Wan Design

Information Security Policy

Student Name: Cory Rhyne

Axia College

IT/244 Intro to IT Security

Instructor’s Name: Jeff Colorossi

Date: 12-12-10

  Table of Contents

1. Executive Summary 1

2. Introduction 1

3. Disaster Recovery Plan 1

  3.1. Key elements of the Disaster Recovery Plan 1

  3.2. Disaster Recovery Test Plan 1

4. Physical Security Policy 1

  4.1. Security of the facilities 1

  4.1.1. Physical entry controls 1

  4.1.2. Security offices, rooms and facilities 1

  4.1.3. Isolated delivery and loading areas 2

  4.2. Security of the information systems 2

  4.2.1. Workplace protection 2

  4.2.2. Unused ports and cabling 2

  4.2.3. Network/server equipment 2

  4.2.4. Equipment maintenance 2

  4.2.5. Security of laptops/roaming equipment 2

5. Access Control Policy 2

6. Network Security Policy 3

7. References 3

  Executive Summary

      With a secure building and company the Bloom Design Group will be able to feel confidant that with a few modifications in daily routines and a few more processes needed to perform their jobs, this company will be secure from possible threats.

      With some changes the Bloom Design Group can keep all records confidential be allowing only key personnel to make or copy any data, this will keep the integrity of all data intact and available to the employees who need to view the data.

      Change is not easy, however with the proper training the transition can be a smooth one. Knowing who in the building and who is delivering products to the building can be monitored by security personnel who will help keep any breeches to a minimum.

      The Bloom Design Group only needs to secure two buildings, with the majority of the employees working in remote places offsite, the need of secure networks are equally important.


1 Company overview

      The Bloom Design Group offers design services to people throughout...