.

Thursday, 28 February 2013

Information Security Policy

Introduction


Student Name: Adam Kurylo

University of Phoenix

IT/244 Intro to IT Security

Instructors Name: Jennifer McLaughlin

Date: 5/4/2012

Introduction

Due in Week One: Give an overview of the keep company and the security goals to be achieved.


1 Company overview

Sunica Music and Movies is a local multimedia system chain with four locations, all operating independently of distributively other. The decision to operate independently has hindered communication, and therefore has made it unvoiced to coordinate inventory based on customer sales. This has take to a loss of revenue and customer base. The company is like a shot looking at new ways to communicate in an efficient manner, and drive sales. The idea is to introduce the internet to the company to generate more business. This will help bring in more customers and to a fault improve a damaged image. Also, the implementation of a sicken system to tie the stores together. Doing this will return the company the ability to tie each stores inventory together, making transactions easier to accomplish and easier to track. This will also eliminate bookkeeping errors, and centralize the company finances.

Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!



The security goals to be achieved are as follows:

Keep company information serious and private

Keep customer information safe and private

Prevent the WAN from being hacked

Ensure all transactions are safe and ecrypted


2 Security policy overview

Of the different types of security policiesâ€"program-level, program-framework, Issue-specific, and system-specificâ€" soon cover which type is appropriate to your selected business scenario and why.

Enter your schoolbook here




3 Security policy goals

As applies to your selected scenario, explain how the confidentiality, integrity, and handiness principles of information security will be addressed by the information security policy.


1 Confidentiality

Briefly explain how...If you want to get a full essay, order it on our website: Ordercustompaper.com



If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment