SOLUTION: JNTU Cyber Security Planning Network Security & Security Policies Discussion

Hi, find attachedRunning Head: SECURITY POLICIES1Security PoliciesStudent’s NameInstitutionDateSECURITY POLICIES2A security policy refers to a document within an organization that shows how anorganization is protected from system hacking and ways to solve the issues effectively. A mediumfinancial company is essential to develop securities policies that increase their operations andprevent some problems.First, employees concentrating on their email using the company’s email should stop andonly use the emails to send the organization’s messages only. An acceptable email policy helpsavoid wasting time, enhances security, and reduces the security risks that may occur. The policyshould also ensure that it monitors all roles intent to perform (O’sullivan, Harpur, Willner, Stern,2017). Therefore, the policy will only allow the users to use the company’s email to perform onlybusiness activities only. It is because no one can stop employees’ workers from receiving personalemails. Therefore, the policy should ensure that the employees consider sending business emailsfirst during working hours. It should also ensure that employees filter and separate their messagesfrom the business folders. Thus, you can prohibit excessive personal use of email and also engageonly in legal activities.On the other hand, the internet usage policy will give the employees within the organizationguidelines on utilizing the company’s network and internet. Therefore, the policy will help protectboth the business and the employee (Leo, Battisti, Carli, Neri, 2014, November). It should restrictthe employees from downloading files from specific sites since it may increase security issues.The policy is therefore applicable to all employees who access the internet and computers withinthe organization. Compliance with the policy will lead to improved performance, thus meeting therelated standards, process, and policy requirements.SECURITY POLICIES3ReferenceLeo, M., Battisti, F., Carli, M., & Neri, A. (2014, November). A federated architecture approachfor Internet of Things security. In 2014 Euro Med Telco Conference (EMTC) (pp. 1-5).IEEE.O’sullivan, P. J., Harpur, L., Willner, B. E., & Stern, E. H. (2017). U.S. Patent No. 9,742,778.Washington, DC: U.S. Patent and Trademark Office.Running Head: SECURITY CULTURE1Security CultureStudent’s NameInstitutionDateSECURITY CULTURE2Security culture refers to values that work together and shareable among the organizationmembers, and it determines how they understand t…

Order a unique copy of this paper
(550 words)

Approximate price: $22

Our Basic features
  • Free title page and bibliography
  • Plagiarism-free guarantee
  • Unlimited revisions
  • Money-back guarantee
  • 24/7 support
Our Options
  • Writer’s samples
  • Expert Proofreading
  • Overnight delivery
  • Part-by-part delivery
  • Copies of used sources
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

AcademicWritingCompany guarantees

Our customer is the center of what we do and thus we offer 100% original essays..
By ordering our essays, you are guaranteed the best quality through our qualified experts.All your information and everything that you do on our website is kept completely confidential.

Money-back guarantee always strives to give you the best of its services. As a custom essay writing service, we are 100% sure of our services. That is why we ensure that our guarantee of money-back stands, always

Read more

Zero-plagiarism tolerance guarantee

The paper that you order at is 100% original. We ensure that regardless of the position you are, be it with urgent deadlines or hard essays, we give you a paper that is free of plagiarism. We even check our orders with the most advanced anti-plagiarism software in the industry.

Read more

Free-revision guarantee

The thrives on excellence and thus we help ensure the Customer’s total satisfaction with the completed Order.To do so, we provide a Free Revision policy as a courtesy service. To receive free revision the Academic writing Company requires that the you provide the request within Fifteen (14) days since the completion date and within a period of thirty (30) days for dissertations and research papers.

Read more

Privacy and Security policy

With, your privacy is the most important aspect. First, the academic writing company will never resell your personal information, which include credit cards, to any third party. Not even your lecturer on institution will know that you bought an essay from our academic writing company.

Read more

Adherence to requirements guarantee

The academic writing company writers know that following essay instructions is the most important part of academic writing. The expert writers will, therefore, work extra hard to ensure that they cooperate with all the requirements without fail. We also count on you to help us provide a better academic paper.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2020 at 10:52 AM
Total price:
The price is based on these factors:
Customer Academic level
Number of pages required
Urgency of paper