Access over 35 million academic & study documents

Policy Implementation

Content type
User Generated
Type
Homework
Rating
Showing Page:
1/8
Running Head: POLICY IMPLEMENTATION 1
Policy Implementation
Name
Institutional Affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/8
POLICY IMPLEMENTATION 2
Security planning policies is a formal plan that specifically defines the necessary actions
to be taken in order to ensure a secure computer environment or information systems. A system
security plan provides a systematic techniques and approaches for ensuring computer and
information is protected from being accessed by any unauthorized users. It also acts as a guard
from worms and all kinds of viruses as well as all other events that are capable of jeopardizing
the underlying computers security. A computer security plan is mainly implemented in IT
environments and organizations. These security plans are proposed for protection and controlling
an information system, or any other plan that has already been implemented. The organizational
IT environment policies are used to create these security plans as the benchmark (Whitman &
Mattord, 2012).
Basically, a computer security planning is comprised of the following key factors: a list
of users’ personnel that who can get access to the system. These are individuals who have the
rights and access codes that enable them to open the system and access the information. Mostly
these authorized personnel are trusted with the organization’s internal information and are not
strangers. A computer security plan also include levels of access of tiered access, this defines
what a specific user is allowed to access and what he or she is allowed to do on the system. This
feature is very important since it protects individual users’ information from even coworkers, it
also ensures that the organizations top secrets is kept secure and confidential from every staff
member, and can be accessed only by the top management staffs (Whitman & Mattord, 2012).
In a system security planning, there must be access control methods. These methods
determines how individuals users will be able to access the system, these methods include use of
passwords, digital cards and sometimes the use of biometric machines to authenticate specific
users. These measures should be put in place to prevent any stranger accessing the system

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/8

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 8 pages?
Access Now
Unformatted Attachment Preview
Policy Implementation Name Institutional Affiliation Security planning policies is a formal plan that specifically defines the necessary actions to be taken in order to ensure a secure computer environment or information systems. A system security plan provides a systematic techniques and approaches for ensuring computer and information is protected from being accessed by any unauthorized users. It also acts as a guard from worms and all kinds of viruses as well as all other events that are capable of jeopardizing the underlying computer's security. A computer security plan is mainly implemented in IT environments and organizations. These security plans are proposed for protection and controlling an information system, or any other plan that has already been implemented. The organizational IT environment policies are used to create these security plans as the benchmark (Whitman & Mattord, 2012).? Basically, a computer security planning is comprised of the following key factors: a list of users' personnel that who can get access to the system. These are individuals who have the rights and access codes that enable them to open the system and access the information. Mostly these authorized personnel are trusted with the organization's internal information and are not strangers. A computer security plan also include levels of access of tiered access, this defines what a specific user is allowed to access and what he or she is allowed to do on the system. This feature is v ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents