Assignment

Submitted by: Submitted by

Views: 10

Words: 1007

Pages: 5

Category: Science and Technology

Date Submitted: 09/21/2016 10:34 AM

Report This Essay

Question 1

1. Policies are management instructions indicating the company action or the way to handle a problem or situation. Policies are requirements that are written down or posted on company intranet page that are the guidelines that employees must follow inside and outside the company. Example at my company no employee should send confidential data electronically without encrypting the before sending. Another example of a policy is that Windows password has to be 8 characters, with a capital letter and a number.

2. Guidelines are considered optional and say what an employee should do and policies are what employees must do. Example at my company employees should not keep a copy of passwords under the keyboards or left out on the desk. Another guideline example at my company is the branch employees should answer the phone with a certain phases when customers calls.

3. Standards provide specific technical requirements and policies are required instructions. Standards covers details such as implementation steps, system design concepts, software interface specifications, and other specifics. Example of standard at my computer (all pc’s will have Windows 7 Enterprise as the operating system). Another standard at my company is all the pc’s will use Office 2013 Standard.

Question 2

1. Charlie perceives the scope and scale of the information security efforts as the new security officer will secure the business software, data, network, computers, and staff. A wide range of security problems can be addressed using the new information security program. Charlie thinks the investment on the security software is worth the investment as it will help make the company more secure.

2. Gladys perceives the scope and scale of the new information security effort. Gladys wants to investment in a new system which will close all known security vulnerabilities. Gladys also wants to make the new security program an asset to the company’s security.

3....