Saturday, April 27, 2019

Security A+ policy Document Project Case Study Example | Topics and Well Written Essays - 2250 words

surety A+ insurance Document Project - Case Study Example vocation dealings, processes and tasks. However, in secernate to achieve these objectives, policies and procedures that be already in place such as, Acceptable Use Policy of planetary Distribution, Inc. training guarantor is the basis for the business that must be incorporated into each element of the transcription for instance, administrative service, planning and development, sales and market placeing and operations. In addition, these functions need particular controls for mitigating the risk from normal business operations. State and federal laws that are associated with culture security system and privacy policies are applicable to international Distribution, Inc., as non-compliance will impose fines, stakeholder confidence, audits and direct revenue loss for Global Distribution, Inc. 1.1 Overview info security has now conk out everyones business. In fact, every member of staff present at Global Distribution, Inc.is responsible in making themselves alert with the compliance with Global Distribution, Inc. policies, procedures and standards connected with information security. Similarly, a policy is measured as a strategic control followed by budgets and organizations (Osborne, 2006). Information Security is defined as The protection of information systems against un true access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats (Vacca, 2009). The three fundamental objectives regarding Information Security includes Confidentiality, Integrity and Availability. This policy draft is based on these three objectives. 2 Purpose of Establishing Information Security Policy An Information Security policy is required by the Global Distribution, Inc. in do to secure information resources f rom upcoming threats. This is to establish confidence in stakeholder. Moreover, valuable benefits are achieved in the market by securing information security resources. In addition, maximum profit along with trust is generated among the organizations. However, security of either organization does not fully depend on Information technology. Other sources regarding threats to an organization includes vandalism, sabotage, espionage, natural disasters, online frauds, phishing etcetera In fact, cyber-crimes can also compromise networks while data in transit. Some of the other threats are non-ethical hacking, viruses, Trojan, malicious codes and denial of service attacks. 2.1 Success Factors In order to implement an effective and successful security policy within Global Distribution, Inc. these factors should be made into consideration Absolute and inclusive security policy along with security objectives that is parallel to the business objectives of Global Distribution, Inc. A methodol ogy that is compatible along with the Global Distribution, Inc. In order to support Global Distribution, Inc., a comprehensive and visible senior management is needed. exceedingly visible support from Global Distribution, Inc. executive management. Complete and thorough information regarding risk management and security requirement practices. Security requirements are communicated to the Global Distribution, Inc. managers, business partners, clients, software developers and outsourced

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.