Uncategorized

Enterprise Security Policy

Enterprise Security Policy

Student

University

Enterprise Security Plan

Implementation of the Plan

The implementation of the enterprise security plan involves a series of steps including the identification of possible security threats and risks, creation of awareness, control of user access, password management, and data communication protection.

Step 1: Identification of Threats

For easy implementation of the enterprise plan, it is vital for an organization to know the security threats its information and network systems might face. The methods of identification include the observation of the past incidents of security threats as well as scenario analysis.

Step 2: Awareness training

Once the security risks and threats identification, the chief information officer enforces a plan of awareness training within the organization. According to Tse (2005), the raised level of awareness and knowledge will help the workers to understand and comply with the information policies; hence, the level of security violation shall be minimized.

Step 3: User Access Control

The next fundamental step is to set up system and information access control within the organization. There are two important levels of this process. First, the administrator controls users’ access to the physical hardware. The second access control level is the restriction of access to software components. This is done through passwords and data encryption procedures for sensitive information.

Step 4: Password Management Plan

This ensures that all users protect their passwords from unauthorized access. The password management policy holds all users responsible for their login credentials in the network (Bon, 2004).

Step 5: Data Communication Protection

Data flow is controlled in the individual systems used within the organization. The transfer of data through the network has to pass through secure channels to guard information from reaching third parties.

References

Bon van, J. (2004). IT-Service management: een introductie op basis van ITIL. Germany: Van Haren Publishing.

Tse, D. (2005). Security in Modern Business: security assessment model for information security Practices. Hong Kong: University of Hong Kong.