Essay Available:
Pages:
1 page/≈275 words
Sources:
Check Instructions
Style:
MLA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:
Goals of Information Technology Security Policy. IT & Computer Science
Essay Instructions:
Imagine you are the network administrator for your university's network and that you supervise eight network technicians who are responsible for day-to-day installations, upgrades, and troubleshooting. Describe the goals of the security policy you would have in place.
Cite Resources
Essay Sample Content Preview:
Name
Tutor
Course
Date
Goals of Information Technology Security Policy
Information Technology Security Policy refers to the procedures and rules regulating the access and use of information technology resources and assets in an organization. An effectively formulated IT Security policy incorporates the firm’s culture, where the rules and procedures are based on the employee’s approach to information resources (Brar and Gulshan 3). Therefore, a robust Information Technology Security Policy is formulated depending on how employees view and value their information and work as well as their perspective on risk tolerance.
A typical Information Technology Security Policy has three main objectives, which entail preserving availability, confidentiality, and integrity of information in the organization. Thus, a network administrator in a university must ensure that a policy that governs availability, confidentiality, and integrity of the network’s information is put in place (Brar and Gulshan 3). One of the goals of the Information Techno...
Tutor
Course
Date
Goals of Information Technology Security Policy
Information Technology Security Policy refers to the procedures and rules regulating the access and use of information technology resources and assets in an organization. An effectively formulated IT Security policy incorporates the firm’s culture, where the rules and procedures are based on the employee’s approach to information resources (Brar and Gulshan 3). Therefore, a robust Information Technology Security Policy is formulated depending on how employees view and value their information and work as well as their perspective on risk tolerance.
A typical Information Technology Security Policy has three main objectives, which entail preserving availability, confidentiality, and integrity of information in the organization. Thus, a network administrator in a university must ensure that a policy that governs availability, confidentiality, and integrity of the network’s information is put in place (Brar and Gulshan 3). One of the goals of the Information Techno...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
You Might Also Like Other Topics Related to technology:
- EDU 6813-Week Six Discussion – Technology Enhanced Instructions1 page/≈275 words | APA | Education | Essay |
- How Technology Shapes Up People's Identity1 page/≈275 words | APA | Literature & Language | Essay |
- New cutting edge FinTech projects. Accounting, Finance, SPSS Essay2 pages/≈550 words | APA | Accounting, Finance, SPSS | Essay |
- Conversation or Mere Connection: Which is Better on Relationships?2 pages/≈550 words | APA | Literature & Language | Essay |
- Research Paper Proposal Assignment: Technology and College Students2 pages/≈550 words | MLA | Literature & Language | Essay |
- Coupling Technology With An Organization’s Market To Drive Innovation1 page/≈275 words | 3 Sources | APA | Management | Essay |
- Technology Training: Jessie Woolley-Wilson1 page/≈275 words | 3 Sources | APA | Management | Essay |