Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

•Consider the organization where you work, or an organization where you would like to work if you are not currently employed.

•Create an Operations Security Policy that would benefit your organization

•Suggest some controls for your policy

•Suggest an audit mechanism

Use the following Format for your policy:

Overview

You should put one or two sentences here that summarize the policy and its purpose for management. This is typically an explanation of why the policy exists. Don't be too technical.

Scope

This is where you define who or what the policy applies to, from all employees to only cashiers that handle cash in the front office. If it applies to equipment, it could be all equipment, all servers, all network connected equipment, or just company issued cell phones. Be specific.

Policy

This is where the policy is actually defined. Don't be too specific, leave that to the procedures and controls that support the policy.

For example, a password policy might state that users cannot share passwords, passwords must be complex, help desk personnel never request passwords, and passwords must rotate periodically.

The details of good password construction can be then put in a guideline document, instructions for the help desk on reseting passwords can be a procedure, and that Group Policy is used to force password changes every 60 days is a technical control.

None of that should be in the policy, but it all needs to be properly documented and communicated to the people that need it - the guidelines to all staff, the help desk procedure to help desk staff, and the technical controls to the domain admins.

If you are in doubt remember that good policy statements talk about what the policy is trying to accomplish, and are addressed to a wide audience. Procedures and controls talk about how it is to be accomplished and are addressed to the staff that must carry it out.

Compliance Measurement

Typically, this section includes the job title of the person responsible for overseeing its implementation or the department if multiple people are responsible, a reference to audit mechanisms, and the consequences for failure to abide by policy.

Definitions, Related Standards, and Policies

This section usually contains definitions of technical or ambiguous terms, cross-references to applicable regulations, and other policies that relate to this policy.

Examples include union contracts, discipline policies, and implementation guidelines. In our password policy example, this where readers would be told to consult the password construction guideline document.

Exceptions

If there any circumstances that might allow temporary exception to the policy, such as during an emergency, define them here. If there is anyone with the authority to temporarily waive the policy, they should be identified by job title. This section is often omitted since many policies do not allow any exceptions.

3-5 pages in length.

APA format.. citations, references etc...

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92866559

Have any Question?


Related Questions in Management Information System

Assignment 1resource read ch 3 to 4 of the spirit catches

Assignment 1 Resource: read Ch. 3 to 4 of The Spirit Catches You and You Fall Down. After reading the article write a 175- to 265-word response to the following: do publicly funded health care programs overrule cultural ...

How information technology has enhanced the use of computer

How information technology has enhanced the use of computer assisted education in the elementary school classroom, and the possible positive and negative impacts this enhancement provides. 3-5 pages does not include titl ...

Managing services and securitytaskyour job in this

Managing Services and Security Task Your job in this assignment is to create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and CentOS. Each of these VM's is to offe ...

Question the local chamber of commerce has asked you to

Question : The local Chamber of Commerce has asked you to speak at the next meeting on your business' successful social media campaign. They asked you to specifically touch on how social media can be used to make potenti ...

Please answer the question below with 250 words or

Please answer the question below with 250 words or more. Question1. Give an example of a project that is driven by each of the following needs. (Each need should have a different project described.) Marketing Demand Busi ...

Discussion one of the challenges of big data and the use of

Discussion : One of the challenges of big data and the use of it to solve problems is understanding the context and quality of the data being used. This is particularly true when internal data is integrated with external ...

Essay question 1state and explain the main useful

Essay Question 1: State and explain the main useful approaches employed to assess future markets for emerging technologies. Essay Question 2: Explain some of the emerging technologies with relevant examples as discussed ...

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Instructionsthis assignment requires that you adapt the

Instructions This assignment requires that you adapt the analysis done for Projects #1 - 4 to a new environment. Use your prior work, i.e. the recommendation memo and network diagram, to develop a high-level plan for imp ...

The main project in this project you are either work on the

The main project: In this project, you are either work on the hypothetical company or an existing company. In either case, you are supposed to develop a Business Intelligence Development Plan for a local corporation. In ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As