ipl-logo

Information Security: The George Washington Security Policy

139 Words1 Pages
George Washington security policy mirrors the CIA triad and its aligns with university doctrine, which is to keep all dynamic information protected. I believe the policy is well-crafted and hits on some key informational and systems preservation markers. GW policy placed a distinct emphasis on data at-rest, data in-transit, and information being destroyed ("Information Security," n.d.). Data at-rest and in-transit strategies must ensure information is secure & encrypted throughout the entire operation.
I also liked the element of George Washington security policy that conveyed keeping system patched and anti-virus software updated ("Information Security," n.d.). Hackers love to take advantage of unpatched systems and network vulnerabilities.
Open Document