Welcome

Anti Essays offers essay examples to help students with their essay writing.

Sign Up

It 244 Information Security Policy Final Project Essay

Open Document

Below is an essay on "It 244 Information Security Policy Final Project" from Anti Essays, your source for research papers, essays, and term paper examples.

Axia College Material
Appendix B

Information Security Policy
Student Name: Michael Davis
Axia College
IT/244 Intro to IT Security
Instructor’s Name: Jamie Rost
Date: February 24, 2012
  * Table of Contents
1. Executive Summary 1
2. Introduction 1
3. Disaster Recovery Plan 1
3.1. Key elements of the Disaster Recovery Plan 1
3.2. Disaster Recovery Test Plan 1
4. Physical Security Policy 1
4.1. Security of the facilities 1
4.1.1. Physical entry controls 1
4.1.2. Security offices, rooms and facilities 1
4.1.3. Isolated delivery and loading areas 2
4.2. Security of the information systems 2
4.2.1. Workplace protection 2
4.2.2. Unused ports and cabling 2
4.2.3. Network/server equipment 2
4.2.4. Equipment maintenance 2
4.2.5. Security of laptops/roaming equipment 2
5. Access Control Policy 2
6. Network Security Policy 3
7. References 3

Executive Summary

Concerning the management of security information, Bloom Design Group needs to take careful consideration. Staying within the budget is very important for a company to measure growth. Purchasing expensive programs or systems can become a waste of company resources. A company will need to look into their assets, vulnerabilities, and network features before purchasing anything to ensure that it will fit their needs. With the proper security program in place all security threats that could harm the company will be revealed and addressed to further protect the Bloom Design Group Corporation.
    The Bloom Design Group will need to apply their best practices to ensure IT systems not only reach a known and trusted state but that they also preserve that state of compliance. The management team will need to be more alert and held accountable for a continual and productive operational risk management environment that addresses links between the technologies Infrastructure, business processes, reputation, compliance, and internal controls.
    For a...

Show More


Citations

MLA Citation

"It 244 Information Security Policy Final Project". Anti Essays. 19 Mar. 2019

<https://www.antiessays.com/free-essays/It-244-Information-Security-Policy-Final-216566.html>

APA Citation

It 244 Information Security Policy Final Project. Anti Essays. Retrieved March 19, 2019, from the World Wide Web: https://www.antiessays.com/free-essays/It-244-Information-Security-Policy-Final-216566.html