Question

In: Computer Science

E-MAIL Security Policies / Enterprise Security StrategyPlanInstructions: In NO LESSthan 200 words, answer...

E-MAIL Security Policies / Enterprise Security Strategy Plan

Instructions: In NO LESS than 200 words, answer the following question.

Create an outline that could serve as a template for creating future security policies for an IT Network's E-MAIL functionality. Your template should reflect 2–3 key parts of a security policy related to intranet operations.

For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual security policy from a company; however,ORIGINAL WORK IS A MUST.

The following are suggestions of items to consider as key parts of a security policy:

Threat

Policy statement

Responsibilities

Guidelines and user procedure

Information technology procedures

Compliance and enforcement

Solutions

Expert Solution

Email Use:

Email Security has been the priority for the business and the use of email has been imminent in the field of technology. With the growth of the use of the email the threats of the hackers to the security of the email. There is the need to ensure the security of the email for the businesses and other employees.

How to secure Email?

  • Email Security is a multi-layered discipline which is been using that can involved using several types of the security softwares and the rest of the technology.
  • The implementation of the security packages, these are also the good security practices and many other policies that the staff can also be essential to be securing the communications that are been handled using the email.
  • The systems that are been protected by the businesses as a whole and they are also been worth considering to help in blocking the identity theft that are been performed in identity theft.

Methods Of Securing Email:

  1. The first and foremost part of ensuring the security of the emails is to encrypt the emails and making the emails unable to read to any middle man.
  2. The email encryption is one of the major security which is been done using the public key encoding system and is termed as the highly secure technique which is very hard to compromise with.

Email Security Policies:

  • The emails must not be opened from unreliable sources or the untrusted sources.
  • Using the bcc option with integrity so that the spammers must not get the large list of the names.
  • The employees must know judicious rules of forwarding and reply All buttons which are been able to practiced by the secure business communications.

Methodologies:

  • The impact of the vulnerabilities on the organization may be very intense if not focused on. To keep the network running and fine we need to overcome these vulnerabilities and create patches for these vulnerabilities otherwise the impact of these vulnerabilities will be very immense.
  • The network if contains any of these vulnerabilities and if not focused on removing the vulnerability it can be exploited by anybody resulting in decrease in the privacy.
  • It will also result in getting the security of the network in trouble and can be compromised by anyone anytime.

Hence, these are the impacts of the vulnerabilities and how must one deal with these vulnerabilities.

Responsibilities:

  • It is our first and foremost duty to stay secure and protected while been connected to the internet. Hence, we must stay away from the spams and solicited messages that appear on our inboxes.
  • Must stay connected to a secure network and must never provide sensitive information in plain text. There must be always taken care of the formation of the valid and forbidable vulenrabilites.

Hence, these are our responisiblities when we are connected to the Internet.

Hence, these are all the use of email and internet related activities.


Related Solutions

APPLICATION Security Policies / Enterprise SecurityStrategy PlanInstructions: In NO LESSthan 200 words, answer...
APPLICATION Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's Applications. Your template should reflect2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual...
INTERNET USE Security Policies / Enterprise SecurityStrategy PlanInstructions: In NO LESSthan 200 words,...
INTERNET USE Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's Internet Use. Your template should reflect2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer...
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Compare and contrast audits and assessments. •Pick at least 3 things that are the same and 3 things that are different. •Compare the goals, the timing, and the roles that are involved.
write an essay about J2EE Security? 200 words what is sql injection in 200 words?
write an essay about J2EE Security? 200 words what is sql injection in 200 words?
Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a...
Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment
SCENARIO: A mid-sized employment agency needs your advice on e-mail policies. They want to prepare a...
SCENARIO: A mid-sized employment agency needs your advice on e-mail policies. They want to prepare a one-page document to distribute to employees. Since you're only being asked for advice and to not create the actual document, perform the following tasks: List items you would recommend including in this document, Provide suggestions as to who the key resources should be involved in creating the policy, and Identify the corporate entity, department, or individual to distribute the policy.
The controller of a small business received the following e-mail with an authentic-looking e-mail address and...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Business USA Subject: Official Notice for all users of Big Bank! Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will...
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the...
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the message is clumsy and fails to include essential information in revealing security breaches to customers. Your Task. List at least seven weaknesses Revise this message using the suggestions you learned in this chapter about security breach messages. To: Kara Khalial [[email protected]] From: Justin Small [[email protected]] Subject: Customer Security Incident at Princeton Payment Systems Cc: Bcc: Companies and individuals across the country are experiencing more...
Implementation, Operations, and Monitoring / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words,...
Implementation, Operations, and Monitoring / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Regarding the implementation of a security plan, this can be anything from the organizational change management aspects (users) or the technical implementation (information technology staff),Select 2 key areas to either engage in the normal, everyday operations of a security team, or 2 key areas to monitor, and why. Describe and evaluate each key area. 200 words requirement for each.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT