Nt1330 Unit 2

Improved Essays
Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are:

1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password
2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights.
3. Every employee, contractor or third party should return all the company's assets used for work depending on the contract, when the employee, contractor or third party quit the company or moved other part.
4. Operating procedures specified in the security policy should be documented and maintained.
…show more content…
Media information systems should be controlled and physically protected to prevent damage to assets and interruption to business activities. Appropriate procedure should be established to protect documents, computer media, the data input / output and documented system from damage, theft and unauthorized access.
7. Attention should be given to protect the integrity of electronically published information to prevent modifications that may harm the company's reputation. The information provided to the public, such as information on the web that can be accessed via the internet must be in accordance with the laws, rules, and regulations in the jurisdiction
8. The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access
All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and

Related Documents

  • Decent Essays

    Nt1310 Unit 2

    • 592 Words
    • 3 Pages

    I am a registered health information technologist. I am currently working on an Epic implementation as an analyst and trainer. All answers are based on my personal experience or my previous education unless denoted by in text citation. TASK: A. EXAMINE ELEMENTS OF THE VENDOR SELECTION PROCESS BY DOING THE FOLLOWING: 1.…

    • 592 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Requirements may be specified in a variety of ways. However there are some guidelines worth following: • Representation format and content should be relevant to the problem. • Information contained within the specification should be nested. 3.3.1.…

    • 87 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Any organization, including ABC healthcare Information technology (IT) infrastructures are exceedingly powerless against potential assaults or harm caused from internal and external threats. Meeting standardize compliance requirements developed by the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA) is critical to reduce potentials assaults to guarantee their infrastructures are secure to the best degree possible by substituting data frameworks regulations. Technical security recommendations to improve ABC Healthcare information security can enhance their information security without significantly increasing management or cause difficulty in the organization. Healthcare industries store and have…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Foyle Legal Case Study

    • 509 Words
    • 3 Pages

    Last updated 23 Dec 2016 Foyle Legal is committed to protecting your privacy with your rights and needs in mind. This privacy statement is aimed to provide an outline on how we handle your personal and sensitive information. Your Consent You have no obligation to disclose personal or sensitive information when you visit the Foyle Legal website.…

    • 509 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    While there are many methods to reduce risk, the CLN project team failed to identify the need of a having software legal expert team member, who would have been able to give input during the planning phase about the protection requirements in information security for the Briargrove Investment organization. In addition, the questionnaires used to gather information did not address the requirement of foreign law and protections assigned to information security for both clients and customers. Questionnaires developed for this project needed to address not only associate, administration, education, managerial and corporate needs but also information security. Other areas of concern identified were developing…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    False Sense Of Security

    • 892 Words
    • 4 Pages

    To address these risks, the business system should no longer be a single standardized area in which users join from anyplace in the network and obtain the identical points of entrance. In its place, the system demands in-house defenses. Governing requirements additionally put rigorous controls on data movement within the company…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    To be more precise, trainings must be performed every six months to make everyone aware of the procedures during such event. 4. Access control Access control is also an important security and interoperability issue of the Bank Solution Inc. where there is no explanation of which users and administrators have access to control and manage information systems. This problem must be addressed immediately by defining their roles and responsibilities to protect accessibility of sensitive…

    • 1326 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Gamblebet Fraud Case Study

    • 1717 Words
    • 7 Pages

    Access controls are constructed upon the substance of elements designed to ease the matching of an operator to a development. These elements are identification, authentication and authorisation which are also called as…

    • 1717 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Acceptable Use Policy

    • 1212 Words
    • 5 Pages

    Any and all information that is on the system which may be sensitive in nature, must be encrypted and stored securely so there is no unauthorized access to the information. The accomplishment of this should be done in a way that does not prevent authorized users from being able to access the information. (Example Acceptable Use Policy for IT Systems,…

    • 1212 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    IT Internal Control System

    • 1001 Words
    • 5 Pages

    For example, if a customer is applying for a loan at the bank, the bank has a right to have a full and complete disclosure of the customer’s credit history. Therefore, the company’s IT application control must be used to ensure completeness and accuracy of data in the database because the IT application controls are analyzed by managers to validate data and reports (Turner & Weickgenannt,…

    • 1001 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Iso 2700 Week 1 Paper

    • 1071 Words
    • 5 Pages

    ISO 27001 compliance is the backbone of information security management. Among the dozens of standards in the 27000 family related to good business practices, when you implement the ISO 27001 access control compliance you can assure your clients and customers that you are running a reputable business that can be trusted. The good thing is that accredited companies can implement the ISO 27001 physical security compliance in parts, choosing which company division needs to undergo the certification process. To guarantee ISO 27001 compliance for your access control system, you need to have set an advanced electronic software solution that is in line with the internationally recognized criteria of Information Security Management Systems (ISMS). When a client raises concerns about sensitive data leakage, cyber attacks or hackers, you would be able to offer an overview of a set of processes and practices that keep them calm.…

    • 1071 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Table of Contents Objective Scope Policy Information Security Steering Committee ALLOCATION OF INFORMATION SECURITY RESPONSIBILIES Chief Information Security Officer (CISO)…

    • 357 Words
    • 2 Pages
    Decent Essays