Network Security U2DB

User Generated

svfuvathl

Computer Science

Description

The following needs to be completed in APA format.

As the new network administrator, one of your first responsibilities is to draft a network security policy plan that employees must sign and follow when using the company’s network.

  • Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.
  • Research and discuss 3 items that you believe are the most important when drafting a security policy plan.
  • Explain why you believe these are important, and include examples of security breaches that can occur if these items are not outlined and followed.
  • Specify any special considerations of concern in the area of wireless security.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: NETWORK SECURITY POLICY

Network Security Policy
Student’s Name
Institution

1

NETWORK SECURITY POLICY

2
Network Security Policy

The security parameters within any network have the potential to influence the chances of
data breach therein. Consequently, any organization that depends on networking for effective
communication or transfer of data needs to develop policies on is security which would
ultimately deter the chances of breaches. In most cases, data breach to such networks could lead
to loss of potentially critical information, and would ultimately reduce the credibility of the
company to secure data belonging to its stakeholders.
Necessary Items in a Security Policy
The various stakeholders within the workplace environment would use the network
security policy. Notably, they could all be in need of the network for various reasons, some of
which could go beyond the job requirements. Consequently, the policy needs to stipulate clearly
what would constitute acceptable use of the network within the operational parameters of the
institution. For instance, the security measures may not guarantee safety of the network if the
users depended on it to access social ...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags