Home » Downloads » Electronic resource security policy

Electronic resource security policy

Electronic resource security policy

Assume you are an Information Technology Director for a small, growing firm and are tasked with developing an electronic resource security policy to deploy within your organization. The policy needs to protect the organization’s valuable electronic assets, but be flexible enough to accommodate employees as they go about executing their jobs and getting business done. It also needs to address communication and data security aspects such as remote data access, smartphone access, and internal electronic communications such as IM (instant messaging) and email.

**(Note that a policy is different from a plan. Be sure you address primarily the policy aspects of this task.).

In a minimum five page APA formatted paper (excluding title and reference pages) using the lecture, supplemental resources, and your own research, discuss the following elements.

  1. Discuss the differences between ‘implementation’ and ‘policy’, and describe the importance of their separation.
  2. Using information from the course, including the lectures and weekly reading, develop an outline of your security policy which addresses the areas identified in the prompt. Be as specific as possible.
  3. Compare the policy differences between users who work remotely or use wireless hotspots to users who work on site in a traditional office environment.
  4. Discuss how you would implement your security policy within the organization, including how employees would be apprised of the new policies. Be sure to explain which elements are critical for a successful implementation of your policy
  5. Include a minimum of five sources, one of which may be the textbook. Of these sources, three must be from the Ashford Library or from IT industry standard periodicals.

Writing the Final Paper

The Final Paper:

  1. Must be a minimum of five double-spaced pages (excluding title and reference pages) in length, and formatted according to APA style as outlined in the Ashford Writing Center.
  2. Must include a title page with the following:
    1. Title of paper
    2. Student’s name
    3. Course name and number
    4. Instructor’s name
    5. Date submitted
  3. Must begin with an introductory paragraph that has a succinct thesis statement.
  4. Must address the topic of the paper with critical thought.
  5. Must end with a conclusion that reaffirms your thesis.
  6. Include a minimum of five sources which may include the text. Of these sources, three must be from the Ashford Library or from IT industry standard periodicals.
  7. Must document all sources in APA style, as outlined in the Ashford Writing Center.
  8. Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center.

Carefully review the Grading Rubric for the criteria that will be used to evaluate your assignment.

 

 

 

 

……………Answer Preview………….

    Creating security policies is the top requirement on the basis of securing the network within an organization. Existing gaps in an organization need to be filled in with policies that aimed at demonstrating to customers that their data is protected by the use of appropriate security procedures. Policies can be identified as procedural processes outlining specific issues, reason, and purpose. Policies are also comprised of the existing consequences in case of lack to comply. Responsibility is a key requirement that is often addressed. The………………

APA

1,522 Words