Verified Document

Security Computer Security, Policy, And Essay

Any security policy must, after being properly designed and established, be communicated clearly and comprehensively to all relevant personnel, which in today's organizations typically means anyone with access to a company computer and/or the company network, or who handles digital information or communication for the company (Kizza, 2009; Lahtinen et al., 2006). Ongoing training and development programs for all relevant personnel should be made a regular feature of the company's overall security policy, and there should be a trend towards the greater recognition of the importance of human resources as the ultimate line of defense against malicious security breaches and errors (Cobb, 2011; Greene, 2006). With the right people doing the right things -- that is, following proper procedures -- maintaining proper security policies becomes much easier. One specific way in which the many components of network and other computer/information technology security systems can work together is in the area of virus detection and reporting (Cobb, 2011; Greene, 2006). Developing a strict, concrete, and straightforward system for virus detection and reporting is far easier said than done, and in many companies that handle especially sensitive and/or desirable data -- financial information, government records, etc. -- this should be one of the most dynamic components of...

Standard users within the company will have little to do with addressing viruses after they are reported, however many virus entry methods depend on user interaction and allowance and thus virus recognition and response should definitely be a regular part of education and training programs (Cobb, 2011).
Conclusion

By building strong network security foundation, training personnel, and putting proper virus-handling procedures in place, the company will greatly enhance its current security. This will enable more certain growth and more secure operations. As the company moves forward, it must maintain continuous awareness of these issues and potential responses.

References

Bishop, M. (2003). Computer Security. Boston, MA: Pearson.

Cobb, C. (2011). Network Security for Dummies. New York: Wiley.

Greene, S. (2006). Security Policies and Procedures. Boston, MA: Pearson.

ICR. (2008). Computer Security Management. New York: Institute for Career Research.

Kizza, J. (2009). A Guide to Computer Network Security. New York: Springer.

Lehtinen, R., Russel, D. & Gangemi, G. (2006). Sebastopol, CA: O'Reilly Media.

Whitman, M. & Mattord, H. (2011). Principles of Information Secuirty. Boston, MA:…

Sources used in this document:
References

Bishop, M. (2003). Computer Security. Boston, MA: Pearson.

Cobb, C. (2011). Network Security for Dummies. New York: Wiley.

Greene, S. (2006). Security Policies and Procedures. Boston, MA: Pearson.

ICR. (2008). Computer Security Management. New York: Institute for Career Research.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Policy IT Security Policy
Words: 1080 Length: 4 Document Type: Term Paper

Organizational security strategies must be designed for agility and speed through the use of state-of-the-art systems that can quickly be reconfigured to match changing roles in an organization. Organizational security will be defined through role-based access, configurable through authenticated, clearly delineated processes that can be administered at the administrator level (Hone, Eloff, 2002). The organizational security strategy will also be designed on the empirically validated Confidential, Integrity and Availability (CIA)

Security Policy Document: Global Distributions, Inc. The
Words: 1891 Length: 7 Document Type: White Paper

Security Policy Document: Global Distributions, Inc. The purpose of this document is to establish key security parameters and guidelines for Global Distributions, Inc. (GDI) in order to protect the interests of the company and its clients. Scope These policies apply to all operations managed by GDI, including interactions and interfaces with client companies that are managed by GDI. All communication networks, database systems, and servers full under the purview of this policy. Policies Definition of

Security Policy of a Dental
Words: 1254 Length: 3 Document Type: Term Paper

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

Security Policies Given the Highly
Words: 749 Length: 2 Document Type: Essay

If not, what other recommendations would you make to Harold? Explain your reasons for each of recommendations. No, the actions that were taken by Harold are not adequate. The reason why, is because he has created an initial foundation for protecting sensitive information. However, over the course of time the nature of the threat will change. This could have an impact on his business, as these procedures will become ineffective.

Security Policy and Risk Strategy
Words: 1383 Length: 4 Document Type: Essay

The most appropriate products that could be used by MMC to achieve this objective would be: IP San and a Snap Lock. An IP San is a fiber optic channel that can provide secure real time data to each location. Where, software and security applications can be adapted to the current system that is being used. The Snap Lock is: a security software that can be used to provide

Security Policy: The Information Security Environment Is
Words: 1208 Length: 4 Document Type: Essay

Security Policy: The information security environment is evolving because organizations of different sizes usually experience a steady stream of data security threats. Small and large business owners as well as IT managers are kept awake with various things like malware, hacking, botnets, and worms. These managers and business owners are usually concerned whether the network is safe and strong enough to repel attacks. Many organizations are plagued and tend to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now