Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Functional Design Policy, Research Paper Example

Pages: 3

Words: 831

Research Paper

Data security in an organization is very important for the business to safe guard the privacy, confidentiality and integrity of data. A security policy should aim at eliminating intrusion by unauthorized people in the organization (Andress, 2001). The main aim of data security is to ensure that information is protected to eliminate any interruptions. An application security policy is a guideline that comprises of measures that are deemed important to ensure that data is protected from security related risks. The application security of an organization is designed to enhance web application security and provide the latest security updates which may interfere with the operations of the website. An application security policy looks at the various elements that are involved to ensure that data is protected to eliminate instances of Denial of Service (DOS).

This work looks at three areas of data security used by Saab Automobile Company. The organization has data security system that is centered on the below listed areas:-

Detection: On this aspect of security, the company has established proper methods used in detecting intrusion or any form interference with data. The organization has a security alert system on its network and in the website to detect interruptions

Deterrence and prevention: these entail some of the measures that are used to inhibit the entry of any security related threats and emanate within the network system. Deterrence and prevention helps to avoid interruptions caused by viruses.

Recovery and correction methods: These are strategies employed to prevent data loss, the company has put in place good methods of data recovery to avoid data that may cause inefficiencies to the business

This study therefore looks at an application policy used by Saab Automobile Company which is an international company with its head quarters in Sweden. The design and implementation of the above mentioned application policy must embrace the principles of security and access to the data. The implementation process adopted by the organization embraces the need to include cross-functional members of the organization and what how they are expected to contribute in the implementation process. The process is guided by a well defined strategy that is cost effective and ensures efficient operations within the organization. The company has a policy implementation committee that ensures that design policy adopted conforms to data security standards in the automobile industry and has to meet the audit conditions that govern the industry. The implementation process also sticks to the expected practices and fosters employee education and awareness on the security system.

The three major security issues that one could face when: designing and implementing, a network security system are compliance issues to ensure that members of the organization can stick to the requirements of the policy to ensure efficiency within the organization. Compliance may achieved by setting an auditing team within the organization.

Enforcement policy issues to ensure that employees and organization are ready to adopt the security policies enforcement can be enhance by ensuring employee acceptance of the policy.

The other issue that is faced when designing and implement a security policy issue is the relevancy of the policy to the organization to ensure that policy adopted suits the organizations problems (Anderson & Kenneth, 2002).

Password policy: This application policy is used by the company to ensure that there is password to prevent unauthorized access to the data. The password policy adopted by Saab provides proper guide line on how passwords are used within the organization to access the network and provides proper guide lines of how guests can access the data if need arises. The passwords are protected and are revised from time to time to ensure that they are not unanimously known by people in the organization

Data encryption policy: The data encryption policy adopted by the company provides proper guide line of how data packets are converted through cryptanalysis to ensure that they are transmitted in a secure form whereby unauthorized parties cannot read it. The organization operates in an automobile industry where data hacking can make it loose its prototypes to the rival firms in the very industry. Encryption policy provides proper ways of data conversion into forms that are deemed secure for the benefit of ensuring security and confidentiality. Data encryption policy ensures the data sent by an individual can only be accessed and be read by the targeted recipient.

Virtual private network security policy: This is the application policy that is meant to safe guard the virtual private network to ensure that the network is connected to secure sources that are free from security risk factors. The company monitors its connection to the internet and ensures that no intrusion emanate from the external environment. It also ensures that information that shared within the organization does not get out through the external routers that provide connection to the external network system. The policy ensures that the network has good access guide lines to control intrusion.

References

Anderson, J. G. & Kenneth, W. G., (2002). Ethics and Information Technology. New York: Springer-Verlag.

Andress, M., (2001). Surviving Security: How toIntegrate People, Process, andTechnology. Sams Publishing.. 30-73.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

George Washington and His Battles, Research Paper Example

Introduction Humans have been fascinated with technology in recent years and continually pushing the boundaries of innovation. With the ever-changing world of technology, the question [...]

Pages: 4

Words: 1137

Research Paper

A Solution to Gun Violence, Research Paper Example

The issue of gun violence is not only an issue affecting America but also affects diverse parts of the globe that allow their citizens to [...]

Pages: 1

Words: 370

Research Paper

English Colonization and Road to Revolution, Research Paper Example

Part 1 Political motivation during English colonialism was expanding political territories and gaining extra supremacy through trade. The primary motivation for imperialism at the time [...]

Pages: 4

Words: 1023

Research Paper

The Impact of Hybrid Festivals on Audience Participation, Research Paper Example

Cultural festivals serve as platforms for people to congregate, interact and share traditions. People participate in events to gain memorable experiences by engaging in events [...]

Pages: 5

Words: 1339

Research Paper

Just Whom Is This Divorce ‘Good For?’ by Elizabeth Marquardt, Research Paper Example

In this article, Marquardt explores the effects of divorce on children, subsequently arguing that divorce is not necessarily good for those involved. The author cites [...]

Pages: 4

Words: 1093

Research Paper

Evaluating Dual Capacitors’ Performance, Research Paper Example

Introduction Capacitors are an essential component in electrical systems, providing a means to store and release electrical energy. Run capacitors give the motor a continuous [...]

Pages: 1

Words: 320

Research Paper

George Washington and His Battles, Research Paper Example

Introduction Humans have been fascinated with technology in recent years and continually pushing the boundaries of innovation. With the ever-changing world of technology, the question [...]

Pages: 4

Words: 1137

Research Paper

A Solution to Gun Violence, Research Paper Example

The issue of gun violence is not only an issue affecting America but also affects diverse parts of the globe that allow their citizens to [...]

Pages: 1

Words: 370

Research Paper

English Colonization and Road to Revolution, Research Paper Example

Part 1 Political motivation during English colonialism was expanding political territories and gaining extra supremacy through trade. The primary motivation for imperialism at the time [...]

Pages: 4

Words: 1023

Research Paper

The Impact of Hybrid Festivals on Audience Participation, Research Paper Example

Cultural festivals serve as platforms for people to congregate, interact and share traditions. People participate in events to gain memorable experiences by engaging in events [...]

Pages: 5

Words: 1339

Research Paper

Just Whom Is This Divorce ‘Good For?’ by Elizabeth Marquardt, Research Paper Example

In this article, Marquardt explores the effects of divorce on children, subsequently arguing that divorce is not necessarily good for those involved. The author cites [...]

Pages: 4

Words: 1093

Research Paper

Evaluating Dual Capacitors’ Performance, Research Paper Example

Introduction Capacitors are an essential component in electrical systems, providing a means to store and release electrical energy. Run capacitors give the motor a continuous [...]

Pages: 1

Words: 320

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!