How will sensitive information be handled

Assignment Help Basic Computer Science
Reference no: EM13542888

A security policy is basically a plan outlining and identifying the company's critical assets. The policy states in writing how these critical assets must and will be protected. The main purpose is to provide staff with a brief overview of the acceptable use of any of the information assets, as well as to explain in detail what is deemed as allowable and what is not. By doing this, you are engaging the staff in the securing of the company's critical systems.

The security policy document acts as a mandatory source of information for everyone using the systems and resources that have been defined as potential targets. A well-developed policy should address the following elements:

How will sensitive information be handled?
How will IDs and passwords be properly maintained?
How will the company respond to a potential security incident, such as intrusion attempts, spam, and so on?
How will the workstations and Internet connectivity be used in a secure manner?
How will the corporate e-mail be properly used and enforced?
Outline a security policy for GCI that addresses the above topics in a Word document of 3-5 pages (excluding title and reference pages).

Reference no: EM13542888

Questions Cloud

Depict a molecular orbital diagram for c2 : Draw a molecular orbital diagram for C2 and use it to predict the bond order and magnetic properties for this gas phase diatomic allotrope of carbon.
Find the maximum force exerted on it by the spring : A 0.76- air cart is attached to a spring and allowed to oscillate. If the displacement of the air cart from equilibrium is x= (10.0cm) cos [(2.00s^-1)t+ pi], Find the maximum force exerted on it by the spring
Explain what is the activation energy for the reaction : A certain first-order reaction has a rate constant of at 25 degrees celsius . If the reaction rate doubles when the temperature is increased to 35 degrees celsius, what is the activation energy for this reaction in kJ/mol
What is the final speed of the crate if jack jumps first : Jack and Jill are standing on a crate at rest on the frictionless, horizontal surface of a frozen pond. What is the final speed of the crate if Jack jumps first and then a few seconds later Jill jumps in the same direction
How will sensitive information be handled : How will sensitive information be handled?
Calculate velocity of each block after they have moved apart : Blocks A (mass 4.50 ) and B (mass 13.00 ) move on a frictionless, horizontal surface. Initially, block B is at rest and block A is moving toward it at 7.00. Find the velocity of each block after they have moved apart
Explain the temperature if the gas is compressed : A gas occupies 74.12L at 41.2 degrees Celsius and 764 mm Hg. What will be the temperature if the gas is compressed to a volume of 44.27L and a pressure of 1002 MM Hg
Maximum speed attained by the object during its motion : A toy of mass 0.155kg is undergoing simple harmonic motion (SHM) on the end of a horizontal spring with force constant 295N/m . When the object is a distance 1.15×10^-2 m from its equilibrium position, it is observed to have a speed of 0.305 m/s. ..
How to use arrays to simplify solving : How to use arrays to simplify solving more complex problems

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a java program that produces a simple formatted report

For this lab you will write a Java program that produces a simple formatted report. The program will prompt the user to enter a file name. This file must contain information in a specific format (detailed below).

  Examine amazon using competitive forces-value chain models

Examine Amazon.com using competitive forces and value chain models. How has it replied to pressures from its competitive environment?

  Describe the conceptual model of a two-dimensional array

Describe the conceptual model of a two-dimensional array. Include in your explanation how a two-dimensional array might be used, why these arrays are similar to tables, and how to declare and initialize a two-dimensional array.

  How many bits in the instruction are used

How many bits in the instruction are used for the opcode?

  Procedural structure of a simple inventory-accounting system

Using a structure chart, recognize the procedural structure of a simple inventory/accounting system for a small store (perhaps a rivately owned curio shop in a resort community)

  Minimum number of edits required to convert string

Given two strings of size m, n and set of operations replace (R), insert (I) and delete (D) all at equal cost. Find minimum number of edits (operations) required to convert one string into another.

  Discuss recent legislation related to ethical computing.

Discuss recent legislation related to ethical computing.

  Which of the following are advantages of the osi model

The OSI model was designed to provide a framework for networking and internetworking standards. Which of the following are advantages of the OSI model?

  What project management practice

how would you determine its risks? • What project management practice, tool, or technique would be the most effective in mitigating that risk? Explain.

  How do i put three numbers in ascending order in ocaml

how do i put three numbers in ascending order in ocaml?

  What are some ways that company''s can use to get the word

Security awareness programs are their so employees cannot make ignorance an excuse. What are some ways that company's can use to get the word out, and to make sure their employees cannot make that excuse?

  Focus on the function and how it is secured by the use

Explain two or three uses for Microsoft Certificate Services. Focus on the function and how it is secured by the use of a PKI.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd