Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. Having a security policy that address acceptable use of these resources is an essential aspect of IT governance and management.
Follow guidelines in the (NIST.SP.800-12r1) document to develop a mock Computer/Internet Security Policy. Your policy document must be a 3-5 page stand-alone document that can be reviewed, maintained and distributed to employees, staff or other stakeholders when necessary. Your policy document must contain at least the following sections:
1. A “Preamble” – it describes
· 1) the scope and applicability of the policy (who is affected by the policy, when and under what conditions);
· 2) a definition of technology covered;
· 3) a confidentiality of data statement;
· 4) Incident response handling procedures;
· 5) Responsibilities (monitoring, reporting violations, penalties for violations, etc.)
· 6) a policy review schedule
2. Physical security
· Acceptable use
· Un-acceptable use
· Back-up and storage strategies
3. Access security
· Device
· passwords
· web access
· network access
· remote access
· mobile
· wireless
· Email security
5. Virus protection
Remember to follow APA6 guidelines in citing all sources used. Then also include an APA style reference list as the last page of your Computer/Internet Security Policy. When you have finished writing your Computer/Internet Security Policy document, click the Write Submission link and submit your paper for grading. OR, just paste your entire document as a Word doc attachment.