Why choose us?

We understand the dilemma that you are currently in of whether or not to place your trust on us. Allow us to show you how we can offer you the best and cheap essay writing service and essay review service.

IT or cybersecurity policy

IT or cybersecurity policy

Below is the message from my professor. Please follow this guidelines to work on my order.

“Based on your reading and on additional research on line, what are the major components of an IT or
cyber security policy? If you work for a company are you aware of what the policy is for the company?
Please describe it and if it corresponds to the reading or your research.

If you are only a student, pick either the school, a bank you do business with or other company whose
policy you can view and evaluate it.

Write a 2 to 3 paragraph synopsis of what you found and your analysis”

IT or cybersecurity policy

The major components of IT or Cybersecurity policy

The Cyber Security policy entails officially categorized rules which are to be followed by
all personnel allowed to access assets of a company’s information and technology system. It
serves to mainly inform the users of the system about their roles in ensuring the protection of the
assets. These users may include stakeholders, contractors or employees of the specific company.
The policies also entail the descriptions of the assets to be protected together with their threats. It
consists of the users’ responsibilities, the rules and the significant penalties following a violation
of the rules (Von & Van, 2013).
These assets consist of components such as the company’s email, the Central Processing
Unit, the website, the computer hardware, software applications and PC systems. The software
part of the system includes systems for database management, operating systems,
communication systems and the backup system software. These systems need to be handled with
caution for the confinement of the sensitive company’s information within the company. The
computer systems usually are classified into different security levels depending on their
sensitivities. These include red security level which entails the company’s confidential
information which need not be accessed by outsiders and if need to be used by company
personnel, the access keys should be used. The green level gives way for one to access the red

level. Finally, the white and black levels contain non-confidential though critical information to
the company and need to be accessed on permission (Von & Van, 2013).
The Bank of America is a developed firm and massively corresponds to the policy
components. It entails security setups to ensure all online transactions are preserved for the
respect of their customers. Each client is provided with instructions on how to manage their
online accounts and personal information. The security policy levels are also applicable both to
the staff and customers to ensure a high level of confidentiality (Von & Van, 2013).



Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security.
computers & security, 38, 97-102.

All Rights Reserved, scholarpapers.com
Disclaimer: You will use the product (paper) for legal purposes only and you are not authorized to plagiarize. In addition, neither our website nor any of its affiliates and/or partners shall be liable for any unethical, inappropriate, illegal, or otherwise wrongful use of the Products and/or other written material received from the Website. This includes plagiarism, lawsuits, poor grading, expulsion, academic probation, loss of scholarships / awards / grants/ prizes / titles / positions, failure, suspension, or any other disciplinary or legal actions. Purchasers of Products from the Website are solely responsible for any and all disciplinary actions arising from the improper, unethical, and/or illegal use of such Products.