{"id":363,"date":"2024-12-06T21:23:22","date_gmt":"2024-12-06T21:23:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/?p=363"},"modified":"2025-06-27T12:42:13","modified_gmt":"2025-06-27T12:42:13","slug":"important-issues-to-be-addressed-in-system-security-policies","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/06\/important-issues-to-be-addressed-in-system-security-policies\/","title":{"rendered":"Important Issues to Be Addressed in System Security Policies"},"content":{"rendered":"\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; There are many factors that go into the creation and implementation of corporate information system security policies. These policies will ensure the security and confidentiality of sensitive information present within the system. Due to this, these policies must be carefully created by considering the different areas of a system\u2019s security that could potentially hold vulnerabilities.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The first issue to be addressed within a security policy is the need for management of security threats present in the organization. The main goal of an incident response policy should be to prevent cyberattacks before they happen. This also includes determining the organization&#8217;s response to the incident so that any potential disruptions or cost is minimized. \u201cAn effective incident response plan to help cyber incident response teams detect and contain cyberthreats, restore affected systems and reduce lose revenue, regulatory fines and other costs.\u201d (Holdsworth, Kosinski 2024).<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The next issue to be addressed is the management of an organization\u2019s data. Data protection is essential for any organization that holds any kind of sensitive data. In this policy it is important to consider the CIA Triad, which stands for confidentiality, integrity, and accessibility. A policy surrounding data protection should focus on the reduction of risk concerning the potential for a data breach.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The third issue, especially in today\u2019s rapidly changing technological environment, is the need for a remote access policy. With the rising number of employees who work remote from home it is important to consider the security of an employee\u2019s unsecured personal devices and network. An organization that utilizes remote work requires a policy that addresses these issues and helps ensure that their systems are kept safe from a data breach or other malicious attack.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; When considering the organization as a whole, the issue of network security is presented. A policy that addresses this issue should \u201coutline principles, procedures, and guidelines to enforce, manage, monitor, and maintain data security on a corporate network.\u201d (Khachatryan 2024). An organization\u2019s network security should be properly maintained in order to prevent or mitigate attacks.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The last issue that should be addressed when creating security policies is the need for security awareness and training among the employees of an organization. It is important for all employees, not just the ones involved with information technology, to be aware of and be able to address security concerns. The policy created in response should require security training in order to educate employees with knowledge of common security vulnerabilities and how to prevent easily avoidable attacks methods such as phishing.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><u>References<\/u><\/strong><\/p>\n\n\n\n<p>Khachatryan A. (2024, April). <em>10 Information Security Policies Every Organization Should Implement.<\/em> Ekran. <a href=\"https:\/\/www.ekransystem.com\/en\/blog\/information-security-policies\">https:\/\/www.ekransystem.com\/en\/blog\/information-security-policies<\/a><\/p>\n\n\n\n<p>Holdsworth J., Kosinski M. (2024, August) <em>What is incident response?<\/em>. IBM. <a href=\"https:\/\/www.ibm.com\/topics\/incident-response\">https:\/\/www.ibm.com\/topics\/incident-response<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; There are many factors that go into the creation and implementation of corporate information system security policies. These policies will ensure the security and confidentiality of sensitive information present within the system. Due to this, these policies must be carefully created by considering the different areas of a system\u2019s security that could potentially hold&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/06\/important-issues-to-be-addressed-in-system-security-policies\/\">Read More<\/a><\/div>\n","protected":false},"author":29392,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[6,7],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/posts\/363"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/users\/29392"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/posts\/363\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/posts\/363\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/media?parent=363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/categories?post=363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/tags?post=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}