Complete the thinking outside the box assignment number 2 on page 371 of your textbook by researching what is needed to develop a sound network security policy. Write at least a one-page paper in current APA format that charts all of the employee and department details listed in the project. Write at least a three-page paper in current APA format that provides a security policy for each department that includes any restrictions, resource usage, or reporting requirements that would be necessary to keep the network secure. Create a hypothetical business with approximately 50 to 100 employees. Place the employees in two or three different departments. Assign to each department a title and basic job duties. All employees in all departments use personal computers for numerous activities. Identify the computer activities for the employees of each department. Then create a security policy for the employees of each department. Be sure to address when and where the employees have access to computer resources, and if any types of transactions should be restricted.

Title: Developing a Comprehensive Network Security Policy for a Hypothetical Business

Introduction:
A robust network security policy is crucial for businesses, as it ensures the protection of sensitive information and safeguards against potential cyber threats. This paper aims to provide a comprehensive security policy for each department within a hypothetical business, consisting of 50 to 100 employees. By understanding the employees’ roles, computer activities, and access requirements, we can establish effective policies to maintain network security.

Department 1: Sales
Title: Sales Department
Basic job duties: Generating leads, managing customer relationships, closing deals

Computer activities:
1. Email communication with clients and colleagues
2. Accessing Customer Relationship Management (CRM) software
3. Online product demonstrations
4. Accessing online sales portals

Security Policy:
1. Access to company email accounts should be limited to work hours only.
2. Strong password requirements for all accounts associated with customer data.
3. CRM software can only be accessed from registered company devices using secure VPN connections.
4. Employee computers must have updated antivirus programs to prevent malware attacks.
5. Regular data backups of CRM and sales portal information.

Department 2: Human Resources (HR)
Title: Human Resources Department
Basic job duties: Recruitment, employee onboarding, payroll management, policy development

Computer activities:
1. Email communication with job applicants, employees, and management
2. Accessing and managing employee records and payroll information
3. Drafting and storing official HR policies and documents
4. Conducting background checks and verifying applicant information

Security Policy:
1. Employee records and confidential HR documents must be stored in encrypted databases.
2. Access to employee records and payroll information should be restricted to authorized HR personnel.
3. Regular audits of access logs and user permissions.
4. Strict password policies and regular password changes for accessing sensitive HR systems and databases.
5. Access to background check databases only during recruitment processes, with restricted permissions after completion.

Department 3: Research and Development (R&D)
Title: Research and Development Department
Basic job duties: Conducting research, developing innovative products, testing prototypes

Computer activities:
1. Accessing and sharing research documents and technical resources
2. Collaborating and communicating with a geographically dispersed team
3. Running software simulations and conducting data analysis
4. Testing and validating prototypes

Security Policy:
1. Encryption of sensitive research data during storage and transmission.
2. Access to research documents restricted to authorized R&D personnel.
3. Systematic data backup and restore procedures.
4. Strict guidelines for software usage and installation to prevent unauthorized or potentially harmful applications.
5. Regular security awareness training sessions for R&D staff.

Conclusion:
Developing a sound network security policy involves understanding the specific requirements of each department within a business. By identifying employee roles, computer activities, and access requirements, we can outline appropriate restrictions, resource usage guidelines, and reporting requirements to ensure network security. The hypothetical security policies provided for the Sales, HR, and R&D departments serve as examples of how businesses can tailor their policies to protect sensitive data and mitigate potential cyber threats.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer