How will sensitive information be handled

Assignment Help Basic Computer Science
Reference no: EM13542888

A security policy is basically a plan outlining and identifying the company's critical assets. The policy states in writing how these critical assets must and will be protected. The main purpose is to provide staff with a brief overview of the acceptable use of any of the information assets, as well as to explain in detail what is deemed as allowable and what is not. By doing this, you are engaging the staff in the securing of the company's critical systems.

The security policy document acts as a mandatory source of information for everyone using the systems and resources that have been defined as potential targets. A well-developed policy should address the following elements:

How will sensitive information be handled?
How will IDs and passwords be properly maintained?
How will the company respond to a potential security incident, such as intrusion attempts, spam, and so on?
How will the workstations and Internet connectivity be used in a secure manner?
How will the corporate e-mail be properly used and enforced?
Outline a security policy for GCI that addresses the above topics in a Word document of 3-5 pages (excluding title and reference pages).

Reference no: EM13542888

Questions Cloud

Depict a molecular orbital diagram for c2 : Draw a molecular orbital diagram for C2 and use it to predict the bond order and magnetic properties for this gas phase diatomic allotrope of carbon.
Find the maximum force exerted on it by the spring : A 0.76- air cart is attached to a spring and allowed to oscillate. If the displacement of the air cart from equilibrium is x= (10.0cm) cos [(2.00s^-1)t+ pi], Find the maximum force exerted on it by the spring
Explain what is the activation energy for the reaction : A certain first-order reaction has a rate constant of at 25 degrees celsius . If the reaction rate doubles when the temperature is increased to 35 degrees celsius, what is the activation energy for this reaction in kJ/mol
What is the final speed of the crate if jack jumps first : Jack and Jill are standing on a crate at rest on the frictionless, horizontal surface of a frozen pond. What is the final speed of the crate if Jack jumps first and then a few seconds later Jill jumps in the same direction
How will sensitive information be handled : How will sensitive information be handled?
Calculate velocity of each block after they have moved apart : Blocks A (mass 4.50 ) and B (mass 13.00 ) move on a frictionless, horizontal surface. Initially, block B is at rest and block A is moving toward it at 7.00. Find the velocity of each block after they have moved apart
Explain the temperature if the gas is compressed : A gas occupies 74.12L at 41.2 degrees Celsius and 764 mm Hg. What will be the temperature if the gas is compressed to a volume of 44.27L and a pressure of 1002 MM Hg
Maximum speed attained by the object during its motion : A toy of mass 0.155kg is undergoing simple harmonic motion (SHM) on the end of a horizontal spring with force constant 295N/m . When the object is a distance 1.15×10^-2 m from its equilibrium position, it is observed to have a speed of 0.305 m/s. ..
How to use arrays to simplify solving : How to use arrays to simplify solving more complex problems

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd