Cyber Security Policy

Read Complete Research Material



Cyber security Policy

Introduction3

Discussion4

Security Missions of Organizations4

Confidentiality4

Integrity4

Availability4

Human Factors Linked with Cyber Security Policy5

Public Policy Issues for Liability and Privacy to Security goals5

Cyber Security Policy for Organization6

Purpose of the Policy6

Scope of the Policy6

Policy6

Corporate Security6

Computing security7

Security baseline7

How the Items of the Policy may help Mitigate Threats to the Security Goals7

Conclusion7

References9

Cyber security Policy

Introduction

In the current era of technology, every process or interaction, whether it is professional or personal, is based on the utilization of technology. It is a fact that every single person regularly interacts and coordinates with each other by the help of information systems. In the current era of competition, almost all organizations depend on the information systems in order to interact with their employees, customers and shareholders. These interactions and collaborations, if unethical, may affect and influence the integrity of the confidential data, employee confidence and stakeholder confidence, between other major organizational issues. Therefore, it necessary for the organizations to recognize the threats related to cyber security of the organization. In addition, it is also essential for the businesses and organizations to introduce and implement the policies of cyber security (Ghosh, et.al. 2004). According to the recent researches and surveys, employees are considered as weakest connection of security of organizations. It is because of the reason that the mistakes of the employees may lead the organizations to several consequences and may greatly harm the integrity of organization's information. Therefore, it is essential for the organizations to focus on the behavior of the employees as they are accountable for assuring the privacy and security of the organization's confidential information. The proceeding paper incorporates the security aims and missions of the organizations. The paper also demonstrates the human factors that are related to the policy of cyber security. Furthermore, the cyber security policy is also incorporated in the proceeding paper (Ghosh, et.al. 2004).

Discussion

It is often observed that, the organizations set their objectives and goals in order to establish and develop their long term and profitable business. In order to achieve their goals, the organizations have to build strong relationships with their customers, employees as well as with their shareholders. In this scenario, the organizations goals to ensure the three major areas of security. These areas may include availability, integrity and confidentiality. All these elements are briefly described in the proceeding discussion (Probst, et.al. 2010).

Security Missions of Organizations

Confidentiality

The businesses and organizations aims to ensure the confidentiality of their information. It can only be possible by limiting the access of the information to the limited people. This may significantly help the organization in securing their information (Probst, et.al. 2010).

Integrity

In this step, the data should be kept in such a manner that the organization's confidential data can never be modified or altered by the unauthorized person.

Availability

This feature may significantly help the organization in ensuring that the timely availability of the information. This mission may help the organization in making the accurate and appropriate decisions by the help of their pre stored information.

Human Factors Linked with Cyber Security Policy

In the current era, ...
Related Ads