Question

In: Computer Science

What are the different networks and areas where security policies must be adapted? Explain in your...

What are the different networks and areas where security policies must be adapted? Explain in your own word?

Personnel safety

Equipment safety

Environmental impact

Please dont just copy it from the internet

Production loss

Data loss

Solutions

Expert Solution

Security Policy refers to a document created for maintaining the security of an organization in terms of network and information of computer systems. The main aim behind the Security Policy of an organization is to take control of potential data and prevent security attacks by the unauthorized people. The different networks and areas where security policies must be adapted are:

1. Network Security: It includes principles and practices developed for the protection of data over a certain network and network itself. It is implemented to control the unauthorized access on the network through the monitoring of Network Administrator. Initially Authentication is used to verify the user identity and then the information allowed is been transmitted through Firewall on a system. Security of Networks for big organizations involve certain tools with high protection of outside threats and verification over an network.

2. Web Security: It refers to a security of browsing data that is been transferred on the internet. When data is allowed to transmit on an internet, it may be subjected to malicious attacks that may hamper or alter the contents of data and can lead to misuse of data by attackers. There are certain attacks that cause the misleading of users' content such as Phishing, Denial of Service attacks etc. Certain prominent tools are been used by organizations like Internet Protocol Security, Antivirus Software, Password Manager etc.

3. IT Security: It is a field associated to the protection of computer system regarding its hardware and software use. In the emergence of modern technology where the whole world is using Wireless devices and equipments, it is become critical to enhance the security of Computer System from cyber attacks. IT Security deals with a number of vulnerabilities like Eavesdropping, Tampering, Polymorphic attacks etc. that can cause the change in System or Application behaviour and mislead the functions.

4. Data Security: It is a significant discipline of IT Security which works on the protection of information or data stored in computer systems. Disclosure of information to unauthorized users may cause modification, deletion and misuse of data. The essential functions of this field comprise of risk detection and prevention by practicing significant measures such as Confidentiality, Integrity and Availability etc. An organization must adopt certain standards of Information Security such as Authentication, Access Control and Cryptography.


Related Solutions

1.Why are ferns not well adapted to desert areas? 2. Explain how bryophytes are an intermediate...
1.Why are ferns not well adapted to desert areas? 2. Explain how bryophytes are an intermediate between green algae and terrestrial plants. 3.Angiosperms produce pollen in_____
Information security policies are the core internal guidance for an organization and must be enacted prior...
Information security policies are the core internal guidance for an organization and must be enacted prior to the purchase of information security controls. There is a bit of a "chicken and egg" dispute in the information security community as to whether it is appropriate to first engage in risk assessment with policies created to address those findings or whether it is appropriate to first create policies against which a risk assessment can be performed. On a more granular level, security...
Discuss both Finance and Accounting by indicating areas of where they are the same and different....
Discuss both Finance and Accounting by indicating areas of where they are the same and different. What are the major points of both Accounting and Finance.
Textbook: Business Data Networks and Security In your browser you enter the URL of a website...
Textbook: Business Data Networks and Security In your browser you enter the URL of a website you use every day. But today after some delay you receive the infamous 404 Host Not Found error message. What are some of the many possibilities that can cause this problem. List at least 3 that are directly related to the components of TCP/IP communications and how you might troubleshoot each one. (It may be helpful to refer to Chapter 1A to identify some...
what is the principal component of telecommunication? what is the different type of networks? what is...
what is the principal component of telecommunication? what is the different type of networks? what is communications network?
What are Meltdown & Spectre? What are their security implication? What are the impacts of Meltdown & Spectre on the wireless networks?
What are Meltdown & Spectre? What are their security implication?What are the impacts of Meltdown & Spectre on the wireless networks?
Discuss some of the successful user password policies that companies have used for their networks. What...
Discuss some of the successful user password policies that companies have used for their networks. What are some of the challenges that a company faces when it attempts to implement a very secure and stringent password policy?
Explain what is meant by computer network and describe the various types of networks. Your response...
Explain what is meant by computer network and describe the various types of networks. Your response should be at least 200 words in length.
What are the seven different areas of collective bargaining? Explain each area in 200 words.
What are the seven different areas of collective bargaining? Explain each area in 200 words.
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security What are...
No Plagiarism and must be in your own words (300 Words) Subject: Physical Security What are protective barriers, and what should they entail?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT