Network Security Policy

Network Security Policy

  • Submitted By: mazrak
  • Date Submitted: 04/13/2015 6:39 PM
  • Category: Technology
  • Words: 2709
  • Page: 11







Computer Network Security Policy













Table of Contents

Abstract…………………………………………………………………………………………....3
Security Policy…………………………………………………………………………………….4
Acme Security Policy Assessment………………………………………………………………...8
References………………………………………………………………………………………..12
Abstract
Businesses that uses networks and computers need to have a security policy developed and implemented to protect against threats both internal and external. The first part of the assignment will go over ten specific items that are important to protect against these threats. The ten specific items that will be addressed are: remote access, tape backups, workstation security, Wi-Fi access, portable devices, portable storage, passwords, document protection, emails, and shared file access. The second portion of the assignment will assess the Acme security policy of the four major areas in the policy of physical access vulnerability, mail system vulnerability, user account security vulnerability, and internal vulnerability which are missing, incomplete, inaccurate, or ill-advised.
Keywords: TKIP, WPA2, SSL Encryption, VPN, RSA Token, GPO, PGP












Computer Network Security Policy
It is the utmost importance to have businesses develop and implement a sound security policy more than ever before. With the threats from viruses, malware, and internal employee theft, it is the responsibility of the business to protect its interests to avoid loss of revenue, litigation, and criminal actions. In this assignment I will discuss ten areas of interests or items that require a security policy to be implemented. I will also assess a fictional company called Acme on its security policy on the four major areas of the policy of physical access vulnerability, mail system vulnerability, user account security vulnerability, and internal vulnerability that are missing, incomplete, inaccurate, or ill-advised.
The ten areas that need to have a security policy...

Similar Essays