Essay Available:
page:
1 pages/≈275 words
Sources:
-1
Style:
MLA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:
Goals of Information Technology Security Policy. IT & Computer Science
Essay Instructions:
Imagine you are the network administrator for your university's network and that you supervise eight network technicians who are responsible for day-to-day installations, upgrades, and troubleshooting. Describe the goals of the security policy you would have in place.
Cite Resources
Essay Sample Content Preview:
Name
Tutor
Course
Date
Goals of Information Technology Security Policy
Information Technology Security Policy refers to the procedures and rules regulating the access and use of information technology resources and assets in an organization. An effectively formulated IT Security policy incorporates the firm’s culture, where the rules and procedures are based on the employee’s approach to information resources (Brar and Gulshan 3). Therefore, a robust Information Technology Security Policy is formulated depending on how employees view and value their information and work as well as their perspective on risk tolerance.
A typical Information Technology Security Policy has three main objectives, which entail preserving availability, confidentiality, and integrity of information in the organization. Thus, a network administrator in a university must ensure that a policy that governs availability, confidentiality, and integrity of the network’s information is put in place (Brar and Gulshan 3). One of the goals of the Information Techno...
Tutor
Course
Date
Goals of Information Technology Security Policy
Information Technology Security Policy refers to the procedures and rules regulating the access and use of information technology resources and assets in an organization. An effectively formulated IT Security policy incorporates the firm’s culture, where the rules and procedures are based on the employee’s approach to information resources (Brar and Gulshan 3). Therefore, a robust Information Technology Security Policy is formulated depending on how employees view and value their information and work as well as their perspective on risk tolerance.
A typical Information Technology Security Policy has three main objectives, which entail preserving availability, confidentiality, and integrity of information in the organization. Thus, a network administrator in a university must ensure that a policy that governs availability, confidentiality, and integrity of the network’s information is put in place (Brar and Gulshan 3). One of the goals of the Information Techno...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
👀 Other Visitors are Viewing These APA Essay Samples:
-
Code of Ethics and Professional Conduct
1 page/≈275 words | No Sources | MLA | IT & Computer Science | Essay |
-
Technology in the Fight against Global Poverty (IT & Computer Science Essay)
1 page/≈275 words | No Sources | MLA | IT & Computer Science | Essay |
-
Memory Upgrade: More RAM for More Speed
2 pages/≈550 words | No Sources | MLA | IT & Computer Science | Essay |