preview

Essay on Soboat Technology Inc.: Information Sercurity Plan

Best Essays

SOBOTA TECHNOLOGIES, INC.
INFORMATION SECURITY PLAN

Walsh College
BIT 580 Business Case Study

Table of Contents
Introduction………………………………………………………………………………………..3
Business Goals…………………………………………………………………………………….3
Technology Mission……………………………………………………………………………….3
Corporate Assets…………………………………………………………………………………..4
Threats……………………………………………………………………………………………..4
Policies: Acceptable Use…………………………………………………………………………5 Physical Security………………………………………………………………………..6 Security Awareness Program…………………………………………………………...6 Password Protection…………………………………………………………………….7
Environment……………………………………………………………………………………….8
Equipment…………………………………………………………………………………………8
Misuse …show more content…

Research and develop new services to provide to their customers
Technology Mission
Sobota will utilize the following tips to help develop goals for their network security plan:
• Focus on return on value rather than return on investment
• Never assume that network attacks are coming from outsiders
• Work with others to develop and roll out security strategies
• Finding the right balance between security and usability

Corporate Assets
Sobota will achieve and maintain appropriate protection of their assets and ensure that information receives an appropriate level of protection by asking themselves the following questions:
• What are our digital assets?
• What are they worth?
• Where do our assets reside?
• Who has access to our assets and why?
• Is access of these assets extended to business partners and customers?
• How is the access to these assets controlled?
Threats
Our managers face a range of threats and consequences for security failures including financial loss, civil liability and criminal liability. Threats can come in many forms including physical probing, invalid input, and linkage of multiple operations. In order to limit these types of threats, Sobota will comply with the following organizational security objectives: audit, information leakage, and risk analysis. A risk analysis will identify portions of Sobota’s network, assign a threat rating to each portion, and apply the appropriate level of security. They will

Get Access