IT Security Policy Framework

Superior Essays
IT Security Policy Framework
Darryl E. Gennie
Professor Kevin Jayne
Augusta
CIS 462
26 July 2015
Strayer University

For the healthcare insurance industry it is important to have an Information Security Policy Framework within the organization. This protects information that is accessed across the network by staff personnel and patients. ISO 27000 includes a series of international standards that provide a model for establishing, operating, maintaining, and improving an Information Security Management System (ISMS). ISO 27001 provides specific best practices for ISMS, which incorporate the information security requirements of many other regulations such as the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley
…show more content…
The user domain refers to any end user accessing information in any form (Johnson, 2011). A good way to ensure that your users are aware of all policies and practices is to provide training when they are hired. This training should address the acceptable use policy, e-mail policy, privacy policy and the system access policy (Johnson, 2011). Workstation domain is defined as any device that an end user utilizes to access information (Johnson, 2011). There should be some type of software management system that addresses inventory management, discovery management, patch management, helpdesk management, log management, and security management. This software is able to effectively manage access of who, what, where, and when on the network as well as provide support to users and provide security updates regularly (Johnson, …show more content…
It may include all or a combination of a hub, switch, router and firewall. A business LAN is much more complicated than a home LAN. They have either a flat network or a segmented network. In a flat network, there are few if any, controls to limit network traffic. When workstations connect to flat networks, they can see and attempt to connect to any other device on the network. These networks are considered to be the least secure. A segmented network limits the way in which computers can communicate with each other. By utilizing switches, firewalls, routers and other devices, network traffic can be restricted. This enables the ability to eliminate the number of threats to the network (Johnson, 2011). LAN-to-WAN is defined as the bridge between a LAN and a WAN. A LAN is utilized for connecting computers within offices or groups of building, while a WAN is used for connecting computers across the country or globally. It is essential to utilize firewalls on a WAN (Johnson,

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    A firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network is defined in the firewall policy, and all other traffic is denied. ¥ 1.5 LAN versus WAN LAN, which stands for local area network, and WAN, which stands for wide area network, are two types of networks that allow for interconnectivity between computers. As the naming conventions suggest, LANs are for smaller, more localized networking than in a home, business, school, etc.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Additionally, when remote workers are employed by organizations it is important to provide the employee with a secure connection to the network and server. By using a VPN, the establishment of a safe connection can ensue. For example, when buying locks to keep homes or businesses safe there is a different key for every lock. This means like keys; the VPN establishes a secure connection that does not allow for intrusions to occur by using the Internet (Stewart 19). The remote connection is established by using a tunneling protocol which adds security by encrypting data.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    At last, there are different workplaces in the building. Each of these workplaces will have one PC for staff use, except for the confirmations office, which will have five PCs. There will be two server rooms, one on the first floor and one on the second floor. The main requirements for designing the network are: • Student-got to PCs ought to be on separate network from the staff systems. PCs for open utilization ought to be on a different system.…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most wide area networks are made from several Local area networks connected together. A Local area network covers a small area. However, the Internet is a wide area network. This means the devices can be shared and this is effective for the reason that employees can see the possessions and it is faster and it ensures the company knows what is occurring. Network users can communicate by email and instant messenger.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Remote access is the one which helps us to get access to a computer or network form a remote distance. In many organizations branch offices, telecommuters, and people who are traveling may need access to the corporation’s network. Home clients gain admittance to the internet through remote access to an Internet Service provider(ISP). Dial-up association through work area, scratch pad, or handled PC modem over general phone lines is a typical technique for remote access. Remote access is additionally conceivable utilizing a committed line between a PC or a remote neighborhood and the central or main corporate local area network.…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Router to router 4. Pc to pc. Wi-Fi Technology This was used to connect the electronic devices used in the network using the 2.4-gigahertz.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    HIPAA Security and Privacy: Cases and Scenarios Brittany Stewart Herzing University Dr. Gary J. Hanney Abstract HIPAA security and privacy is an important aspect of healthcare delivery. Government influences greatly how legal issues are addressed in healthcare, including non-governmental entities. This essay will explain how the HIPAA privacy rule should be applied appropriately with protected health information.…

    • 945 Words
    • 4 Pages
    Superior Essays