Preparation of Security Policies for Review

Preparation of Security Policies for Review

Name:

Institution:

Preparation of Security Policies for Review

Normally, a security policy must satisfy numerous objectives. These may include protection of the information and people and the institution of regulations for the required behavior among users, management, system administrators, and security personnel. However, in the process of review, the security policies specifically for large organizations may be complex due to the inclusion of different subject matters. In fact, the development of a sole policy document for all forms of users may be impossible in relation to addressing the issues pertinent to information security. In this respect, while carrying out a review, it is imperative to consider the factors that may actually facilitate or restrict the policy document in terms of implementation within the enterprise culture. One of the cultural considerations will comprise the different types of users that exist. Large organizations tend to have multivariate users that contribute significantly to the specified goals and objectives (Vacca, 2013). Hence, establishing a single document for such disparate entities may be considerably convoluted and difficult. In this case, the author will need to take note of the needs and specifications of the different users within the corporations. This is because demands will definitely vary between user groups such as the security personnel and the system administration. Based on this, the author will need to develop a set of policies that cover all the bases of information security. These may be suited for specified audiences and in the end, establish a more effective process for every user. Another aspect to consider involves the sensitive nature of the organization’s information (Vacca, 2013). The prime aim of security policies involves the protection of information at all costs. Allowing the information to enter into the wrong hands will definitely affect the entire enterprise negatively. In this case, the author will need to be aware of the level of information sensitivity and construct a policy that covers all the security loopholes.  

Reference

Vacca, J. R. (2013). Computer and information security handbook. New York, NY: Elsevier.

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed

54

100% original papers

We sell only unique pieces of writing completed according to your demands.

54

Confidential service

We use security encryption to keep your personal data protected.

54

Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
Deadline
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order
Verified by MonsterInsights