Wednesday, January 22, 2014

Security Policy

This is a security policy for a technology class. egis Operational Policies for the Luther Corporation (Lex Inc.) Lex Luther Metropolis College Table of Contents I.Executive compendious1 II. typography Objectives2 A.Firm Overview2 B. instruction of Purpose3 C.insurance Statement3 D. polity Audience3 E.Policy Exceptions4 F.Disciplinary Actions4 G.Statement of endorsement4 III.Asset Classification Policies and Procedures5 A.Information Classification/Sensitivity Levels5 B. musical arrangement Impact Levels [1 page]5 C.Information Systems Inventory and Criticality Ratings6 IV.Personnel Policies and Procedures9 A.enlisting9 B.Background Checks/ harboring9 C.Employment Agreements10 D.Training 10 E.Acceptable using up/Prohibited Use Policy10 F.e-mail Use Policy10 V.Physical and Environmental Security Policies and Procedures12 A.Physical a ccess affirms Policy12 B.Securing Offices, Rooms, and Facilities Policy12 C.Working in control Areas Policy12 D.Equipment post and Protection Policy13 E.Power Supply Policy13 F.Secure governing and Reuse of Equipment Policy13 G.Clear Desk and Clear Screen Policy13 H.Removal of Property Policy14 VI.Communications and business operations management Policies and Procedures15 A.Standard Operating Procedures Documentation Policy15 B. fortuity resolution Program Policy15 C.Malicious Software Policy16 D.Information System Backup Policy16 E.Management of man-portable repositing Devices and Removable Media Policy17 F.Security of Media in tour Policy17 G.Publicly Available Systems Policy17 H.E-mail and E-mail Systems Policy17 VII.Access Control Policies and Procedures19 A.User Access Management Policy19 B.Password Use Policy.19 C.User Authentication for external Connections Policy19 D.M obile cypher Policy...If you want to get a ! full essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.