Nt1330 Unit 2

Improved Essays
Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are:

1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password
2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights.
3. Every employee, contractor or third party should return all the company's assets used for work depending on the contract, when the employee, contractor or third party quit the company or moved other part.
4. Operating procedures specified in the security policy should be documented and maintained.
…show more content…
Media information systems should be controlled and physically protected to prevent damage to assets and interruption to business activities. Appropriate procedure should be established to protect documents, computer media, the data input / output and documented system from damage, theft and unauthorized access.
7. Attention should be given to protect the integrity of electronically published information to prevent modifications that may harm the company's reputation. The information provided to the public, such as information on the web that can be accessed via the internet must be in accordance with the laws, rules, and regulations in the jurisdiction
8. The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access
All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Requirements may be specified in a variety of ways. However there are some guidelines worth following: • Representation format and content should be relevant to the problem. • Information contained within the specification should be nested. 3.3.1.…

    • 87 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Foyle Legal Case Study

    • 509 Words
    • 3 Pages

    Last updated 23 Dec 2016 Foyle Legal is committed to protecting your privacy with your rights and needs in mind. This privacy statement is aimed to provide an outline on how we handle your personal and sensitive information. Your Consent You have no obligation to disclose personal or sensitive information when you visit the Foyle Legal website.…

    • 509 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    The goal of this step is to identify a list of system weakness, by using security test of system, audit comments and security requirements that could be exploited. These weaknesses generate the threat/vulnerability pair. Control Analysis For every threat/vulnerability pairs, identify all the possible existing and planned controls to decrease the risk of the threat to exploit vulnerability. Security controls involve the use of technical and non-technical approaches.…

    • 1790 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    False Sense Of Security

    • 892 Words
    • 4 Pages

    To address these risks, the business system should no longer be a single standardized area in which users join from anyplace in the network and obtain the identical points of entrance. In its place, the system demands in-house defenses. Governing requirements additionally put rigorous controls on data movement within the company…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    While there are many methods to reduce risk, the CLN project team failed to identify the need of a having software legal expert team member, who would have been able to give input during the planning phase about the protection requirements in information security for the Briargrove Investment organization. In addition, the questionnaires used to gather information did not address the requirement of foreign law and protections assigned to information security for both clients and customers. Questionnaires developed for this project needed to address not only associate, administration, education, managerial and corporate needs but also information security. Other areas of concern identified were developing…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    To be more precise, trainings must be performed every six months to make everyone aware of the procedures during such event. 4. Access control Access control is also an important security and interoperability issue of the Bank Solution Inc. where there is no explanation of which users and administrators have access to control and manage information systems. This problem must be addressed immediately by defining their roles and responsibilities to protect accessibility of sensitive…

    • 1326 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Acceptable Use Policy

    • 1212 Words
    • 5 Pages

    As such, it is the responsibility of all employees to ensure that they adhere to the guidelines in this policy at all times. If for any reason, the employee feels that a portion of the policy is unclear…

    • 1212 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Gamblebet Fraud Case Study

    • 1717 Words
    • 7 Pages

    Access controls are constructed upon the substance of elements designed to ease the matching of an operator to a development. These elements are identification, authentication and authorisation which are also called as…

    • 1717 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    IT Internal Control System

    • 1001 Words
    • 5 Pages

    According to Turner and Weickgenannt (2013), there three major control concerns related to databases, and such as: Unauthorized access, adequate backup of the data, and data integrity. To prevent a data breach and exposing sensitive information, the company should develop an automated security system through IT compliance control. It can be done by implementing log-in procedures, password settings in every certain days, server and firewall configurations, biometric controls, security token, intrusion detection in all company’s computers, and vulnerability assessment (Turner & Weickgenannt, 2013). When there is an immediate business transaction occurs, the company should able to identify any external threats by using real-time alert system, if there is a system used by the company. Real-time alert system can help to identify and respond to the threat of a targeted attack and security and sensitive information, and it will a red flag to the management to investigate any suspicious network activities.…

    • 1001 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Iso 2700 Week 1 Paper

    • 1071 Words
    • 5 Pages

    ISO 27001 compliance is the backbone of information security management. Among the dozens of standards in the 27000 family related to good business practices, when you implement the ISO 27001 access control compliance you can assure your clients and customers that you are running a reputable business that can be trusted. The good thing is that accredited companies can implement the ISO 27001 physical security compliance in parts, choosing which company division needs to undergo the certification process. To guarantee ISO 27001 compliance for your access control system, you need to have set an advanced electronic software solution that is in line with the internationally recognized criteria of Information Security Management Systems (ISMS). When a client raises concerns about sensitive data leakage, cyber attacks or hackers, you would be able to offer an overview of a set of processes and practices that keep them calm.…

    • 1071 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Table of Contents Objective Scope Policy Information Security Steering Committee ALLOCATION OF INFORMATION SECURITY RESPONSIBILIES Chief Information Security Officer (CISO)…

    • 357 Words
    • 2 Pages
    Decent Essays