Premium Essay

Msit 540: Management of Information Security

In:

Submitted By devilindel
Words 3640
Pages 15
SECURITY POLICY for PIXEL, INC.

Table of Contents
Abstract 3
Purpose 3
Roles and Responsibilities 4
The policy statement 4
Policies specific to Roles 5
Chief Security Officer (CSO) 5
Chief Information Officer (CIO) 5
Pixel Inc. employees 6
Pixel Inc. Business partners 6
Pixel Clients 6
Risk Management 7
Policy 9
Sensitivity 10
General 11
Network Access 11
Network Equipment 14
Desktop Policy 15
Messaging Policy 16
Server Policy 16
Backup 17
Physical Security 18
Enforcement 20
Appendix 22
References 23

Abstract This paper describes the security policy of a fictitious company called Pixel Inc. The Pixel Inc. is a small business with nearly 100 employees with business focus on multi-media. Due to the nature of business, the company uses varying operating systems such as windows, Mac and Linux systems wired over a gigabit Ethernet networking. The security policy focuses on the securing intellectual property on storage and transportation. The usage policies are also devised for desktops and devices.
Purpose

The information security is crucial for Pixel Inc. to secure its information technology assets. The security is expected to provide protection from unauthorized access of its intellectual properties, system assets, network equipment’s, customer data and business system information. The policy described here is for implementing security practices across Pixel Inc. in everyday use of the information technology assets. Scope The scope of this security policy is limited to securing information technology assets and the physical locations where such systems are used and hosted. The policy considers the threat from both internal and external to the organization; and recommends policies relevant to the threats that such type of business are vulnerable to. The content here is limited to listing

Similar Documents

Premium Essay

College

...Principles of Information Security Chapter 3 Review In: Computers and Technology Principles of Information Security Chapter 3 Review Chapter 3 Review 1. What is the difference between law and ethics? The difference between law and ethics is that law is a set of rules and regulations that are universal and should be accepted and followed by society and organizations. Ethics on the other hand was derived from the latin word mores and Greek word Ethos means the beliefs and customs that help shape the character of individuals and how people interact with one another 2. What is civil law, and what does it accomplish? A wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organisational and entities and people. 3. What are the primary examples of public law? Criminal, administrative and constitutional law. 4. Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? The National Information Infrastructure Protection of 1996 amended the Computer Fraud and Abuse Act of 1986. It modified several sections of the CFA Act, and increased the penalties for selected crime. 5. Which law was specifically created to deal with encryption policy in the United States? The Security and Freedom through Encryption Act of 1999. 6. What is privacy in an information security context? Privacy is not absolute freedom from observation, but rather it is a more precise “State of being free from...

Words: 550 - Pages: 3