--%>

Components in a typical security policy

There are numerous components in a typical security policy. Explain three important components.

E

Expert

Verified

Be it the network security, computer security or information security a typical security policy helps prevent inconsistencies by forming the basis for detailed standards, guidelines, and procedures. Policies make clear management's expectations of employee involvement in protecting information assets. Three basic and important components of a security policy are as follows

1. Purpose: This defines the objective of the security policy whether it is required to improve recovery time, to reduce cost/downtime, or management of overall confidentiality, integrity, and availability.

2. Scope and responsibilities: This provides on whom and what are covered by the policy such as facilities, technology, processes etc. and who is responsible to carry out the same.

3. Compliance: After the awareness program this component provides the effective enforcement of security policy.

   Related Questions in Computer Network Security

  • Q : MAC and Hash function Illustrate the

    Illustrate the differences between the MAC and Hash function?

  • Q : Inverse cipher and AES decryption

    State the difference between equivalent inverse cipher and AES decryption algorithm?

  • Q : Security Requirements and Attacks

    Explain the term Security Requirements and Attacks in network security.

  • Q : Building Wireless Network What kind of

    What kind of Hardware is required to build a Wireless Network?

  • Q : Services by PGP Specify the services

    Specify the services which are offered by the PGP services?

  • Q : MIME content type State the MIME

    State the MIME content type &explain?

  • Q : Competition matrix-Michael Porters

    The competition matrix is a term used while talking about strategy development, first used by Michael E. Porter 1983. They tell about product politics in marketing for individual business fields of an enterprise to gain competition advantage. In this,

  • Q : Categories of security threats Specify

    Specify the four categories of security threats?

  • Q : Block cipher modes Explain why some

    Explain why some block cipher modes of the operation use encryption whereas the others use both the encryption and the decryption?

  • Q : Project to simulate network attack

    Write an Idea for programming project to simulate a network attack or threat mechanism or a defense mechanism. Encipher message by using a keyword;

    Discover Q & A

    Leading Solution Library
    Avail More Than 1442256 Solved problems, classrooms assignments, textbook's solutions, for quick Downloads
    No hassle, Instant Access
    Start Discovering

    18,76,764

    1924590
    Asked

    3,689

    Active Tutors

    1442256

    Questions
    Answered

    Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!

    Submit Assignment

    ©TutorsGlobe All rights reserved 2022-2023.