Abstract

In spite of the massive investment of money, time and efforts an organization devotes to growth and enhancement with continuous improvements of a sound information security strategy, the human factor is ultimately and eventually the one behind the keyboard. As a result, human beings remain the most vulnerable and weakest entity in the information security chain. A negligent and irresponsible in-house employee can be a threat even to the most breath-tight secure environment, an organization built to keep intruders away from unauthorized access. Information security is considered to be one of the most necessary and crucial issues of the field, with the rapid changes in the information technology that takes place every day and with the business models chasing it and trying to catch up, recently and for a while, it has become one of the most interesting fields to technology and business communities.

Highlights

  • Moving from the Personal Computing era to the necessity of having computer networks all around where the daily life cannot be carried on without having the connectivity in most if not all the time

  • While there is no such thing as absolute network security, there are still different ways to focus on security by constantly monitoring the network behavior and trying to prevent any unauthorized access –with good tools and skills; capabilities of the network administrators, developers and end-users that can constantly audit the computer network for vulnerabilities

  • If one did not have a security policy at all and just about to start writing a new one, this paper proposes some certain guidelines that have to be followed, especially when it comes to the essential components of information security policy as follows: Version

Read more

Summary

Introduction

A security policy is an organization’s unique written document that describes basic best practices when dealing with information systems (Afifi, 2018). A security policy should classify all of an organization’s resources, as well as all the possible and potential threats to those resources

Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call