the security

Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. Having a security policy that address acceptable use of these resources is an essential aspect of IT governance and management.

Follow guidelines in the (NIST.SP.800-12r1) document to develop a mock Computer/Internet Security Policy. Your policy document must be a 3-5 page stand-alone document that can be reviewed, maintained and distributed to employees, staff or other stakeholders when necessary. Your policy document must contain at least the following sections:

Connect with a professional writer in 5 simple steps

Please provide as many details about your writing struggle as possible

Academic level of your paper

Type of Paper

When is it due?

How many pages is this assigment?

1. A “Preamble” – it describes

· 1) the scope and applicability of the policy (who is affected by the policy, when and under what conditions);

· 2) a definition of technology covered;

· 3) a confidentiality of data statement;

· 4) Incident response handling procedures;

· 5) Responsibilities (monitoring, reporting violations, penalties for violations, etc.)

· 6) a policy review schedule

2. Physical security

· Acceptable use

· Un-acceptable use

· Back-up and storage strategies

3. Access security

· Device

· passwords

· web access

· network access

· remote access

· mobile

· wireless

· Email security

5. Virus protection

Remember to follow APA6 guidelines in citing all sources used. Then also include an APA style reference list as the last page of your Computer/Internet Security Policy. When you have finished writing your Computer/Internet Security Policy document, click the Write Submission link and submit your paper for grading. OR, just paste your entire document as a Word doc attachment.


“Is this question part of your assignment? We Can Help!”

the security was first posted on March 27, 2020 at 12:12 pm.
©2019 "Nursing Researcher". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at