Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Security Policy

This is a preview of the 10-page document
Read full text

The first step in the development of an awareness and training program is training. GI has reported a number of security vulnerabilities and attacks over the past due to diminishing security footprint in the organization. Te ability to rely on external vendors to pull the company out of the mess whenever an incident occurs is worrying. Te recent attacks in GFI outline the importance of an in-house IT presence. Oacle database servers were attacked and the company had to pay immensely for it. Lkewise, GI has recently been in limelight for all the reasons.

Egineers have witnessed increased traffic but cannot ascertain the specific cause. Lkewise, tere are network latency and slow performance in the remote sites. Te increasing need for mobility and where employees want to use mobile devices and are willing to bring their own introduces an additional security risk. W-Fi networks willing permit this flexibility but security over the networks is a source of concern. Fnally, te company wishes to offer its products and services in the online framework and is worried about cloud security customer database.

I the light of these developments, a organizational security is a must for GFI. Oce a security policy has been developed, taining and awareness are conducted in line with the policy. Asecurity awareness and training material integrates the behaviours the campus wants to reinforce as well as skills for doing it and the applicable audiences. Mst probable topics that are considered in developing the material include password user management, potection against viruses, wrms and Trojans, plicy implications, rsource use and management, icident response and recovery, prsonal access use, scial engineering among others.

Te source of awareness material is majorly professional organizations, email advisories, cnferences and seminars, ad periodicals. Oce all the deliberations has been made, i is put on paper and supplied to everyone in the campus to access it. Iplementation process involve communication and delivery of awareness material through various mechanisms such as posters, emails, nwsletters, pblications and other efficient, efective and favourable means. Te techniques adopted should be easy, salable, rach to greater number of users and accountable(Enrico Nardelli,...

This is a preview of the 10-page document
Open full text
Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Engineering and Construction, Agriculture
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Technology, Military
Hire a Writer
preview essay on Security Policy
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us