Course Hero Logo

unit-7-power-point-final 1 .pptx - Unit 7: Organisational...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 9 pages.

Unit 7: OrganisationalSystems SecurityTask 3 – P4 Explain the policies and guidelines for managing organizational IT securityissues/P5 Explain how employment contracts can affect security/P6 Review the lawsrelated to security and privacy of data/M3 Explain the role of ethical decision makingin organizational IT security/D2 Evaluate the security policies used in an organization
Security Policies and guidelinesDisaster recovery Policies: Also known as DR is a type of security planning that is used as a way to protect abusinesses data and major functions. This is used to protect a business from the effects of large negative events forexample floods and fires as well as something like a virus or malware. This plan usually uses backups of data storedin a different location of where they are as if there was to be a fire the main system might be affected but thebackup system with all the saved data is in a different location that is safe.Updating security procedures: This is very important as security is one of the top priorities in a business. It is veryimportant for a business to update their security procedure on a frequent basis as it means they will be protectedagainst the latest threats that would have been able to get through their older security system. If they don’t do thisoften they put their systems at risk as the older the security procedure the more likely new malicious software’slike viruses are to infect the system.Scheduling of security audits: This is a systematic evaluation of the security procedures a business is using withtheir information system. This checks whether the security they are using conforms to a set of established rules aswell as how close it is to these criteria. It is a good idea for the business to schedule it as it means they can keep ontop of how well their security system is and doing so allows them to know when they need to update it andimprove the security procedures.Codes of conduct: This is a set of rules that all employees must abide by when using the businesses system so thatthe business can ensure that employees are only using the system for what it is meant to be used for and nothingelse. This is not only to keep employees doing work but to also keep the system secure as if an employee was touse the system for their personal use they could end up downloading malicious software which will greatly damagethe system. These codes of conduct will usually go over things like not being able to use your personal email whileat work and using the business’s system to ensure security as well as going over internet usage policies. Thesepolicies will be about how you cannot use certain things on the internet like dangerous websites as well as thingslike social media as this is all to keep the business system secure as well as everything on it.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
NoProfessor
Tags
Computer Security, Computer program

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture