COMPUTING POLICIES

1

COMPUTINGPOLICIES

Computing Policies

Various organizations have computer policies that are set to governthe use of information systems, its security and informationconfidentiality. These policies are a declaration of objectives andare executed as a protocol so as to maintain a proper working systemconsistently. As such, it is paramount to consider three professionalstrategies namely security tools policy, firewall policy, andpassword policy.

Security tools policy is an instrument that outlines the rules,regulations, and implementation of computer systems access. Itmonitors the manner in which an organization protects, safeguards,and distributes its crucial information whether corporate orclientele[ CITATION Din10 l 1033 ]. Moreover, it develops astructure for the security of an organization regarding its computernetwork.

As Verma (2010) describes, firewall policy is a software or hardwaredesigned to monitor and regulate the movement of network trafficbasing on rules that are predetermined. It creates an obstructionbetween a protected internal network and other undetermined systemsso as to combat malware on computing resources[ CITATION Din10 l 1033 ].Additionally, this policy stipulates guidance on where and whenfirewalls are needed and recommended.

The password policy is a set of regulations developed to strengthencomputer security through prompting users to apply keen and strongpasswords and make proper use of them(Verma, 2010). This policy couldbe solely advisory or executive with the systems compelling the usersto comply. It has various components including password length andconfiguration, password time span, and password blacklist.

To sum up, computing policies have been put in place to ensure aproper, adequate and secure flow of network data. These policies alsoregulate the type of information that a computer network circulates.It is because computing is arguably the backbone of informationsystems in organizations and for that matter, it has to be securedand transferred with caution.

I

Reference

Verma, D. C. (2010). Principles of Computer Systems and Network Management. New York: Dinesh Chandra Verma.