University 's have many different types of information systems that are accessible throughout their campus network. This tends to make the information on these systems susceptible to security breaches. This could cause the university potential losses because some confidential information is at risk. At any University, the security of the physical network is critical. A comprehensive security plan is needed to help identify the key concerns and other issues that the University needs to mitigate to help reduce the risk of exposing confidential and private information to any would be attacker.
The purpose of a University Security Policy and why it is necessary
The main purpose of a University’s security policy is for it provide a basis for which it can manage the security of the information that resides on the campus network. The security policy covers all persons (including the staff, all the students, the visitors and contractors) who have access to the University’s information systems. The security policy is necessary because it lays out who obligated to protect confidential information, certain kinds of employment related records, medical and student records, along with any other type of information that could be deemed confidential is related to any applicable law. Since the University’s network provides a connection to confidential information and records, it needs to be secure and access controlled.
My opinion if a university policy is just as important as a business security policy
No matter if an organization is a business or a higher learning establishment (a University) they will always have information that attackers want. In my opinion, I feel that a University’s security policy is just as important if ...
... middle of paper ...
...rty users know to whom and how to report suspected and actual security breaches. They need some kind of documented procedure as well as the individuals they need to contact to help mitigation of any type of actual or suspected breach. The University will need this type of procedure so that breaches can be reported or disclosed as it is required by law. (Scott, 2010)
The suggestion I have for Harvard University’s security policy would be to add a section on the purpose of their policy. They covered so much material in their policy that it lacks the who. The policy needs to contain more than just a link to a statement about the policy. The addition of a purpose section will help users of the system to understand the why of the policy instead of just the what of the policy. The purpose will help the policy establish awareness of why the policy is needed. (Chapple, 2009)
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Racial profiling is a practice where people of color and of certain religions are disproportionately targeted for investigation and enforcement of various laws. It is used all around the globe in order to find and persecute criminals, terrorists, contrabandists, and others breaking the law. In some countries, racial profiling is completely lawful while in other countries it is considered a violation of human rights. For instance, in the United Sates, racial profiling is often considered to be a form of discrimination and is not accepted well by the society because it goes against many principles of the Constitution.... [tags: Race Racism Prejudice Essays]
1090 words (3.1 pages)
- Essay National security once meant a strong dollar, a strong border and the confidence of a people in their government. Now, maintaining our national security depends upon our ability to communicate effectively in other languages and across cultures. A new definition of national security strategy is emerging that must confront issues across the spectrum from dictators to disease, from nation-states to stateless movements, from foreign to domestic battlefields and from outer space to cyberspace.... [tags: Foreign Policy, Middle East]
1233 words (3.5 pages)
- ... We will be installing 8 Access Points per floor which would be sufficient to cover the entire floor, there is also a printer connected to the floor switch. Students can even use their personal Wireless Devices to send print to the Printer. The network coverage is designed to ensure smooth handoff for all wireless users. Network Segmentation Segmentation divides the network into smaller units, hence reduces the amount of traffic on a network. Also it limits the amount of access granted to someone, to what that person needs to know.... [tags: network security flaws, access point]
2398 words (6.9 pages)
- Towson University should make an effort to reduce theft in regards to food services. Food services loses about 40-50 Chic-fil-A sandwiches per day due to theft (Cubbler, R. 2011). Other stolen items are typically sushi, chicken nuggets, and bottled beverages (Cubbler, R. 2011). Towson University should provide a TU police officer during peak theft times, set up a visible working or dummy security camera in the dining facility, or place a set of lockers outside of the dining facility similar to the ones outside of the Bookstore.... [tags: Environmental Issues]
989 words (2.8 pages)
- Are we allowed to post this essay. AY 2011-2012 I Suspect My Government Will Not Do The Right Thing; I Hope They Protect Me. National Security Studies WILLIAM KURTZ DANIEL P CORBIN, NH-4, DEPARTMENT OF THE NAVY SEMINAR 13 KELLY MORRIS, PRIMARY FACULTY ADVISOR The Industrial College of the Armed Forces National Defense University Fort McNair, Washington, D.C. 20319-5062 The views expressed in this paper are those of the author and do not reflect the official policy or position of the National Defense University, the Department of Defense or the U.S.... [tags: Strengths, Weaknesses, Decisions]
1254 words (3.6 pages)
- Several years ago, after her company was acquired and her husband retired, Donna Dubinsky is left without an employer that could finance her family’s health insurance. Having thought that getting individual health insurance was easy, she naïvely decided to get her family health insurance. She discussed with the insurance broker for options, filled out a very long application, yet only to find rejection letters came in the mailbox. (Dubinsky) So, why was she denied. Was it because her long lists of ailments.... [tags: Affordable Care Act]
1519 words (4.3 pages)
- ... These rights are the least likely to be disagreed upon, and also have the strongest claim to universality. As Article 25 of the Universal Declaration of Human Rights states: “Everyone has the right to a standard of living adequate for the health and well-being of himself and of his family, including food, clothing, housing and medical care and necessary social services, and the right to security in the event of unemployment, sickness, disability, widowhood, old age or other lack of livelihood in circumstances beyond his control.” Clearly, survival rights apply to all human beings, as they are the most basic preconditions for a person to maintain livelihood.... [tags: human rights, health care, prejudice]
1376 words (3.9 pages)
- b. Theory and methodology The feminist research was applied to redefine the concept of security from two sides, one as a concept of Arab Political Thought, another as the result of Jordanian women understanding of security. The Arab school of thought and the Arab feminist agenda are important resources from the current research, human security being part of both, a declared priority, a policy and a trend. The case study of the Hashemite Kingdom of Jordan is an original piece of work, the result of one academic year period as research assistant in the Internship Programme of the Centre for Strategic Studies, University of Jordan, where I have participated in events of the centre and other a... [tags: feminist security insight]
868 words (2.5 pages)
- The Arctic Costal Plain Domestic Energy Security Act of 2001 There are many bills that are passed though the House of Representatives everyday. There are many government agencies and interests groups that are behind the bills that either support them or are against them. The bill I have chosen is the Arctic Costal Plain Domestic Energy Security Act of 2001. At this time and place I believe this bill is one of the most important bills that needs to be passed. Congress has found the nation's domestic oil and gas production is in a substantial decline and our dependence on foreign counties is unreliable.... [tags: Papers]
944 words (2.7 pages)
- Formatting Problems The Safety and Security of Students at a University Introduction Our group designed a study to measure violent crimes that occur on University’s campus. We began this study with the benefit being able to be distributed 3 ways: the parents, students, and faculty/staff. The parents would benefit from the results of the study by knowing or gaining a better understanding of how safe the campus of University is. The students would be better equipped with the tools needed to prevent and observe certain crimes from occurring on campus.... [tags: Security]
1123 words (3.2 pages)