Organization security plan forms the foundation

Assignment Help Basic Computer Science
Reference no: EM131368405

An organization's security plan forms the foundation for how information is handled and kept secure. A successful security plan consists of the policies that reflect business needs as well as information for employees on their responsibilities. It also must establish policy for monitoring the plan, and the plan must fit the organization's culture.  First and foremost, you must determine the security topics to be covered, based on a thorough evaluation of potential vulnerabilities, in order to develop a truly comprehensive and effective security plan.

For this Discussion, you will evaluate potential topics to include in a security plan. Make sure your evaluation includes any topics that need to be included for specific problems and breaches. 

Examples for topics:

  • Laptop security while traveling
  • Doing business on your home computer
  • Visitor control
  • Social engineering training
  • Employee web usage
  • E-mail/spam control
  • Building evacuation policy
  • Personal computers/drives at work
  • Smartphone policy
  • Protection from computer viruses

Post your 350- to 500-word evaluation. Make sure that it includes at least two topics you consider critical to a security plan. Explain why these topics are critical, and provide real-world examples that illustrate situations in which these topics have been successfully incorporated into security plans. If real-world examples cannot be found, offer your own examples of how your ideas may be executed.

Reference no: EM131368405

Questions Cloud

How much would this change cost : How easy (difficult) is it to change wiring from twisted pair to fiber optic? Can we use the same network cards in the PCs, or do we need to change them? How much would this change cost?
Write short report about sampling and various sampling types : RES500- Write a short report about sampling and various sampling types.- Measure, using a statistical tool, the central tendency of a sample data of your choice or as provided.
Major limitations of mobile e-commerce : Discuss the major limitations of mobile E-commerce. Which of them are likely to disappear? Why is the electronic job market so popular, especially among the high-tech professions?
Does the relationship fit your expectations : Assume that the DFN will be absorbed by long-term debt and that the total interest rate is 4.50% of LTD. Set up an iterative worksheet to eliminate it.
Organization security plan forms the foundation : An organization's security plan forms the foundation for how information is handled and kept secure. A successful security plan consists of the policies that reflect business needs as well as information for employees on their responsibilities.
Explain the relationship between ethical leader and follower : What do you believe are the most important characteristics of ethical leadership? Describe the relationship between the ethical leader and the follower.
Write a java program to accomplish : Write a Java program to accomplish the following tasks. After you are done, send the original Java code along with screenshots of the result.
Create an array of people first names : Create an array of people's first names. Using a loop, read the names from a text (txt) file, and store each one into the array. The array should allow for a maximum of 100 entries. Continue to read in first names and store them into the array. Th..
Create a common-size income statement : To retrieve the data for your company, go to the Stocks area and enter the ticker symbol. Finally, choose Financials and then the statement type.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Supply and demand curve for bicycles

What happens in a supply and demand curve for bicycles when a video showing a terrible bicycle crash goes viral?

  Write a report on the topic enviroment

Environment is our surroundings which includes living & non-living factors and their  interactions with each other. It is also defined as sum total of all social, economical,  biological, physical or chemical factors. It is the surroundings of ma..

  Design and draw a form that lists possible potatoes

Design and draw a form (you choose the size, but be sensible) that lists possible potatoes and toppings in a manner that is easy for counter servers and kitchen crew to scan, and can also be used as input for the inventory/reorder system that is o..

  Information and record the data

How does the person conducting a Job Analysis study using the interview approach actually collect the information and record the data that they are collecting?

  Quantitative research-article summary

This assignment is aimed at giving students an opportunity to select and analyze a real quantitative (qualitative is written in the classroom) research study and explain how it may or may not be able to help improve an aspect of health care delive..

  Write a program that computes terms of the fibonacci series

Write a program that computes terms of the Fibonacci series

  The feasibility study-assignment overview

IT systems are a major capital investment and the systems analyst is called to investigate the feasibility of a system and help answer the questions - Will the system pay for itself? In how long will it pay off? Are the other technologies that wil..

  How many decibels this system is inferior to a dsb-sc system

An AM transmitter is modulated 40% by a sine-wave audio test tone. This AM signal is transmitted over an additive white Gaussian noise channel. Evaluate the noise performance of this system and determine by how many decibels this system is inferio..

  Tools to perform project management processes

Describe in scholarly detail the tools and techniques that are used for prforming project management processes.

  Write a function named "subtotal" takes as its arguments

The function should replace the contents of each cell with the sum of the contents of all the cells in the original array from the left end to the cell in question. Thus, for example, if the array passed to the function looks like this:

  Difference between cyber crimes and cyber-related crimes.

Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.

  What are the estimates for each of these queries

What are the estimates for each of these queries? How close are the estimates?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd