We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
2/4 steps

How Many Pages?

3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Get Offer

Security Policy Creation

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

A Security Policy is a plan outlining what the critical assets are and how they must (and can be) protected. Its main purpose is to provide staff with a brief overview of the acceptable use of any of the information assets as well as explaining about conduct and what is deemed as allowable and what is not. This document is a ‘must read’ source of information for everyone using in any way systems and resources defined as potential targets. The start procedure for a security policy requires a complete exploration of our network, as well as every other critical asset, so that the appropriate measures can be effectively implemented.

Don't use plagiarized sources. Get Your Custom Essay on
Security Policy Creation
Just from $13,9/Page
Get custom paper

Everything starts with identifying our critical information resources Why do we need a Security Policy? This is without a doubt the first measure that must be taken to reduce the risk of the unacceptable use of any of our information resources. A security policy is the first step towards enhancing our security.

We need security so that we can inform staff on the various aspects of their responsibilities, inform staff on the general use of company resources, explain to staff how sensitive information and argue quantities of money should be handled, and inform staff of the meaning of acceptable use.

The development of the security policy is highly beneficial to us as it will turn all staff members into participants in the company’s efforts to secure its communication. Having a security policy will also define the company’s critical assets and how they must be protected, as well as serving as a centralized document as far as protecting information security assets is concerned. Here is a list outlining various potential threats to the organization’s Internet security. It s important that all staff are aware of these things while using the organization’s IT systems.

The following are threats to the company’s internet security: E- Mail Use: E- Mail use should be strictly limited for management and the IT department. Personal e-mail addresses are not allowed to be used in working hours, only working e-mail address. No private information about the company is to be given out by e-mail unless authorized to do so by management. Web Browsing: All of our computers have been updated with security restrictions to sites of a malicious or bad nature that may bring shame on a staff member and he company.

All internet usage is strictly monitored to protect our company’s internal systems. Instant Messaging: Although IM is a very effective way of communication it poses a big threat to internet security as potentially very disastrous viruses may be spread through a conversation that could potentially destroy our companies system. Instant Messaging is a strictly forbidden way of communication for any members of staff to use. Passwords: All members of staff have their own passwords to log on to the system.

These passwords must be ten harassers in length consisting of four numerical digits, capital and lowercase letters and at least one special character. We hope that this Security Policy will be of great help to everyone within the organization. All staff should understand every aspect of the Policy and try to implement it wherever is possible, just as management in the organization will be striving to do. This Policy will be updated every 6 years for the benefit of the organization. Copies if this Policy are available from the Security Officer or from any members of management so just ask if need a copy to read.

Cite this Security Policy Creation

Security Policy Creation. (2018, Jul 01). Retrieved from https://graduateway.com/security-policy-creation/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page