IT Security Policy
Select a type of business of your choice. This can be a university/college/school, factory, retail, consulting, bank, etc.
Research similar types of businesses online and view different security policies. This will help you learn the different aspects of such policies. This includes policy structure, details (look below), how it is created, who is responsible for it, etc.
At a minimum, your report MUST include:
1) Introduction: Business Executive Summary
ï§ What is it?
ï§ Why security is important?
ï§ What are some of your vulnerabilities?
2) Who
ï§ Who is responsible for this policy?
ï§ How is the policy going to be enforced?
ï§ How do you respond to incidents?
3) Policies
ï§ User Access (Examples: Who, What, Password, lockout)
ï§ VPN (Remote Access)
ï§ Wireless and Wired connectivity (Mixed network environment)
ï§ Server Load Balancing
ï§ Disaster Recovery, Fault Tolerance, Back up
ï§ Security Devices (Firewalls, Proxy Servers, etc..)
ï§ DMZ
¢ How does it work?
¢ Web Servers
¢ Email Servers
ï§ Miscellaneous (other security concerns and policies, if any)
4) Conclusion /Recommendation