Preview

Security Plan - Knowledge and Information Security

Powerful Essays
Open Document
Open Document
4348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Plan - Knowledge and Information Security
Contents

CONTENTS 4
EXECUTIVE SUMMARY 6
RESPONSIBLE PERSONNEL 7
CHIEF SECURITY OFFICER 7
ELECTRONIC SECURITY MANAGER 7
PHYSICAL SECURITY MANAGER 7
RISK MANAGEMENT OFFICER 7
ASSESSMENT OF RISK 8
PHYSICAL 8
ELECTRONIC 9
DATA ACCESS SECURITY 10
GENERAL SECURITY 10
USER AUTHORISATION 10
USER AUTHENTICATION 11
SECURE DATABASE 11
PHYSICAL FILES 11
ELECTRONIC INTRUDER DETERRENCE – VIRUSES AND MALWARE 12
SOCIAL ENGINEERING 12
FILE SHARING 12
WIRELESS NETWORKS 13
STAFF VETTING AND SEPARATION PROCEDURES 13
GENERAL STATEMENT 13
STAFF SCREENING 13
SEPARATION PROCEDURES 13
PERSONNEL SECURITY 14
GENERAL STATEMENT 14
PASSIVE MONITORING 14
POSITIVE MONITORING 14
PHYSICAL SECURITY 15
GENERAL STATEMENT 15
AUTHORITY FOR ACCESS 15
ACCESS CRITERIA 15
INTRUSION DETECTION SYSTEMS 16
EQUIPMENT SECURITY 16
MONITORING SERVICES 17
SECURITY BREACH NOTIFICATION 17
INCIDENT RESPONSE 17
CHANGE IN CULTURE 17
INCIDENT TRACKING 17
INCIDENT RESPONSE TEAM 18
DISASTER RECOVERY 18
GENERAL STATEMENT 18
BACKUP FILES 18
SECURITY AWARENESS TRAINING 19
GENERAL STATEMENT 19
INITIAL 19
PERIODICAL 19
CONTENT 19
General 19
Specific 20
GENERAL SECURITY AWARENESS TRAINING 20
CONCLUSION AND RECOMMENDATIONS 22
BIBLIOGRAPHY 23 Executive Summary
Given the extent of, and the nature of the organisation, the effective operation of the information technology systems is vital to the continuation of business. However, a corporation of 600 staff poses unique security challenges, many of which are satisfied with the implementation of an operational training program completed by all staff.
This plan was developed, in part, to address issues identified in the security audit of 2007. Some of the issues raised have been addressed through the implementation of the Technical Systems and Information Technology Security Policy presented independently of this plan. Other issues of concern include incident response, disaster recovery, and business continuity. General



Bibliography: Hagen, J., Rong, C., and Sivertsen, T., “Protection against Unauthorised Access and Computer Crime in Norwegian Enterprises”, Journal of Computer Security, vol. 16:3, 2008, pp. 341-366. Irvine, C. and Thompson, M., Expressing an Information Security Policy within a Security Simulation Game, (U.S. Naval Postgraduate School: 2005). Maley, G., “Enterprise Security Infrastructure”, IEEE Proceedings of WET ICE, 1080-1383, 1996. Mazzariello, C., Multiple Classifier Systems for Network Security: From Data Collection to Attack Detection, Ph. D. Thesis – Supervisor: Prof. Cordella, L. Nov. 2007. Solms, R., “Information Security Management: Guidelines to Management of Information Technology Security”, Information Management and Computer Security, vol. 6:5, 1998, pp.221-223. Solms, R., “Information Security Management: Why standards are Important”, Information Management and Computer Security, vol. 7:1, 1999, pp. 50-57. Volonino, L. and Robinson, S., Principles of Information Security: Protecting Computers from Hackers and Lawyers, (Readcon, New Jersey: 2005). Wagner, A. and Brooke, C., “Wasting Time: The Mission Impossible with Respect to Technology-Oriented Security Approaches”, The Electronic Journal of Business Research Methods, vol. 5:2, 2007, pp. 117-124.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    James M. Stewart, M. C. CISSP- Certified Information Systems Security Profession Study Guide (Vol. 6th ed).…

    • 1033 Words
    • 3 Pages
    Good Essays