Establishment of a security policy

Assignment Help Other Subject
Reference no: EM132950059

"Security Policy"

The establishment of a security policy is critically important to ensure that organization has the necessary plans and procedures in place to safeguard its information assets. Without an effective policy, many aspects of information security will be unenforceable.

Part 1
Investigate the security policies of Anglia Ruskin University and compare the policies with any other institution/organisation of your choice. The following policies should be highlighted and compared in the investigation.
1. Network and Internet Usage Policy
a. What type of restrictions are placed on the use of the network and Internet? Or a variety of reasons, networks and the internet are used to transport and download sensitive and confidential information. As a result, many people intend to steal or misappropriate data. In Anglia Ruskin University, you must not attempt to alter any connection, configuration without being allowed for university and must not inappropriate extend any wi-fi cable or install any software or hardware (Anglia Ruskin University policy). Meanwhile, Northumbria University has been placed other restriction about network security as Firewalls, Intrusion Prevention System, Mail, and Web Filtering, Anti-Virus. Also, a connection of equipment to the network of the university must be approved by IT Security Manager and users must respect the physical network configuration of University networks. Both universities have been created network policies to established secure systems and protect sensitive data from their users. Likewise, both universities ensure all components of the CIA be fully complied with.
2. Password Policy
a. What are the specific instructions for creating passwords?
Concerning creating password both universities have created a series of rules to create a password as minimum characters, contain letters, numbers and special characters. Meanwhile, Anglia Ruskin university encourages the user to change the password when it expired, Northumbria university specific the rule clearer about password change password every 90 days. Both universities include their password policy, not writing the password down or do not share with someone else, also not use something obvious as name, surname, or a dictionary word.

Part 2
After checking examples of policies, you will do some research and write policy statements for an "Email Usage Policy".
Email
• Read communications before sending them to ensure that they are clear and that they do not contain any unintentional discrimination, harassment, or defamation.
• Large attachments and videos should not be sent by email.
• Only open email links and attachments if they come from a trusted source.
• Never respond to spam messages.

Reference no: EM132950059

Questions Cloud

Compute for the estimated value of inventory damaged by fire : Fire occurred at the factory of Burny Corporation, Compute for the estimated value of inventory damaged by fire. Present solutions in good accounting form.
Record the journal entry for the issuance of the note : Zuri Corporation borrowed $100,000 on October 31, 2021 by signing a 4-year, 5% instalment note. Record the journal entry for the issuance of the note
Make a flow diagram showing the steps : You and a close friend whom you know for the past ten years have decided to set up a Restaurant together. Your friend has recently inherited $150,000 and would
Calculate variable overhead spending and efficiency variance : Standard direct labor hours 1.2 direct labor hours per package. Calculate the variable overhead spending and efficiency variances
Establishment of a security policy : Establishment of a security policy is critically important to ensure that organization has the necessary plans and procedures in place to safeguard
Conduct a statistical test for problem : A company believes that it controls more than 30% of the total market share for one of its products. To prove this belief, a random sample of 144 purchases of t
Business process re-engineering : Identify how an organization can use business process re-engineering to improve its business.
Timing and extent of substantive procedures : Explain how the information provided above would affect the nature, timing and extent of substantive procedures for occupancy revenue in situation (i) and purch
How can hedge the exposure using currency futures : Explain how you can hedge the above exposure using currency futures. The one- year forward rate is $0.12/¥. Show the example for one trapdoor.

Reviews

Write a Review

Other Subject Questions & Answers

  Explain the recent drops in us crime rates

How would a power control theorists explain the recent drops in US crime rates considering recent changes in American culture

  Why has education become standardized around the world

Schooling is arguably the most global institution in the world. Schools can be found in virtually every country, and every government provides education.

  How would you implement community health interventions

Visit the Christian Hospital website and choose a health concern issue relevant to your community. After choosing one, take the health risk assessment related.

  Demonstrate use of endnote for the articles

Provide screenshots to demonstrate use of Endnote for the articles used for this assignment. The result of this Individual Project should demonstrate how you.

  Define and esplain the kenite hypotheses

Define and esplain the Kenite hypotheses. Why do many historians think that the worship of YHWH originated in Midian? How does the Exodus account link Jethro, priest of Midian, with Moses?

  Derive kleitmans algorithm

Use Kleitmans algorithm to prove or disprove that the network shown in Fig. is 3-connected. What is the maximum k for which the network is k-connected?

  How does cognitive psychology help us understand altruism

How does cognitive psychology help us understand altruism, if at all? Examine how cultural differences could impact this debate

  What rules govern dress for women and men

African clothing is the traditional clothing, often vibrantly coloured, worn by the indigenous peoples of Africa. In some instances these traditional garments have been replaced by western clothing introduced by European colonialists.

  Which sleep disorder is it

Jacob is asleep and all of the sudden he sits up and screams at the top of his lungs. He then lays back down and goes back to sleep. The next morning he doesn%u2019t remember anything.

  Provide an overview of the organizations utilization

Identify the organization you researched and include the URL for the page of the utilization management plan that you examined.

  Federal alcohol administration act

Because of the Federal Alcohol Administration Act prohibits beer labels from displaying alcohol content, the federal Bureau of Alcohol, Tobacco and Firearms rej

  The importance of proper coding in order

HS 440 Unit 2 Assignment need a good example regarding the importance of proper coding in order to ensure prompt reimbursement. In the report, the Board requires an introductory paragraph that should summarize the role of finance in Health Care Syste..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd