Security Policy Essay

5742 WordsOct 20, 201423 Pages
Associate Level Material Appendix B Information Security Policy Student Name: Michal Przywalny University of Phoenix IT/244 Intro to IT Security Instructor’s Name: ROMEL LLARENA Date: 4/27/2014 * Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. The Bloom Design Group has recently been experiencing issues with the security of their network. The way to ensure improvements in this issue is by looking into many factors that can improve the security. When considering a security plan Bloom Design Group should implement a plan that is not outside the financial resources of the company. It should match the Bloom Design Group’s budget. There is no need to buy expensive software that you would rarely use. The company should write out a list of their priorities and delegate to pick the most affordable plan that would ensure optimal security. There also should be an assessment on all the current resources and assets and what they are capable of

More about Security Policy Essay

Open Document