This is a security policy for a technology class. trade protection Operational Policies for the Luther Corporation (Lex Inc.) Lex Luther Metropolis College Table of Contents I.Executive compendious1 II. piece of music Objectives2 A.Firm Overview2 B. instruction of Purpose3 C.insurance Statement3 D. polity Audience3 E.Policy Exceptions4 F.Disciplinary Actions4 G.Statement of endorsement4 III.Asset Classification Policies and Procedures5 A.Information Classification/Sensitivity Levels5 B. organization Impact Levels [1 page]5 C.Information Systems Inventory and Criticality Ratings6 IV.Personnel Policies and Procedures9 A.enlisting9 B.Background Checks/ harboring9 C.Employment Agreements10 D.Training 10 E.Acceptable using up/Prohibited Use Policy10 F.e-mail Use Policy10 V.Physical and Environmental Security Policies and Procedures12 A.Ph ysical access attends Policy12 B.Securing Offices, Rooms, and Facilities Policy12 C.Working in control Areas Policy12 D.Equipment post and Protection Policy13 E.Power Supply Policy13 F.Secure government and Reuse of Equipment Policy13 G.
Clear Desk and Clear Screen Policy13 H.Removal of Property Policy14 VI.Communications and traffic operations management Policies and Procedures15 A.Standard Operating Procedures Documentation Policy15 B. fortuity reply Program Policy15 C.Malicious Software Policy16 D.Information System Backup Policy16 E.Management of man-portable fund Devices and Removable M! edia Policy17 F.Security of Media in tour Policy17 G.Publicly Available Systems Policy17 H.E-mail and E-mail Systems Policy17 VII.Access Control Policies and Procedures19 A.User Access Management Policy19 B.Password Use Policy.19 C.User Authentication for external Connections Policy19 D.Mobile compute Policy...If you want to get a full essay, order it on our website: BestEssayCheap.com
If you want to get a full essay, visit our page: cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.