Computer System Security Foundation

Fundamental concepts in computer security and system protection.

Sophia Johnson
Contributor
4.7
46
10 months ago
Preview (4 of 10 Pages)
100%
Log in to unlock

Page 1

Computer System Security Foundation - Page 1 preview image

Loading page ...

Computer System Security FoundationName:Instructor:University attached:Date;"Discuss the various types of company assets, including information systems, intellectual property, andconfidential information, and their associated risks. How should a company develop and implementsecurity and safety guidelines to protect these assets? Provide a comprehensive analysis of the differentsecurity measures for protecting information, personnel, and physical assets, and evaluate how thesemeasures can be applied in a business context. Use a real-world example or case study to support yourdiscussion. (Word count: 1500-2000 words)"

Page 2

Computer System Security Foundation - Page 2 preview image

Loading page ...

Page 3

Computer System Security Foundation - Page 3 preview image

Loading page ...

Table of ContentsComputer system security foundation.......................................................................................................11. Company’s Information Systems Assets:.............................................................................................2A. Information system Assets:..................................................................................................................3a)Risks Associated to Information System:.........................................................................................3B. Intellectual property Assets:.................................................................................................................3a)Risks Associated to Intellectual property:.........................................................................................4C. Confidential information Assets:..........................................................................................................4a)Risks Associated to Confidential information:.................................................................................52. Security and Safety Guidelines for protecting the Company’s assets:...............................................5A. Security for Information Assets:..........................................................................................................6B. Security for Personnel Assets:..............................................................................................................6C. Security for Physical Assets:................................................................................................................7References:.................................................................................................................................................101.Company’s Information Systems Assets:Companyassets areprojectedto useonly tospreadtheCompany’s businessterms,drivesandtheirbusinessgoals. All theassets mustbeprotectedandshould be usedfortheirbusinesspurpose only,except fewlimiteduses which doesn’thave anyaffectwith theirbusiness,isotherwiserequiredin compliance with theapplicable policies.Thisshould include protection oftheirphysical assetssuch astheofficeequipment,amenities,furnitureandmaterials.Moreover,Company’sinformation systemand othertype oftechnologicalassets includingtheirintellectual property rightand theconfidential information.

Page 4

Computer System Security Foundation - Page 4 preview image

Loading page ...

A.Information systemAssets:Thesesystemsincludescomputers,email, voicemailsand internet accessibility isrequiredto beused forthepurposes in aconsistentmanner bytheconsiderable codesand allshould followCompaniespolicies.Generally, company’sdoes not committedto monitoringthe internet practice or messages in theemployee’s voicemail or their e-mail systems that shows the unprotected or unsecure systemswhere any can search anything as they want to do. However, Companyhave the rightsto do so inappropriate wrong circumstances and can go for applicable laws and regulations.a)RisksAssociated to Information System:Personal use of theinformation systems may berisk for the company, suchas thepersonal use can keptthe reasonable information.Example, Company’s, informationsystemcouldbe use to send andforward thesatisfiedother than the Company’s breaches.If any employeehavebeenaccessing theCompany’s information systemsthat may alsocreate the issues of security violation.B.Intellectual propertyAssets:Every company’sintellectual property rights are valuable assets andit requires to protect fromalltheemployees. It’sgreatlyrespectful thatall intellectual property rightof Company’s whichinclude; trademarks,copyrightsand service marks,copyrights (includein software),domainnames,databaseabstractionrights,design rights,rights in know i.e.how orthe other confidential
Preview Mode

This document has 10 pages. Sign in to access the full document!