All our Essay orders are Original, and are written from scratch. Try us today at 30% off

What is Information Technology Security Policy Framework and what is it designed to accomplish?


Information Technology Security Policy Framework

Trevor Henry

Liberty University

Professor Humphries

Information Technology Security Policy Framework


The ever-increasing dependence on information systems as the major methods of carrying out company activities has resulted in the need to keep systems of that sort and the related data safely Nevertheless; several business organizations are still not in a position to address the security breaches through the current and the all-inclusive information security policy (Bhardwaj et al., 2016). Therefore, the overarching aim of this research is to give an outline of security policy in light of Information Technology as discussed below;


· To come up with a framework that can be utilized in establishing critical strategies and application policies.

· To interpret the risks associated with the security of E-Business.

· To provide a basic understanding of the results of a security policy on a business organization.


1. What is Information Technology Security Policy Frameworkand what is it designed to accomplish?

2. Should the Framework be applied to and by the entire organization or just to the IT department?

3. What are the main goals of information security?

Information Security Policy

According to Zeng et al. (2020), availability, authenticity, integrity, utility, confidentiality, and possession remain the fundamentals for security. Besides, achieving these fundamentals is not easy in a potential computing environment. The most appropriate strategy aimed at protecting the activities concerning computing is not straightforward since the current technology, which is the most secure, automatically fails in the future.

A Policy Framework for Interpreting Risk in E-Business Security

According to Garbowski et al. (2019), the life cycle of PFIRES is majorly made up of four phases, that is Assess, Plan, Deliver, and Operate where each phase has a clearly defined outlet formula that must be adhered to during the changeover to the next phase. 

Phase 1: Assess

The overarching of this phase is to assess the suggested change in consideration of the current policy as well as the organizational environment. Its main results comprise a detailed assessment of the organization, the risks, decisions, and communication plan.

Policy Assessment

The policy assessment is carried out to evaluate the current policies, quality, guidelines, and approach. 

Risk Assessment

This is aimed at identifying the company’s assets that should be protected and the possible challenges to the assets. It is further divided into:

Conduct Security Assessment: This aims at identifying the factors that may be threatened to result in insecurity of the information assets.

Assess Business Risk: This identifies the most secure assets.

Develop Security Recommendations: This identifies the best strategy for security.

Summarize Assessment Final Recommendations: The findings are finally analyzed to allow the management to make a final decision concerning the suggested change.

Phase 2: Plan

This phase facilitates the implementation of the suggested change. It is further divided into.

Policy Development

This involves coming up with or improving security plans and coming up with a security policy.

Requirements Definition

This includes a translation of the recommendations to the requirements as well as verification of the requirements.

Phase 3: Delivery

This refers to when the security policy is being implemented. It comprises of two steps:

Controls Definition

This includes the designation of infrastructure, determination of controls, evaluation of solutions, controlling the implementation, creating the implementation plan, building, testing, piloting, and deployment.

Phase 4: Operate Phase

This aims to oversee the controls established to protect the company. Moreover, an evaluation of the business and its technology trends are evaluated.

Monitor Operations

This step aims to administer the operations, communicate, conduct investigations, provide security services, ensure compliance, review trends, manage events, identify internal trends, and escalate to the assessment phase.

The Future

In consideration of management’s leading tools, communication among the senior and security management is facilitated by PFIRES. The business organization is expected to discern the instant benefit due to better communication. This area requires many improvements since this will benefit some areas such as organizational behavior and supply-chain. Better models and tools are required for the analysis and management of security gadgets. A study should also be carried out concerning how better the policy management requirements are met and the necessary improvements that should be established for future success.

References Bhardwaj, A., Subrahmanyam, G. V., Avasthi, V., & Sastry, H. (2016). Design a resilient network infrastructure security policy framework. Indian Journal of Science and Technology, 9(19), 1-8. Garbowski, M., Drobyazko , S., Matveeva, V., Kyiashko, O., & Dmytrovska, V. (2019). Financial accounting of E-business enterprises. Academy of Accounting and Financial Studies Journal, 23, 1-5. Zeng, Z., Li, Y., Cao, Y., Zhao, Y., Zhong, J., Sidorov, D., & Zeng, X. (2020). Blockchain Technology for Information Security of the Energy Internet: Fundamentals, Features, Strategy and Application. Energies, 13(4), 881.
The post What is Information Technology Security Policy Framework and what is it designed to accomplish? first appeared on Assignment writing service.



Best Service

The book review I asked for is so amazing! Endless thanks to your team for completing my review and for...

No Complaints So far Guys

Yeah …I really like all the discounts that they offer, the prices are very flexible. Plus they have different promotions...

Comes through every time

I have used this website for many times, and each time they found perfect writers for me and they produce...

Great Job

Great job! Those were you, guys, who made my coursework perfect in time according to all my requirements. I will...

Mh! not bad…

The worst part ever was to find my deadline postponed for 1 hour ! They couldn`t finish the essay within...


They look cool and trustworthy enough to me. I gather they made discounts as their prices are quite affordable if...

CLICK HERE  To order your paper

About Scholarfront Essay writing service

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for upto 20% off in their first Order. Our payment method is safe and secure.

 CLICK HERE to Order Your Assignment



Let your paper be done by an expert

Custom Essay Writing Service

Our custom essay writing service has already gained a positive reputation in this business field. Understandably so, all custom papers produced by our academic writers are individually crafted from scratch and written according to all your instructions and requirements. We offer Havard, APA, MLA, or Chicago style papers in more than 70 disciplines. With our writing service, you can get quality custom essays, as well as a dissertation, a research paper, or term papers for an affordable price. Any paper will be written on time for a cheap price.

Professional Essay writing service

When professional help in completing any kind of homework is all you need, is the right place to get it. We guarantee you help in all kinds of academia, including essay, coursework, research, or term paper help etc., it is no problem for us. With our cheap essay writing service, you can be sure to get credible academic aid for a reasonable price, as the name of our website suggests. For years, we have been providing online custom writing assistance to students from countries all over the world, including the United States, Canada, the United Kingdom, Australia, Italy, New Zealand, China, and Japan.