StudentShare solutions
Triangle menu

Developing security policy (Security, Ethics and Electronic Commerce Systems) - Essay Example

Nobody downloaded yet

Extract of sample
Developing security policy (Security, Ethics and Electronic Commerce Systems)

A security policy specifically is the imperative foundation on which a valuable and complete security program can be developed. This significant constituent of the overall security architecture is usually ignored. A security policy is the most important way in which management’s decision for security is converted into specific, measurable, and testable goals and objectives. It is essential to take a top down approach (defining the policy and then roles and responsibilities to enact it properly) based on a well-stated policy in order to make an effective security architecture. On the other hand, if there is an absence of a security policy guiding the decision makers, then decisions will be made on ad-hoc bases, by the individuals developing, installing, and maintaining computer systems, and this will result in a disparate and less than optimal security architecture being used or implemented (Weise & Martin, 2001). The structure of this report is as follows: next section describes the components necessary for developing and defining the policy then a policy is developed to govern the transaction management system of an organization.
It characterizes the challenge or issue that management is dealing with. It might include regulatory restrictions, security of highly significant data, or the appropriate utilization of certain technologies. Sometimes, it may be needed to describe terms. It is also vital that everyone involved in the policy, must understands its content. Moreover, the conditions must also be stated under which policy is applicable (Olzak, 2010; Patrick, 2001).
Objectives are usually specified within the scope definition and may take in actions and configurations forbidden or restricted. In addition, these are also normally defined outside a policy, conditions and organizational practices may necessitate placing certain standards and ...Show more


It outlines an appropriate course of actions that must be followed in order to comply with business rules and achieve the business goals. Additionally, a policy is a…
Author : bria87
Developing security policy (Security, Ethics and Electronic Commerce Systems) essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Developing security policy (Security, Ethics and Electronic Commerce Systems)"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Security Plan
Table of Contents Introduction 3 Objectives 3 Scope 4 Physical Threat To Organization’s Information Holdings 4 Theft 4 Sabotage 5 Human Mistakes 5 Environmental Distraction 5 Human Threats To Organization’s Information Holdings 6 Computer Fraud 6
17 pages (4250 words) Essay
Privacy & Security
According to the paper as ‘Electronic commerce’ evolves the business practices of the business around the world in terms of profitability, success, and gaining competitive advantages. Background researches and studies have tried to enhance security but it is still the biggest challenge for security professionals and business.
26 pages (6500 words) Essay
To keep themselves safe and make things go as expected, it is important to have security of different level. A blend of physical, computer, communication, and network security together construct the information security. Not one defense type can protect the company; therefore the perception of total information security is vital to the success of the enterprise.
3 pages (750 words) Essay
Web Security
The paper discusses web security and factors contributing to web security in terms of user’s knowledge, technology, and necessary tools for security. Additionally, the paper touches on the web history, user’s responsibility, internet controls, and development of SWEET.
16 pages (4000 words) Essay
Survey on Security in Electronic Voting Systems
The advantages of the E-Voting System: It provides secrecy and protects the privacy of the voter since the vote is cast anonymously. The credentials of the voter are only checked prior to entering the voting booth. The system allows for the generation of a ballot based on the credentials of the voter and the validity of the credentials determine the number of votes that the voter can cast.
8 pages (2000 words) Essay
Security in Electronic Voting Systems
Electronic voting systems seek to reduce time consumption during any type of voting and increase participation (Liaw, p 108). It also improves the accuracy of results and lowers the cost of conducting elections. There is an advanced online voting system used in universities for teaching and voting, whereby the students vote anytime and anywhere using both fixed and mobile devices such as personal computers, PDAs and smartphones.
7 pages (1750 words) Essay
Security, Privacy and Ethical Issues in Information Systems
This paper focuses on the issues of security and privacy in e-commerce applications; tries to strike an ethical balance between security, privacy, and freedom of information in cyberspace world; and presents results of research findings of the degree of comfort and level of trust in e-commerce applications in consumers.
7 pages (1500 words) Essay
Information System Security
There is a gradual and certain acknowledgment of the stakes involved with ensuring effectual security management. There are a host of factors that influence this process, including the
56 pages (14000 words) Essay
Web Security
ecurity manages and secures web traffic by sorting threats of web malware, blocking URL’s containing inappropriate content, and prevents the loss of confidential data over protocols on the web. Attackers use the web to deliver viruses such as malware. A huge percentage of
7 pages (1750 words) Essay
Selling and purchasing of both new and used vehicles have been made easier. Consumers can now choose from a list of vehicles online, view prices, and place orders (Kelly & Rowland, 2000). It has also
4 pages (1000 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation