{"id":357,"date":"2025-04-23T14:13:32","date_gmt":"2025-04-23T14:13:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/?p=357"},"modified":"2025-04-23T14:13:32","modified_gmt":"2025-04-23T14:13:32","slug":"research-paper-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/2025\/04\/23\/research-paper-2\/","title":{"rendered":"Research Paper 2"},"content":{"rendered":"\n<p>Introduction and Acceptable Use Policy<\/p>\n\n\n\n<p><br>Before determining the most important policies to establish for a company you have to<br>know exactly what you need to protect, how things work, and risks in the industry. There are<br>some policies that are seen as standards and others that are more specialized or specific to a<br>company. That being said, important issues that should be addressed by the policies include<br>expectations, access and authorization, training, system maintenance, &amp; incident response\/<br>recovery. In my research of these policies one of the main ones I came across was the acceptable<br>use policy. This policy includes an agreement to adhere to guidelines and practices for any and<br>all employees of a company prior to using any equipment or network. This also highlight the<br>proper practices for company devices as well. Setting these expectations and the consequences in<br>case of failure to reach these expectations allows for a more professional and coordinated<br>environment (Adsero Security).<\/p>\n\n\n\n<p><br>Incident Response Plan and Access Control<\/p>\n\n\n\n<p><br>With cybercrime and security breaches becoming increasingly more prevalent it is now<br>essential for companies to prepare for them. One of the best methods being an incident response<br>plan. These plans help mitigate the damage caused by attacks and recovery after the attack. This<br>also can include ensuring there are backups in place and methods of minimizing downtime (5<br>Cybersecurity Policies 2022). Ensuring the access to your companies\u2019 network and systems are<br>limited and secure is a big step towards protecting your data and preventing breaches. Access<br>control policies can log who accesses the system, what they do while logged in, and when they<br>sign out. This is important for authentication as well so every employee has access to the system<br>that reflects their rank or position (9 Policies and Procedures 2018).<\/p>\n\n\n\n<p>Security Training and Maintenance<\/p>\n\n\n\n<p><br>When any incident occurs peoples first response is almost always panic. With security<br>awareness training employees will be able to react to an issue in a calm and timely manner as<br>well as identify security threats as they happen. This policy also informs employees of acts on<br>their end that are security risks like opening suspicious emails, phishing or fraud attempts, or<br>giving out sensitive information. Ensuring that your systems are working and up to date and<br>maintaining them are also a big factor in mitigating issues (Adsero Security). A maintenance<br>management policy would ensure that this is done. Keeping the systems updated reduces the<br>likelihood of equipment failure and in the case of equipment failure, delegates responsibility to<br>other equipment to minimize downtime. This also minimizes the costs of replacing equipment by<br>prolonging the life of the equipment already on hand, ensuring the safety and integrity of your<br>companies and employees data (5 Cybersecurity Policies 2022).<\/p>\n\n\n\n<p><br>Conclusion<\/p>\n\n\n\n<p><br>While these are not all of the policies necessary for this company in the design of this<br>security policy these five policies are essential on a base level to maintain the company\u2019s<br>integrity and security. Acceptable use to establish expectations and consequences. Incident<br>response to mitigate damage and quickly recover from attacks. Access control to monitor<br>behavior in system. Security training to prevent or recognize risks, and maintenance to keep<br>everything working and up to date.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p><br>\u201c5 Cybersecurity Policies Every Medium-Sized Business Needs.\u201d IT Services &#8211; IT Force, 21<br>Dec. 2022, www.itforce.ca\/blog\/cybersecurity-policies-every-business-needs.<br>\u201c9 Policies and Procedures You Need to Know about If You\u2019re Starting a New Security<br>Program.\u201d CSO Online, 16 Mar. 2018, www.csoonline.com\/article\/564894\/9-policies-<br>and-procedures-you-need-to-know-about-if-youre-starting-a-new-security-program.html.<br>Adsero Security. \u201c10 Must Have IT Security Policies for Every Organization.\u201d Adsero Security,<br>23 Jan. 2024, www.adserosecurity.com\/security-learning-center\/ten-it-security-policies-<br>every-organization-should-have\/.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction and Acceptable Use Policy Before determining the most important policies to establish for a company you have toknow exactly what you need to protect, how things work, and risks in the industry. There aresome policies that are seen as standards and others that are more specialized or specific to acompany. That being said, important&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aurorafrancis\/2025\/04\/23\/research-paper-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27605,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":14},"categories":[14],"tags":[17,18],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/357"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/users\/27605"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"predecessor-version":[{"id":358,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/357\/revisions\/358"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}