Blog
Enterprise Security Policy
Enterprise Security Policy
Student
University
Enterprise Security Plan
Implementation of the Plan
The implementation of the enterprise security plan involves a series of steps including the identification of possible security threats and risks, creation of awareness, control of user access, password management, and data communication protection.
Step 1: Identification of Threats
For easy implementation of the enterprise plan, it is vital for an organization to know the security threats its information and network systems might face. The methods of identification include the observation of the past incidents of security threats as well as scenario analysis.
Step 2: Awareness training
Once the security risks and threats identification, the chief information officer enforces a plan of awareness training within the organization. According to Tse (2005), the raised level of awareness and knowledge will help the workers to understand and comply with the information policies; hence, the level of security violation shall be minimized.
Step 3: User Access Control
The next fundamental step is to set up system and information access control within the organization. There are two important levels of this process. First, the administrator controls users’ access to the physical hardware. The second access control level is the restriction of access to software components. This is done through passwords and data encryption procedures for sensitive information.
Step 4: Password Management Plan
This ensures that all users protect their passwords from unauthorized access. The password management policy holds all users responsible for their login credentials in the network (Bon, 2004).
Step 5: Data Communication Protection
Data flow is controlled in the individual systems used within the organization. The transfer of data through the network has to pass through secure channels to guard information from reaching third parties.
References
Bon van, J. (2004). IT-Service management: een introductie op basis van ITIL. Germany: Van Haren Publishing.
Tse, D. (2005). Security in Modern Business: security assessment model for information security Practices. Hong Kong: University of Hong Kong.
