Question

The text describes three types of security policies: Issue Specific Security Policy (ISSP), Syste...

The text describes three types of security policies: Issue Specific Security Policy (ISSP), System Specific Security Policy (SysSP), and Enterprise Information Security Policy (EISP). Pick one security policy you have experienced as an employee and describe its effect. How would you change it and why? Provide feedback to your classmates answers and make recommendations for changes as well.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

The Issue Specific Security Policy (ISSP) is the one which I have experienced when the leader of the IT department approached me and warned me about the computer usage in the company. IT leader have me a warning and directed me to read the company's issue-specific security policy.

The company's issue-specific security policy is the one which is used by the organization for outlining the guidelines which governs the use of the individual technologies in that organization. The company as in the example above has ISSP in place for regulating the usage on the company machines and thus work according to that.

We have to work according to the ISSP and use the company resources such as the company Internet and email according to the policy, and also how to use the company-issued equipment. The company addresses each tech component in the ISSP document and thus guide the employees by the proper tech usage.

Add a comment
Know the answer?
Add Answer to:
The text describes three types of security policies: Issue Specific Security Policy (ISSP), Syste...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on...

    Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs. These differences stem from different cyber security risks. They also present organizations with different choices to define and make in their security policies. 1. What are some best practices organizations can observe when creating and maintaining domain policies? 2. LAN security policies often center on issues concerning connectivity; this includes determining how devices adhere to the network. What...

  • If an organization is going to have a chance at a successful security program they need...

    If an organization is going to have a chance at a successful security program they need to develop policies that provide direction for all security efforts and guide the conduct of the users. These policies need to be well written to provide the organization with solid guidance to support their security objectives. Identify and briefly describe the three types of security policies. Your response should include a discussion of where each should be used. Where should policy writers look to...

  • Prior to the first meeting of the RWW Enterprise Policy Review Committee, Mike asked Iris to...

    Prior to the first meeting of the RWW Enterprise Policy Review Committee, Mike asked Iris to meet him in his office. “You’ve convinced me that IT and InfoSec policy are tightly integrated,” Mike said, motioning for Iris to sit down. “And you’ve convinced me that InfoSec policy is critical to this enterprise. Since we are each members of the Enterprise Policy Review Committee, I think we may want to coordinate our efforts when we bring issues up in that group....

  • l picked ventricular tachycardia. Why would be a GOOD hypothesis that is (specific, testable & reasonable) abou...

    l picked ventricular tachycardia. Why would be a GOOD hypothesis that is (specific, testable & reasonable) about the intended drug would have to help patients with ventricular tachycardia. Your group works at a pharmaceutical company that is developing medication to treat these types of heart arrhythmia: e atrial flutter . AV block ventricular fibrillation * ventricular tachycardia Pick ONE of these four types. Do some research and come up with a hypothetical drug to treat this arrhythmia: 1. Provide background...

  • 1.Define both job performance and organizational commitment as well as list/describe the three types of behaviors...

    1.Define both job performance and organizational commitment as well as list/describe the three types of behaviors that make up job performance and three types of commitment that make up OC. Give an example for each concept. 2. Now, think back to both your current and past jobs. Can you identify an instance where you, a coworker, or a direct report was demonstrating EITHER a problem with job performance or organizational commitment? (if the answer is no, try to come up...

  • Please choose 5 questions from 20 and answer them. 1. How can a security framework assist...

    Please choose 5 questions from 20 and answer them. 1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administrator find information on established security frameworks? 3. What is the ISO 27000 series of standards? Which individual standards make up the series? 4. What are the issues associated with adopting a formal framework or model? 5....

  • Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

    Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Please answer the following questions: 1) Describe the main functions of a computer network (12 marks)...

    Please answer the following questions: 1) Describe the main functions of a computer network (12 marks) 2) In your own words, compare the three types of files: directories, ordinary files, and special files. Explain what would happen if a user modified a directory file (10 marks) 3)What are the advantages of having a Windows system using the menu-driven interface, instead of typing commands. Give at least one example where having menus is an advantage (6 marks) 4) Identify at least...

  • Chapter 11 & 12 – Compensation Management 1.   a. Name, describe, compare and contrast three types...

    Chapter 11 & 12 – Compensation Management 1.   a. Name, describe, compare and contrast three types of incentive plans. b. Which type of plan would you recommend be used for faculty at FGCU? Make your case as to why (i.e., convince me this is a good choice)? c. What type of plan would you recommend be used for a maintenance worker at   FGCU? Make your case as to why (i.e., convince me this is a good choice)? Chapter 13 –...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT