Organization security plan forms the foundation

Assignment Help Basic Computer Science
Reference no: EM131368405

An organization's security plan forms the foundation for how information is handled and kept secure. A successful security plan consists of the policies that reflect business needs as well as information for employees on their responsibilities. It also must establish policy for monitoring the plan, and the plan must fit the organization's culture.  First and foremost, you must determine the security topics to be covered, based on a thorough evaluation of potential vulnerabilities, in order to develop a truly comprehensive and effective security plan.

For this Discussion, you will evaluate potential topics to include in a security plan. Make sure your evaluation includes any topics that need to be included for specific problems and breaches. 

Examples for topics:

  • Laptop security while traveling
  • Doing business on your home computer
  • Visitor control
  • Social engineering training
  • Employee web usage
  • E-mail/spam control
  • Building evacuation policy
  • Personal computers/drives at work
  • Smartphone policy
  • Protection from computer viruses

Post your 350- to 500-word evaluation. Make sure that it includes at least two topics you consider critical to a security plan. Explain why these topics are critical, and provide real-world examples that illustrate situations in which these topics have been successfully incorporated into security plans. If real-world examples cannot be found, offer your own examples of how your ideas may be executed.

Reference no: EM131368405

Questions Cloud

How much would this change cost : How easy (difficult) is it to change wiring from twisted pair to fiber optic? Can we use the same network cards in the PCs, or do we need to change them? How much would this change cost?
Write short report about sampling and various sampling types : RES500- Write a short report about sampling and various sampling types.- Measure, using a statistical tool, the central tendency of a sample data of your choice or as provided.
Major limitations of mobile e-commerce : Discuss the major limitations of mobile E-commerce. Which of them are likely to disappear? Why is the electronic job market so popular, especially among the high-tech professions?
Does the relationship fit your expectations : Assume that the DFN will be absorbed by long-term debt and that the total interest rate is 4.50% of LTD. Set up an iterative worksheet to eliminate it.
Organization security plan forms the foundation : An organization's security plan forms the foundation for how information is handled and kept secure. A successful security plan consists of the policies that reflect business needs as well as information for employees on their responsibilities.
Explain the relationship between ethical leader and follower : What do you believe are the most important characteristics of ethical leadership? Describe the relationship between the ethical leader and the follower.
Write a java program to accomplish : Write a Java program to accomplish the following tasks. After you are done, send the original Java code along with screenshots of the result.
Create an array of people first names : Create an array of people's first names. Using a loop, read the names from a text (txt) file, and store each one into the array. The array should allow for a maximum of 100 entries. Continue to read in first names and store them into the array. Th..
Create a common-size income statement : To retrieve the data for your company, go to the Stocks area and enter the ticker symbol. Finally, choose Financials and then the statement type.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define statistical measurement terminology

Identify and describe the techniques for controlling project quality.

  Reduce the potential for economic damage

Disaster planning can help eliminate and reduce the potential for economic damage, loss of life, and destruction of property during a disaster. This task will focus on the recovery phase of the disaster recovery cycle.

  Which account is designated as the owner of a relation

Which account is designated as the owner of a relation? What privileges does the owner of a relation have?

  Compute the key pairs kao and kbo

We reconsider the Diffie-Hellman key exchange protocol. Assume now that Oscar runs an active man-in-the-middle attack against the key exchange as explained in Sect. 13.3.1.

  Find a partner

To relieve some programming burden, project 5 is a group project that two students can form a group to do and submit one report. In your submitted report, please specify who is your partner. Of course, you can do this project alone if you want to or ..

  Computer networking has made some significant changes

Computer networking has made some significant changes in all our lives. Network standards are essential in network communications. Consider your life today and how it would be different without networking and standards.

  How do we implement this

How do we implement this?

  It architecture or enterprise architecture on information

Ascertain the importance of information management for the company or industry that you have chosen.Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine ..

  Growth and employment in these two countries

Analyze the role of credit rationing in both a developed country and a less-developed country. How does the role of credit rationing influence economic growth and employment in these two countries?

  Electronic health record

Write a paper on Electronic Health Record (EHR) Research and Summary.

  The purpose of the project plans are to demonstrate mastery

The  purpose of the project plans are to demonstrate mastery of project planning using an  applied context. The draft project plan includes all of the project plan elements covered in  Module 1 and 2. The final project plan includes all of the projec..

  Polynomial-time algorithm to test dependency-preservation

Projecting the FDs stated over a set of attributes X onto a subset of attributes Y requires that we consider the closure of the FDs. Give an example where considering the closure is important in testing dependency-preservation; that is, considerin..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd