0
www.HelpWithAssignment.com
   The Policies for Information Security must    come from all corners of an organization    which includes the general s...
   Such Security Policies should be able to    provide a direction on how the issues should    be handled and what are th...
   The starting and the ending point of any    qualitative security programs is the policy    that has been taken.   The...
   Security Policies mostly depend upon the    context in which they are used.   These security policies of an organizat...
   In Enterprise Information Security Policy, a    direct support is given to the organization’s    mission, vision and d...
   The EISP on the other hand also provides a    direction in the development, implementation    and management of the se...
   In Issue-specific Security Policy, the scope    and applicability of the security policy is    examined.   The techno...
   Authorization of user access, privacy    protection, fair and responsible use of the    technology is addressed.   Of...
   System-specific Security Policies often    include standards and procedures to be    implemented while maintaining of ...
   After the organization develops the    information security policies and standards,    the information security depart...
   The Information Security Department will list    all the information assets and prioritizes the    threats and dangers...
   This security blueprint will act as the basis for    the design, selection and implementation of    all Security Progr...
   For further details on IT Security, visit our    websites at   http://www.helpwithassignment.com/IT_Secu    rity_Assi...
Upcoming SlideShare
Loading in...5
×

Types of security policies in information technology

8,447

Published on

The policies for information security must come from all corners of an organization which includes the general staff. These Security Policies are the basis for all information security planning, design and deployment.

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
8,447
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
180
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "Types of security policies in information technology"

  1. 1. www.HelpWithAssignment.com
  2. 2.  The Policies for Information Security must come from all corners of an organization which includes the general staff. These Security Policies are the basis for all information security planning, design and deployment. www.HelpWithAssignment.com
  3. 3.  Such Security Policies should be able to provide a direction on how the issues should be handled and what are the best technologies to be used. These policies will direct how a particular software or equipment should work. This specific information is placed in the standards, procedures and practices. www.HelpWithAssignment.com
  4. 4.  The starting and the ending point of any qualitative security programs is the policy that has been taken. These security policies are very easy to decide on but they are very difficult to implement in a proper manner. www.HelpWithAssignment.com
  5. 5.  Security Policies mostly depend upon the context in which they are used. These security policies of an organization are required to protect the information assets of an organization. Managements often propose three types of security policies. These are: www.HelpWithAssignment.com
  6. 6.  In Enterprise Information Security Policy, a direct support is given to the organization’s mission, vision and direction. This security policy will view and direct all the security efforts. www.HelpWithAssignment.com
  7. 7.  The EISP on the other hand also provides a direction in the development, implementation and management of the security program. It also sets out the requirements that must be met by the information security framework. www.HelpWithAssignment.com
  8. 8.  In Issue-specific Security Policy, the scope and applicability of the security policy is examined. The technologies that need to be used are addressed. www.HelpWithAssignment.com
  9. 9.  Authorization of user access, privacy protection, fair and responsible use of the technology is addressed. Often, the users are prohibited from using the information in a manner that can harm others. www.HelpWithAssignment.com
  10. 10.  System-specific Security Policies often include standards and procedures to be implemented while maintaining of systems. This security policy is also used to address the implementation and configuration of technology as well as the behavior of the people. www.HelpWithAssignment.com
  11. 11.  After the organization develops the information security policies and standards, the information security department will develop the blueprint for the information security program. www.HelpWithAssignment.com
  12. 12.  The Information Security Department will list all the information assets and prioritizes the threats and dangers of the organization, a risk assessment analysis is conducted. These assessments will help in the design of the security blueprint for the organization. www.HelpWithAssignment.com
  13. 13.  This security blueprint will act as the basis for the design, selection and implementation of all Security Program Elements. Such Security Program Elements include policy implementation, ongoing policy management, risk management programs, education and training programs technological controls and maintenance of the security programs. www.HelpWithAssignment.com
  14. 14.  For further details on IT Security, visit our websites at http://www.helpwithassignment.com/IT_Secu rity_Assignment_Help and http://www.helpwiththesis.com www.HelpWithAssignment.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×