Do My Assignment!

Are coursework assignment or deadlines stressing you?

We can assist you, we solve problems, answer questions and write papers for top grades

Check our clients testimonials and rest assured you’ll get a high quality, plagiarism-free paper, 100% according to your instructions and deadline!

Special offer! Get 20-30% discount on all orders - Check Coupons Section

Posted: December 6th, 2022

Design a security policy

Design a security policy
You have been asked to design a security policy for a database that contains very sensitive information. Discuss five important issues that should be addressed.
Design a security policy
Discuss five important issues that should be addressed.
The design and development of a security policy need to be developed in consideration of vital aspects related to the environment and system in the interest of organizations or system security. The security policy operates to prevent external threats and maintain the integrity of the network. The desining of security policies need to be developed in consideration of the existing security environment to ensure that they are customized to meed the location, field and operational needs.The security policy’s content needs to ensure that the external and internal threats are prevented and effectively addressed.
The security policy needs to identify and address the system or organization (Johnston et al., 2016). Identifying risks ensures that stakeholders to the system or organization have clarity of the risks and their operations. The development of security design needs to be done in consideration of the risk available in the environment to ensure that the security policy is relevant.
The design security policies need to address the relation of the policies and the legal requirements. The operation and presence of security policies need to conform to the legal requirement to prevent conflicts (Johnston et al., 2016). The security policy design in line with regulations or laws ensures that the authorities back up the policies. It5 is important to note that security policies that are not aligned to the laws or regulations of the country are rendered unlawful, thus not operational.
The security policy needs to address the security level arising from the policies in relation to the existing risks. The security levels should not exceed or be limited, as they would no sufficiently serve organizations and systems (Alotaibi, Furnell, and Clarke, 2016). The security level and levels of risk need to be uniform or aligned in security policy efficiency. Therefore, the security policy needs to ensure an existing balance between security and level of risk.
The policy design needs to address the employee or stakeholder training to effectively observe their operations’ policies. The stakeholder’s training is part of the policy implementation and ensures that the relevant parties have sufficient knowledge of the policy’s operational aspects. Therefore, the security policies must be developed while bearing in mind that stakeholders will be trained for their effective operation.
Additionally, the designing of policies needs to address the policies’ enforcement to ensure that stakeholders or employees abide by them (Alotaibi, Furnell, and Clarke, 2016). The adherence to the policy ensures that they are able to meet the security and safety needs goals and objectives. The security policies can be enforced through penalties, procedures, and compliance standards.
The security policy designing needs to incorporate the critical aspects to ensure that they are operational in meeting the desired security and safety goals and objectives. In this regard, the security policies need to address risks and threats, conformity with the law, security level versus the level of risk, training of employees, and the enforcement of the policies. A comprehensive security policy should be able to address all factor that will determine or affect its operations. The combined security policie issues to be addressed needs to be balanced to ensure that they can work together without conflicts.

Alotaibi, M., Furnell, S., & Clarke, N. (2016, December). Information security policies: a review of challenges and influencing factors. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 352-358). IEEE.
Johnston, A. C., Warkentin, M., McBride, M., & Carter, L. (2016). Dispositional and situational factors: influences on information security policy violations. European Journal of Information Systems, 25(3), 231-251.

Check Price Discount


Order for this Paper or Similar Assignment Help

Fill a form in 3 easy steps - less than 5 mins.

Why Opt for Custom Writing Services

You Want Quality and That’s What We Deliver

Top Essay Writers

To join our team, we choose only the best writers. They each have expertise in specific topic fields and experience in academic writing.

Affordable Prices

We offer student friendly prices while still having maintaining  the best writing standard. Compared to other writing services, our prices are fair and reasonable..

100% Plagiarism-Free

You will never receive a product that contains any plagiarism. We scan every final draft before releasing it to be delivered to a customer.

How it works

When you decide to place an order with Write my Nursing Paper, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price: