Access Millions of academic & study documents

It Security Policy. A

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/7

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/7

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/7

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 7 pages?
Access Now
Unformatted Attachment Preview
Running head: IT SECURITY POLICY 1 IT Security Policy Student’s Name: Instructor’s Name: Course: Date: IT SECURITY POLICY 2 Introduction Information security policy refers to the rules and regulations in a state that govern all the individuals obtaining and using the IT resources and assets of that state (Dunham, 2018). The technology is advancing gradually, and information is stored digitally. It is, therefore, essential to secure this information to prevent unauthorized people from altering it. People at different locations in a state share information through the internet. It is a fast and effective method of exchanging information. However, the network through which the information is being shared should be secured to prevent man-in-the-middle attacks. All the small, resource-poor, and wealthy states should have IT security policies to ensure that they protect the data and the assets that they have. Having documented IT policies is vital so that all the workers of the state can understand and adhere to the rules. According to “The importance of IT policy,” the policies should have been easy to comprehend and have flexibility. The threats to the IT security keep changing, and thus, the security policy should be flexible enough so that amendments can be done. The security policies describe the solutions to specific threats to ensure that a state is in a position to eliminate the risks in advance. It is, therefore, important that every state has documented IT s ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents