Introdictin It/244

Submitted by: Submitted by

Views: 71

Words: 823

Pages: 4

Category: Other Topics

Date Submitted: 11/30/2014 11:39 AM

Report This Essay

INTRODUCTION

Darrell W. Michels Jr

University of Phoenix

IT/244 Intro to IT Security

Professor Brunski

10/15/14

TABLE OF CONTENTS

Introduction 1.

References…………………………………………………………………………………………………………………2.

1. INTRODUCTION

I would like to see one paragraph opening statement to tell me what your paper is all about.

1.1 COMPANY OVERVIEW

The Bloom Design group is an innovative interior design firm that services businesses from around the world, as well as individual needs. Online one of our many resources that can be utilized is our virtual decorative tool, which gives consumers an opportunity to see what a potential project could look like once it’s completed, or any final decisions are made. Resources like this has really empowered our workforce and exponentially expanded our customer based allowing us to allocated many of our amenities to our website. For example, Interior designers have the ability to access our client files, and company files. This gives consumers direct access to their interior designer. This also creates the ability for the designer to process payments electronically, in doing this the entire process has become more efficient for both the consumer and interior designers. Our corporate offices are located in New York city, NY, and Los Angeles, CA

1.2 SECURITY POLICY OVERVIEW

The Bloom Design Group can best define its security policies and it’s security needs with an issue-specific policy. This policy is the best for the development to address particular kinds of activities in some environments, particular systems. Issue-specific policies serve to provide guidelines for the further development of procedures and practices within the functional elements of an organization. Which also allows for revision of policy as needed within the company.

Issue specific policy is a good choice

1.3 SECURITY POLICY GOALS

What is your goal?

1.3.1 Confidentiality

Also Know as the “Principle of...