Friday, July 26, 2019
The Role of Information Security Policy Essay Example | Topics and Well Written Essays - 1000 words
The Role of Information Security Policy - Essay Example Regardless of all these, the essence for a security policy on information systems is unquestionable. These security policies and standards are of use to inform employees of firm their duties for protecting and safeguarding information systems of their organization. The policies state the mechanisms under which organizations can carry out these responsibilities. They also give an organization the baseline to get, configure and appraisal information systems for compliance with the policy in operation. The tools of information security system without its policy, it limits its usefulness. Policies and standards are essential in distributed computing location as a means of putting up security discipline for a big and different population of users that is reachable through formal auditing and communications. This strategy is of great importance when dealing with temporal personnel or those under contracts. Policies must show the accepted ways of an organization but also take full advantage of all methods for effecting behavior and spreading of information within a distributed computing location (James et al, 2012). Policies are of more importance in distributed computing locations than a centralized one due to the increased problems of restraining activities coming from a remote location. These policies must therefore be complete and stated clearly to minimize the number of instructions and explanations that the organization requires to handle so that they can be sure there is understanding. Here, they should have identifiers and description generally for business functions and units so that they can surpass changes of the organization (James et al, 2012). Employees play a major role in maintaining information system security. Their main role here is to study and have a close relationship with the IT section so that they can indulge when there is security incident. It is the responsibility of every employee to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.