530764-information-security-policy.
“Information Security Policy Essay Example | Topics and Well Written Essays - 9750 Words”, n.d. https://studentshare.org/miscellaneous/1530764-information-security-policy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Security Policy

Information security policy

.... As there is a requirement of protecting this digital information internally and externally, policy is a control that provides necessary steps, procedures and processes to protect information. These are also considered as high level statements derived from the board of the organization. “Information security policy is therefore considered an essential tool for information security management” (Ilvonen 2009). However, information security policy is customized by company to company and department to department. Different factor that may influence to tailor...
10 Pages(2500 words)Essay

Information Security Policy Document (ISPD)

...?Univesity Of Wales port campus) Information Security Policy Document Bespoke Forensic and Information Security Laboratory 9 Table of Contents Introduction and Methodology ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 2-4 Information Security Policy Document (ISPD) ~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 4-9 Purpose ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 4 Scope ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 5 Policy ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 5 Ownership Responsibilities ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 5 Universal Configuration Necessities...
9 Pages(2250 words)Assignment

Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities, and Threats

...? Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities, and Threats This paper presents a case study for the adoption of e-government in Saudi Arabia where various organizations are studied. The study uses qualitative methods approach where interviews are conducted to various people in various capacities. Literature review also focuses on the scope of e-government adoption in Saudi Arabia and the vulnerabilities of this system of governance. Empirical results demonstrate the e-government application has lots of benefits but it prone to attack from various sources. Introduction Most governments in their attempts to advance their service delivery to...
10 Pages(2500 words)Research Proposal

Information Security

...should strike a balance between information security and information sclerosis and what professional competencies ought to oversee information security policies, procedures, and practices. Striking a Balance: An Incremental Approach to Information Security As an initial matter, it should be noted that information security can be neglected by business organizations (National Institute of Standards and Technology, 1998) as well be over-hyped and made far too complex for complete use (Angus, 2005; Miller, 2005). The most prudent course of action, to be sure, is neither...
4 Pages(1000 words)Essay

Information Security

...information. There are people who accepted hacking as their main revenue source and they are capable of breaking the firewalls created for the protection of the information stored in a computer. It is easy for a hacker to break the firewalls and plant viruses inside a computer apart from taking out all the information he or she wants. Earlier information security solutions mainly focused on preventing the external threats. But currently organizations realized that internal threat is as important as the external threats. The employees can easily export sensitive company information through emails. “Many companies simply do not have the...
6 Pages(1500 words)Term Paper

Information Security

...Information Security Table of Contents Table of Contents 2 An Overview of Information Security 3 Ensuring the Effectiveness of the Information Security Policies 3 Policies and Measures 4 Protection of the Data and the Steps Involved 5 Enhancing the Information Security 6 References 7 An Overview of Information Security The basic concept of the information security in an organization involves providing assistance to the organization’s mission. Every individual organization is open to the elements of...
2 Pages(500 words)Essay

Information Security Policy: Development Guide for Large and Small Companies

...Information Security Policy: Development Guide for Large and Small Companies Information security laws and practices involve the ways of ensuring that organizations protect and manages their information, that is, in a confidential and safe manner, in order to prevent it from getting lost or being distorted for the purpose of achieving laid goals. The government, organizations and businesses should be careful in the way they disseminate or disclose information. These include practices such as preventing any unauthorized personnel from such delicate sources, use or alteration of information. Businesses,...
2 Pages(500 words)Case Study

Information Systems Use Security Policy

...Computer Science & Information Technology Information Systems Use Security Policy In an organization, information management systems are in most cases used in decision-making and co-ordination of tasks in the organization and the industry (Sousa & Effey, 2014). For a business that is experiencing growth, information systems allow the company to become highly competitive and adapt to market changes. For example, service delivery advancements, creation of new business models and using just-in-time inventory would not be possible if it were not for the use of information systems. However, using the...
3 Pages(750 words)Assignment

The Role of Information Security Policy

...The Role of Information Security Policy Information is the strategic asset in an organization since it contains all the crucial planning in their running. Information systems security policies are the central repository that protects the assets of an organization by addressing threats. This has made many organizations to prioritize in developing information security policies to avoid damages. Therefore, an Information Systems Security strategy ensures effective procedures as well as assists for information security across the whole organization. The size and nature of firm normally influences the sophistication and scope of a security policy. Regardless of all these, the essence for a security policy on information systems... is...
4 Pages(1000 words)Essay

Public Privacy and Information Security Policy

...to come out of the distress and resume normal living. International Policy Change: While the Geneva Conventions govern a huge amount of wartime decisions and punishments between two countries, US has used an immediate punishment protocol that uses third degree torture to extract information from doubtful people right from the start. This approach is not welcome in domestic grounds, but helps in regulating problems like extremism and terrorism that is intrinsic to the country (Beard, 2007, 45). In short, if there is a certain amount of finesse and accuracy brought into the system, the Homeland and National Security departments set a good example of heightened security...
13 Pages(3250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Information Security Policy for FREE!

Contact Us