You are on page 1of 3

Student’s Last Name 1

Student’s Name

Professor’s Name

Subject

DD MM YYYY

UNIT 5 DISCUSSION: WHO IS WATCHING YOU?

In any organization information security drives how successful the organization

becomes. A system or policies should be in place to protect the integrity and confidentiality

of information .

How important is it to keep the company's information and data safe?

It is very important to keep company information and data safe as a compromise on data can

cost the company thousands of dollars if personal customer data is lost or accessed by an

unauthorized individual. This can also have a negative impact on the reputation of the

company.

Describe two policies you would put into place to protect the company's information

and data.

Two policies that can be implemented to protect company information and data include:

Information security policy where there is implementation of data encryption and access

control (remote and onsite) to information through the use of passwords, login sessions and

implementing Data Base Management Systems that can be used to protect critical

information.

Also an Email policy can be implemented that gives the company the right to monitor all

incoming and outgoing emails and keeping a record of the content of the emails. The policy

should clearly provide what is deemed prohibited content and what is acceptable.
Student’s Last Name 2

Describe two ways you would monitor employees that work on site.

On site employees can be monitored through user accounts that can be used to track their

activity and keep logs of information they have accessed and made changes on. This can be

achieved through built in access control facilities of an operating system.

Another way is the use of web tracking and filtering software which can keep track of the

website a user accesses and can also restrict access to certain sites or give a time based

restriction.

Describe two ways you would monitor employees that work remotely.

Employees that work remotely can be monitored through the use of Virtual Private Networks

(VPNs). The VPN provides a secure information path where user activity is logged and

regularly monitored for any inconsistency.

Another way to monitor remote access is to give access as and when it is needed and revoke

access as soon the remote user no longer needs it.

Ten of your employees travel to different states to call on customers. Would you give

these employees company credit cards to use? Why or why not?

Giving out credit cards increases the risk of the cards falling into the wrong hands or being

stolen and information on them becomes compromised, however company credit cards that

come with spending policies can be very beneficial to the employee than using the

reimbursement option where personal credit cards are used.

In conclusion it’s important for a company to monitor its day to day processes and how

they affect information security and compliance to its security policies for the success of the

company.
Student’s Last Name 3

Works Cited

Books

Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee , Information Today, Inc., 2006.
Bryant, William D International Conflict and Cyberspace Superiority: Theory and

Practice, Routledge,2015.

You might also like