In: Computer Science
E-MAIL Security Policies / Enterprise Security Strategy Plan
Instructions: In NO LESS than 200 words, answer the following question.
Create an outline that could serve as a template for creating future security policies for an IT Network's E-MAIL functionality. Your template should reflect 2–3 key parts of a security policy related to intranet operations.
For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual security policy from a company; however,ORIGINAL WORK IS A MUST.
The following are suggestions of items to consider as key parts of a security policy:
Threat
Policy statement
Responsibilities
Guidelines and user procedure
Information technology procedures
Compliance and enforcement
Email Use:
Email Security has been the priority for the business and the use of email has been imminent in the field of technology. With the growth of the use of the email the threats of the hackers to the security of the email. There is the need to ensure the security of the email for the businesses and other employees.
How to secure Email?
Methods Of Securing Email:
Email Security Policies:
Methodologies:
Hence, these are the impacts of the vulnerabilities and how must one deal with these vulnerabilities.
Responsibilities:
Hence, these are our responisiblities when we are connected to the Internet.
Hence, these are all the use of email and internet related activities.