Bowles, Robert G.
College for Professional Studies
MS Systems Engineering
School of Computer & Information Science
Thesis - Open Access
Number of Pages
Computers as well as the networking environments in which they operate have evolved into highly sophisticated and complex systems. The intricacy of these systems and especially the relationship between them forms the greatest area of vulnerabilities for organizations. (Whitman and Mattord, 2004) Information needs to be transmitted to and from the organization, and thus may be vulnerable within certain stages along the communications line. If at any stage of the process, the information is compromised, it could have a negative impact on the entire organization. Protective measures such as disaster recover plans, encryption/ decryption, and information system security controls, can minimize or prevent the negative consequences. Therefore it is vital that management of information system assets take measures to protect their critical data and information from loss damage and misuse. The process of minimizing risks associated with information security includes the compilation of a detailed and standardized information security policy. Such a policy has to address issues such as threats and possible counter measures as well as defining roles and responsibilities. The aim of this study was to assess the status of the information security policy compiled and implemented by Loreto College Msongari. During the study, the status of security of the information systems assets at the college, existence and format of the security policy as well as the commitment of the college to address security issues was measured.
Date of Award
© Paul Mwai
All content in this Collection is owned by and subject to the exclusive control of Regis University and the authors of the materials. It is available only for research purposes and may not be used in violation of copyright laws or for unlawful purposes. The materials may not be downloaded in whole or in part without permission of the copyright holder or as otherwise authorized in the “fair use” standards of the U.S. copyright laws and regulations.
Mwai, Paul M., "An Investigation Into Rewriting a Security Policy for Loreto College" (2009). Student Publications. 55.