Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

IT SECURITY POLICY ( 3 0 marks ) Internet and network technologies increasingly play an important role at the institutes of higher learning education. Many

IT SECURITY POLICY (30 marks)
Internet and network technologies increasingly play an important role at the institutes of higher learning education. Many University and college units, groups and individuals have already begun to leverage wired and wireless networking technologies. As head of Information Technology Services (ITS) of your institution, you have been given the primary responsibility for the design, installation and operation of your institution's network infrastructure and services deployment.
Purpose of the Policy: The purpose of this policy is to establish the intent, direction and expectations with respect to the deployment (including installation, operation and maintenance) of the network infrastructure technology of your selected institution.
Expected Institutional Outcome: It is expected that this policy will result in a coordinated, centralized and secured delivery of wired and wireless networking services that will provide a quality user experience across the institution without restricting or constraining the growth of the institution's network infrastructure and services.
Applicability of the Policy: This policy shall apply to all users of the institution's technological resources.
Task Required:
You have been approached by one of your company's directors who wishes to know more
about IT Security Policy: Development, Implementation and management. You may assume that he/she has limited knowledge of IT Security Policy and that any technical terms need to be explained.
A. Why Do You Need a Security Policy?
B. Policy Statement
C. How to Develop Policy
What is the reason for the policy?
Who developed the policy?
Who approved the policy?
Whose authority sustains the policy?
Which laws or regulations, if any, are the policy based on?
Who will enforce the policy?
How will the policy be enforced?
Who does the policy affect?
What information assets must be protected?
What are users actually required to do?
How should security breaches and violations be reported?
What is the effective date and expiration date of the policy?
D. Responsibilities:
E. Business Continuity & Disaster Recovery, Information Technology
F. Security Awareness Training, Information Technology
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Microsoft Outlook 2023

Authors: James Holler

1st Edition

B0BP9P1VWJ, 979-8367217322

More Books

Students also viewed these Databases questions

Question

What resources are required?

Answered: 1 week ago