Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. Having a security policy that address acceptable use of these resources is an essential aspect of IT governance and management.
Follow guidelines in the (NIST.SP.800-12r1) document to develop a mock Computer/Internet Security Policy. Your policy document must be a 3-5 page stand-alone document that can be reviewed, maintained and distributed to employees, staff or other stakeholders when necessary. Your policy document must contain at least the following sections:
1. A “Preamble” – it describes
· 1) the scope and applicability of the policy (who is affected by the policy, when and under what conditions);
· 2) a definition of technology covered;
· 3) a confidentiality of data statement;
· 4) Incident response handling procedures;
· 5) Responsibilities (monitoring, reporting violations, penalties for violations, etc.)
· 6) a policy review schedule
2. Physical security
· Acceptable use
· Un-acceptable use
· Back-up and storage strategies
3. Access security
· web access
· network access
· remote access
· Email security
5. Virus protection
Remember to follow APA6 guidelines in citing all sources used. Then also include an APA style reference list as the last page of your Computer/Internet Security Policy. When you have finished writing your Computer/Internet Security Policy document, click the Write Submission link and submit your paper for grading. OR, just paste your entire document as a Word doc attachment.
“Is this question part of your assignment? We Can Help!”
the security was first posted on March 27, 2020 at 12:12 pm.
©2019 "Nursing Researcher". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at email@example.com