100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Information Security Management

Rating
-
Sold
-
Pages
11
Grade
80(A)
Uploaded on
13-08-2020
Written in
2019/2020

This report provide an abstract section at the beginning and conclusion at the end. The appropriate background is delivered as an introduction in the topic area of interest. It then present an analysis over its technical content in depth looking at relevant issues concerned and demonstrate in-depth knowledge in the topic area of interest by examples and case studies, such as an organisation’s information security risk assessment, firewall security policy design, information security toolkit uses, etc.

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 13, 2020
Number of pages
11
Written in
2019/2020
Type
Essay
Professor(s)
Unknown
Grade
80(a)

Content preview

FD


Developing an
information
security policy in
3/12/2019
organisation using
a case study
approach.
Information Security Management




Institution
LONDON METROPOLITAN UNIVERISTY

, Table of Contents
Abstract.................................................................................................................................................2
Introduction...........................................................................................................................................2
Aim and Objective.................................................................................................................................3
Literature review...................................................................................................................................3
Information security...........................................................................................................3
Threats to Information Security.........................................................................................4
............................................................................................................................................4
Information Security Policy...............................................................................................4
Requirement of Information Security Policy.....................................................................4
Research and Methodology...................................................................................................................5
Findings.................................................................................................................................................5
Review of Information Security Policy..............................................................................5
Password Management.......................................................................................................6
Use of Email......................................................................................................................6
Use of Internet....................................................................................................................6
............................................................................................................................................6
SNS.....................................................................................................................................7
In the institution's ISP, which nominates a particular department to operate on the social
networks of the institution (e.g., Twitter as well as Instagram) for media relations
purposes, the use of social networks sites is given very little attention. Discussion
should be included in the ISP on the proper use of these Social network sites with the
effects of use and possible security threats. The institution has its own application for
social media, and the ISP contains a particular policy document outlining the motive and
practical steps using this application. Computing through mobile....................................7
An ISP document entitled' Access Police ' discusses the need for safe institutional
systems and digital networks to manage mobile work operations. This policy should also
include a broad discussion on global cellular networks and public Wi-Fi
communications, such as what kinds of activities are allowed in such networks and
whether this is safe to log in to work with email through such a policy............................7
Handling Information.........................................................................................................7
In the present ISP papers, attention to data management is limited. A brief note on the
disposal of work information and records shows that this is permitted after a specified
period of time; this note is discovered in an ISP document entitled' Commitment Policy.'
However, the same note appears in the documents entitled' Leaving Sensitive Material
£15.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ahmedali3

Also available in package deal

Thumbnail
Package deal
Computer Network and Cyber Security
-
1 4 2020
£ 61.96 More info

Get to know the seller

Seller avatar
ahmedali3 London Metropolitan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
5 year
Number of followers
3
Documents
5
Last sold
3 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions