Verified Document

Security Computer Security, Policy, And Essay

Any security policy must, after being properly designed and established, be communicated clearly and comprehensively to all relevant personnel, which in today's organizations typically means anyone with access to a company computer and/or the company network, or who handles digital information or communication for the company (Kizza, 2009; Lahtinen et al., 2006). Ongoing training and development programs for all relevant personnel should be made a regular feature of the company's overall security policy, and there should be a trend towards the greater recognition of the importance of human resources as the ultimate line of defense against malicious security breaches and errors (Cobb, 2011; Greene, 2006). With the right people doing the right things -- that is, following proper procedures -- maintaining proper security policies becomes much easier. One specific way in which the many components of network and other computer/information technology security systems can work together is in the area of virus detection and reporting (Cobb, 2011; Greene, 2006). Developing a strict, concrete, and straightforward system for virus detection and reporting is far easier said than done, and in many companies that handle especially sensitive and/or desirable data -- financial information, government records, etc. -- this should be one of the most dynamic components of...

Standard users within the company will have little to do with addressing viruses after they are reported, however many virus entry methods depend on user interaction and allowance and thus virus recognition and response should definitely be a regular part of education and training programs (Cobb, 2011).
Conclusion

By building strong network security foundation, training personnel, and putting proper virus-handling procedures in place, the company will greatly enhance its current security. This will enable more certain growth and more secure operations. As the company moves forward, it must maintain continuous awareness of these issues and potential responses.

References

Bishop, M. (2003). Computer Security. Boston, MA: Pearson.

Cobb, C. (2011). Network Security for Dummies. New York: Wiley.

Greene, S. (2006). Security Policies and Procedures. Boston, MA: Pearson.

ICR. (2008). Computer Security Management. New York: Institute for Career Research.

Kizza, J. (2009). A Guide to Computer Network Security. New York: Springer.

Lehtinen, R., Russel, D. & Gangemi, G. (2006). Sebastopol, CA: O'Reilly Media.

Whitman, M. & Mattord, H. (2011). Principles of Information Secuirty. Boston, MA:…

Sources used in this document:
References

Bishop, M. (2003). Computer Security. Boston, MA: Pearson.

Cobb, C. (2011). Network Security for Dummies. New York: Wiley.

Greene, S. (2006). Security Policies and Procedures. Boston, MA: Pearson.

ICR. (2008). Computer Security Management. New York: Institute for Career Research.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now