This website uses cookies to ensure you have the best experience. Learn more

The Role Of Security Policy Essay

1089 words - 4 pages

All companies and organizations have information that must be secured. This information is secured using security policies and standards. These security policies are practiced by the employees and written for the information systems. The employees will use the policies for the system to protect the information. The roles of the employees are also considered for the protection of information. Role-based access control (RBAC) is another way that a company or organization can use for policies and standards.

Security Policy

Companies and organizations use security policies to protect information. A security policy is a document that informs a company how to protect the physical and information technology (Rouse, 2007). The security policy document would be constantly updated with any changes in the company's information. A company with multiple systems that contain different information must have the security policies to protect the information. Security policies can be used within companies and organizations for the different systems. The policies would be used for the systems to write how the systems would work and function. The policies have rules that would tell how the systems would function. Some rules that need to be followed by companies when creating policies include never conflict with law, be able to stand up in court if challenged, and be properly supported and administered (Whitman & Mattford, "Ch 4: Information Security Policy," 2010). The rules and policies would also need to pass any questions that may arise on the policies. The questions would be from management or the law to make sure the policies for the systems are adequate. Any questions that do arise, the company would have to show the policies are protecting the company's information. The security policies would state how the information must be protected. As the information in the systems change, the policies for the systems would also need to be updated to the information.

Role of Employees

Employees have a great role when it comes to working at companies and organizations to help protect information. The companies and organizations have employees in different sections completing different tasks. One section could work on the systems that contain the information. These employees would work on how the information would be kept and secure. A second section could work on the policies the that for the system. The policies are written for the system's protection of information. These policies would be written while the system is written, but the policies would have to be updated as the system makes changes. This would ensure the policies and the system are up to date and match. A third section could check to make sure the security policies will match up with the system. These employees would check the security policies and see if the policies will be suffice for the system. If any of the policies are not suffice, the employees would send the policy back to the writers to...

Find Another Essay On The Role of Security Policy

The Deployment of Security Policy in Information Systems

1556 words - 7 pages Database auditing is considered as a contemporary article on database due to a vital role on the database security (Abraham, etal .,2002). There are many different of motivations that make one very excited to do this work , Nevertheless there are millions of database transactions that being executed among different of hosts all-round the organization sites. There are many question arise such as How to do some statistical analysis on database

The Deployment of Security Policy in Information Systems

1024 words - 5 pages has tested three database auditing tools (AUDIT_TRAIL, LOGMINER, FLASHBACK). In this respect, the results demonstrate the security efficiency for each tool, moreover, the three database auditing tools which have been provided by Oracle enterprise they have been tested in the light of suspicious activities detection. In this work, the researcher explains and clarifies the realistic implementation of database auditing tools, while table (11

The Role of "White Hat" Hackers in Information Security

2076 words - 9 pages massive problems, and that your current staff, while competent in basic administrative issues, cannot handle the world of information security. You are advised that the most important thing you need is a comprehensive security policy. You will be offered either a rewrite of an existing policy or an entirely new policy. The fee will be enormous, and it will be obvious that the only people qualified to develop your new policy are the ones that did the

Water Security: The Role of Government and Legistlature

1615 words - 6 pages would be facing water issues ( 2014). There are many other issues including the affects water issues can have on aquatics life, animal life in general and the strain put on environment. Governments role It is Governments job to deal with all the aspects of water security including, water accessibility, water conservation, water quality, water protection, water management, water sustainability and water demands etc. Traditional

Role of the National Cyberspace for American National Security

3032 words - 12 pages Role of the National Cyberspace for American National SecurityTerrified, panic, chaos and terrorism. These are a few words that could be used to describe the terrorist attacks on the United States during the day of September 11, 2001. These attacks scarred American history and everyone who remembers it forever. But imagine if the terrorist who organized these attacks also had attacked the United States cyberspace. What if terrorist used

Role of the States In Health Care Policy

1036 words - 4 pages Department, n.d.). Even though these laboratories can become back-logged, they are needed for their role in protecting its citizens. Our system is a very complicated integration of subsystems that involves several parties to make a health policy work; and that is clearly evident in the making of the Health Care and Education Reconciliation Act of 2010. The process of health policy is long and complex, but it must be an informed process that

The Role of Government Policy in South East Asia in the Role of Globalisation

1180 words - 5 pages The Role of Government Policy in South East Asia in the Role of Globalisation Globalisation cannot be defined as one, single process. It is a complex of processes including aspects such as the growth of global trade routes and global markets. Globalisation is linked to the growth of supraterritorial relations between people. This is the idea that international borders are becoming permeable, and that the time space

The Common Foreign And Security Policy Of The EU At The Beginning Of The 21st Century

964 words - 4 pages that "economic stuff". But today the economic cooperation forms only the first of the "three pillars" of the Union. There are two other more incorporated in the Treaty: The Common Foreign and Security Policy of the EU (the CFSP) and Cooperation in the fields of justice and home affairs. Let me focus on the second pillar, the CFSP.Where stands the reason for "neglecting" this obviously important part of every state´s policy, the Defence and

How the intergovernmental nature of the Common Foreign Security Policy prevents the EU's external progress

4297 words - 17 pages ideologically divided Europe; the break-up of the Soviet Union not only signified an opportunity for the unification of Europe, but it also meant the eventual incorporation of newly liberated Communist states into the European Union's realm of liberty, security, prosperity and social democracy. As the European Security Cooperation (ESC) was superseded by the Common Foreign Security Policy (CFSP) in the Maastricht Treaty in 1993, the need for a

Research in the area of Information Security at Corporate Websites including the role of "Privacy Seals"

3857 words - 15 pages Research in the area of Information Security at Corporate Websites including the role of "Privacy Seals"The moot question that needs to be answered before one starts the analysis of research in the area of web security is to gauge the importance of electronic commerce. Electronic Commerce has taken the world by storm and is perhaps the fastest growing frontiers in the business arena. The sheer statistics tells a story that is often untold and

'The UN has failed in its central role, the maintenance of international peace and security." Discuss

2045 words - 8 pages role in maintaining international peace and security because of the constant use of the veto by the great powers."It is widely recognized that the UN has enjoyed the least success in its military role. In the Korean War in 1950-1953, the UN gave legitimacy to US troops for going into S. Korea. At first, this was done for the defense of S. Korea, but as the war progressed, the US troops continued advancing and attacked N. Korea. This example shows

Similar Essays

The Role Of Information Security Policy

941 words - 4 pages Implementation of policies and standards within an organization are important to maintain information systems security. Employees within an organization play a huge role in the effort to create, execute, and enforce a security policy. Every business requires a different strategy and approach to it's security policy, depending on their size and nature of business. Security Policies An organization's security policy describes the company's

The Role Of Business In Foreign Policy

1665 words - 7 pages Throughout the course of American history, business-related interests have played a predominant role in influencing foreign policy. Foreign policy determines how America conducts its relations with other countries. It is designed to further certain goals such as security and trade. More importantly foreign policy seeks to ensure America’s security and defense and its ability to protect America’s national interests around the world. National

The Role Of Government In Policy Making

750 words - 3 pages the legislation. (Social Policy and Social Programs)The judicial branch of government has the most important role in deciding what programs can be used to help serve clients. It can also stop programs at any given time.Family and Children Services of Niagara INC., is influenced by the people of the community who may need help in many ways. The court systems play a major role in this organization by recommendations by judges for people to seek

The Importance Of A Comprehensive Security Policy For Modern Businesses

2140 words - 9 pages required to take on a considerably vital role in networks.As Shain (1996) points out, security is a wide concept, it is a separated subject with its own theories, "which focus on the process of attack and on preventing, detecting and recovering from attacks". Certainly, these processes should be well organized in coping with the complex system issues. A coherent approach should be taken, which builds on established security standards, procedures and