Email security

Email security.

Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. Having a security policy that address acceptable use of these resources is an essential aspect of IT governance and management.

Follow guidelines in the (NIST.SP.800-12r1) document to develop a mock Computer/Internet Security Policy. Your policy document must be a 3-5 page stand-alone document that can be reviewed, maintained and distributed to employees, staff or other stakeholders when necessary. Your policy document must contain at least the following sections:

1.  A “Preamble” – it describes

· 1) the scope and applicability of the policy (who is affected by the policy, when and under what conditions);

· 2) a definition of technology covered;

· 3) a confidentiality of data statement;

· 4) Incident response handling procedures;

· 5) Responsibilities (monitoring, reporting violations, penalties for violations, etc.)

· 6) a policy review schedule

2. Physical security

· Acceptable use

· Un-acceptable use

· Back-up and storage strategies

3. Access security

· Device

· passwords

· web access

· network access

· remote access

· mobile

· wireless

· Email security

5. Virus protection

Remember to follow APA6 guidelines in citing all sources used. Then also include an APA style reference list as the last page of your Computer/Internet Security Policy.  When you have finished writing your Computer/Internet Security Policy document, click the Write Submission link and submit your paper for grading.  OR, just paste your entire document as a Word doc attachment.

Email security

Posted in Uncategorized