Question: Assignment: Create Information Security Model In this assignment you will create an Information Security Model based on the template given below. You will have to

Assignment: Create Information Security Model

In this assignment you will create an Information Security Model based on the template given below.

You will have to create a model depending on the system you have selected (refer to the chart below). Therefore, your model is custom-made. Highlight security issues in your model based on the scope of the system. You can use Internet to find information about your industry/company/organization but do not copy any companys security policy if you come across one during your research. Be precise and brief in each section of the template. The content must reflect your industry-type.

Create template for

1

Hospital

[Replace dots with your policy statements; number of dots are irrelevant.]

Information Security Model

Introduction

The enclosed policies and directives have been established in order to:

Protect this investment.

Safeguard the information contained within these systems.

Reduce business and legal risk.

Protect the good name of the company.

Violations

.

.

Administration

The information services manager (IS manager) is responsible for the administration of this policy.

Contents

The topics covered in this document include:

1. Statement of responsibility

2. The Internet and e-mail

3. Computer viruses

4. Access codes and passwords

5. Physical security

6. Copyrights and license agreements

1. Statement of responsibility

.

.

Manager responsibilities

.

.

IS manager responsibilities

.

.

2. The Internet and e-mail

.

.

Policy

.

.

Acceptable use

.

.

Unacceptable use

.

.

Downloads

.

.

Employee responsibilities

.

.

Copyright

.

.

Monitoring

.

.

3. Computer viruses

.

.

Background

.

.

IS responsibilities

.

.

Employee responsibilities

.

.

4. Access codes and passwords

.

.

IS responsibilities

.

.

Employee responsibilities

.

.

Supervisors responsibility

.

.

Human resources responsibility

.

.

5. Physical security

.

.

Employee responsibilities

.

.

6. Copyrights and license agreements

.

.

Legal reference

.

.

Scope

.

IS responsibilities

.

.

Employee responsibilities

.

.

Civil penalties

.

.

Criminal penalties

.

.

Acknowledgment of Information Security Policy

This form is used to acknowledge receipt of, and compliance with Information Security Policy.

Procedure

Complete the following steps:

1. Read the Information Security Policy.

2. Sign and date in the spaces provided below.

3. Return this page only to the information services manager.

Signature

By signing below, I agree to the following terms:

i. I have received and read a copy of the Information Security Policy

ii. I understand and agree that any computers, software, and storage media provided to me

iii I agree that I shall not copy, duplicate

iv I agree that, if I leave

Employee signature:____________________________________

Employee name:_______________________________________

Date: _________________________________________________

Department:

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!