AllFreePapers.com - All Free Papers and Essays for All Students
Search

Information Security Policy

Autor:   •  February 6, 2014  •  Research Paper  •  2,824 Words (12 Pages)  •  1,335 Views

Page 1 of 12

Information Security Policy

Keith A Manley

UNIVERSITY OF PHOENIX

IT/244 INTRO TO IT SECURITY

James Sershen

Date: 11/17/13

Table of Contents

1. Executive Summary 2

2. Introduction 3

3. Disaster Recovery Plan 5

3.1. Key elements of the Disaster Recovery Plan 5

3.2. Disaster Recovery Test Plan 6

4. Physical Security Policy 7

4.1. Security of the facilities 7

4.1.1. Physical entry controls 7

4.1.2. Security offices, rooms and facilities 7

4.1.3. Isolated delivery and loading areas 8

4.2. Security of the information systems 8

4.2.1. Workplace protection 8

4.2.2. Unused ports and cabling 8

4.2.3. Network/server equipment 8

4.2.4. Equipment maintenance 8

4.2.5. Security of laptops/roaming equipment 9

5. Access Control Policy 10

6. Network Security Policy 12

7. References 15

1. Executive Summary

The purpose for this outline is to identify, contract, and implement a policy for securing and managing Sunica Music’s assets and data base. This policy also entails how it will be possible to create a single network for which the entire company and its customers can safely utilize the company assets and information needed to conduct business. This policy is designed to allow the information need to be available to those that require it with the appropriate rights or privileges to the desired information. All company data will be protected along with its physical property by means that will be set forth in the proposal.

Creating a new network infrastructure will require the adaption of old hardware, new hardware, software updates, and equipment updates. Each of the company locations will be affected by the network changes and will need to provide the necessary information and support to allow for a smooth transition into the new systems that will be implemented. Each employee will receive the necessary training on the equipment, software, and new guidelines on the use of each as the system is being brought online. The goal is to create a safe

...

Download as:   txt (18.4 Kb)   pdf (210 Kb)   docx (18.1 Kb)  
Continue for 11 more pages »