Security Computer Security, Policy, and Essay

Total Length: 802 words ( 3 double-spaced pages)

Total Sources: 7

Page 1 of 3

who have access to the network do not maintain proper security procedures and remain well-informed regarding potential risks and updated procedures and policies (Cobb, 2011; Whitman & Mattord, 2011; ICR, 2008). Any security policy must, after being properly designed and established, be communicated clearly and comprehensively to all relevant personnel, which in today's organizations typically means anyone with access to a company computer and/or the company network, or who handles digital information or communication for the company (Kizza, 2009; Lahtinen et al., 2006). Ongoing training and development programs for all relevant personnel should be made a regular feature of the company's overall security policy, and there should be a trend towards the greater recognition of the importance of human resources as the ultimate line of defense against malicious security breaches and errors (Cobb, 2011; Greene, 2006). With the right people doing the right things -- that is, following proper procedures -- maintaining proper security policies becomes much easier.

One specific way in which the many components of network and other computer/information technology security systems can work together is in the area of virus detection and reporting (Cobb, 2011; Greene, 2006).

Stuck Writing Your "Security Computer Security, Policy, And" Essay?

Developing a strict, concrete, and straightforward system for virus detection and reporting is far easier said than done, and in many companies that handle especially sensitive and/or desirable data -- financial information, government records, etc. -- this should be one of the most dynamic components of information technology security (Cobb, 2011). Standard users within the company will have little to do with addressing viruses after they are reported, however many virus entry methods depend on user interaction and allowance and thus virus recognition and response should definitely be a regular part of education and training programs (Cobb, 2011).

Conclusion

By building strong network security foundation, training personnel, and putting proper virus-handling procedures in place, the company will greatly enhance its current security. This will enable more certain growth and more secure operations. As the company moves forward, it must maintain continuous awareness of these issues and potential responses......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Computer Security Policy And" (2012, February 04) Retrieved May 21, 2024, from
https://www.aceyourpaper.com/essays/security-computer-security-policy-54001

Latest MLA Format (8th edition)

Copy Reference
"Security Computer Security Policy And" 04 February 2012. Web.21 May. 2024. <
https://www.aceyourpaper.com/essays/security-computer-security-policy-54001>

Latest Chicago Format (16th edition)

Copy Reference
"Security Computer Security Policy And", 04 February 2012, Accessed.21 May. 2024,
https://www.aceyourpaper.com/essays/security-computer-security-policy-54001