Email security

Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. Having a security policy that address acceptable use of these resources is an essential aspect of IT governance and management.

Follow guidelines in the (NIST.SP.800-12r1) document to develop a mock Computer/Internet Security Policy. Your policy document must be a 3-5 page stand-alone document that can be reviewed, maintained and distributed to employees, staff or other stakeholders when necessary. Your policy document must contain at least the following sections:

1.  A “Preamble” – it describes

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

· 1) the scope and applicability of the policy (who is affected by the policy, when and under what conditions);

· 2) a definition of technology covered;

· 3) a confidentiality of data statement;

· 4) Incident response handling procedures;

· 5) Responsibilities (monitoring, reporting violations, penalties for violations, etc.)

· 6) a policy review schedule

2. Physical security

· Acceptable use

· Un-acceptable use

· Back-up and storage strategies

3. Access security

· Device

· passwords

· web access

· network access

· remote access

· mobile

· wireless

· Email security

5. Virus protection

Remember to follow APA6 guidelines in citing all sources used. Then also include an APA style reference list as the last page of your Computer/Internet Security Policy.  When you have finished writing your Computer/Internet Security Policy document, click the Write Submission link and submit your paper for grading.  OR, just paste your entire document as a Word doc attachment.