Information Security Policy Analysis

Improved Essays
1. Discuss the purpose of an Information Security Policy and how it fits into an effective information security architecture. Your discussion should include the different levels of policies and what should be covered in an information security policy.

A security policy should fulfill a multitude of purposes which a few are: Protecting people, information and setting the rules for behavior by all company personnel. Authorizing security personnel to monitor, probe and investigate. Defining consequences of violations and security baselines. Minimizing risk. Tracking compliance with regulations. An Information Security Policy is comprised of an overall Master Security Policy which states the goals of Senior Management. It also contains the
…show more content…
Advisory policies such as Acceptable Use, Business Continuity, Risk Management, and Data Protection, advise members of an organization what they should or should not do. Informative policies can be the one most subject to change as they provide information on specific concerns the organization has such as social engineering scams like Phishing or ransomware. They often are meant to be educational in nature to prevent members from falling victim. Each of the policies will define the standards and guidelines clearly to help management and members during implementation to meet security goals. As for what one covers in an information security policy depends on what business sector the organization falls under. For instance, a hospital will be concerned with HIPPA and not SOX compliance. Additional informative policies would concern Phishing or ransomware. IBM would be concerned with SOX reporting regulations and would stress advisory policies on discussion of intellectual property.

2. Discuss how an organization can apply the information life cycle to protect
…show more content…
Data then resides on computer registers while the CPU makes use of it. This can leave it vulnerable to rootkits if machines are not sufficiently safeguarded. Endpoint Data Leakage Prevention (EDLP) is critical to catch unauthorized information leaving a network in case there is a problem with a rootkit. EDLP is also critical for archived data to ensure it does not leave the network unexpectedly. Data in motion is also a critical state. Data in motion is data in the state transmission on the network. Point to point VPN tunnels with IPsec/TSL/DTSL encryption capabilities provide security in transit. To further increase security, one can encrypt the data before the transmission encryption process. Data in archive and rest is less vulnerable than in use data, if sufficient safeguards are in place. Data at rest resides on storage devices such as hard drives. Drive encryption such as bit locker which encrypts the entire hard drive except for the boot volume can be beneficial. This encryption used in conjunction with additional file encryption adds an additional security layer. One additional fact is that archived data needs requirements to check for data leakage which is the unauthorized transfer of data. The data policy needs to specify that Archiving will continue evaluation of such data to determine if still has required value. At that point, one designates data for

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Media information systems should be controlled and physically protected to prevent damage to assets and interruption to business activities. Appropriate procedure should be established to protect documents, computer media, the data input / output and documented system from damage, theft and unauthorized access. 7. Attention should be given to protect the integrity of electronically published information to prevent modifications that may harm the company's reputation. The information provided to the public, such as information on the web that can be accessed via the internet must be in accordance with the laws, rules, and regulations in the jurisdiction 8.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Encrypting data is vital for a network as many hackers are seeking to find the easiest way to steal data. If data is left in plain text the hacker would have data and other important information at their disposal. Therefore,…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Western Governors University A. Security Faults Describe three of the security faults in this scenario that caused a security breach. 1. Some accounts existed before the electronic health record(EHR) was deployed. Important steps were missed during the import of old accounts. I suggest using a clean base line for the brand new EHR system.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Qcf Level 5 Unit 5

    • 220 Words
    • 1 Pages

    Based on the policy and produces in my children care (OOSH) out of school hours my staff roll is to encourage the children to learn and Ensure curriculum decision making contributes to each child learning and assist the children, assist with the implementation of the daily routines and use the daily routine times for the children learning. If I was to set goals the following information in my business plan would be forcing on the policy and produces such as the education program policy and Friendship with children and parents Policy and the staff arrangement policy in the work place These type policies provide information and the company values and adjective. Health and safety policy and produces the way the staff have to clean all equipment…

    • 220 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Policies within an organization guide best practice for individual roles and responsibilities in addition to patient rules and responsibilities. State and Federal policies influence organizational policies. ABC Medical Center has an influence on patients on a micro level with policies they have in place. ABC Medical Centers Human Resources link available to employees allows for access to organizational policies.…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Some of the components involved with the HIPAA Security Rule applies to health plans, healthcare clearinghouses, and to any healthcare provider that transmits health information in an electronic form (HHS.org). These entities are affected and applied under the HIPAA Security Rule. The information that is protected includes individual health information in which “an entity creates, receives, maintains or transmits health records in the electronic form” (HHS.org). There are three fundamental areas that the HIPAA Security Rule address in which include technical safeguards, physical safeguards, and administrative safeguards. Technical safeguards must be implemented in order for electronic health information to be properly and safely transmitted.…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    HIPAA Pros And Cons

    • 197 Words
    • 1 Pages

    It covers all forms of information storage from print to electronic media (Pazgar, 2012). HIPAA guarantees privacy of health information largely. HIPAA prohibits the transmission of patient information without…

    • 197 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Our main goal is to prevent any injuries or diseases that can occur. In the workplace, our employees are required to uphold the occupational health and safety policies and procedures to ensure the safety of all our workers and customers. It is extremely important to create a detailed policy in which all workers need to follow. Failure to follow these policies can result in disciplinary measure, up and including termination. We have provided some examples of policies that we will be implementing.…

    • 1362 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Policies serve as roadmaps and are established for the purpose of accepted objectives and strategies in an organization. In addition, policies are comprised of different strategies, on how to handle situations, should they arise. In this case of Gulf Port Ships, Inc, it appears the policy was well written, and should have eliminated any misunderstanding by salaried employees. For instance, in this…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Question: Question 12 Answer: Staff Policies and procedures are there to ensure staffâ€TMs health and welfare are protected and that there rights are supported. Some policies…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Children Act 1989 This legislation attempts to simplify all the previous policies and procedures on child protection. The Children Act 1989 made clear what the duties of people looking after children and young people are, and how all professional should work as a team in cases of child abuse. Children Act 2004 Following the tragic Victoria Climbie case in 2000, it became clear that the existing services and resources allocated to prevent and address child abuse were still largely ineffective.…

    • 641 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1.1 Describe how current health and safety legislation, policies and procedures are practiced in the setting. Primary legislation: Health and safety at work act: Everyone in the organisation is required to: 1. Report any Hazards 2. Follow the school's Safety Policy 3. Make sure their actions do not harm themselves or others 4.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This stage describes how policies are implemented and the challenges that accompany the process. The success of a policy is based on three important criteria. Firstly, a policy needs to come from the person who created it, and then it must go down to the relevant governing bodies within the bureaucracy that has the power to make sure is it passed. Secondly, the policy must be clearly defined and must be easy to interpret in order for it to be implemented effectively. Thirdly, the resources used must not cause competition, conflict or any extensive disruption.…

    • 871 Words
    • 4 Pages
    Decent Essays