Premium Essay

Final Information Security Policy

In:

Submitted By seetheend
Words 3568
Pages 15
1. Executive Summary 2 2. Introduction 3 2.1 Company Overview 3 2.2 Security Policy Overview 4 2.3 Security policy goals 4 2.3.1 Confidentiality 4 2.3.2 Integrity 5 2.3.3 Availability 5 3. Disaster Recovery Plan 6 3.1 Risk Assessment 6 3.1.1Critical Business Processes 7 3.1.2 Internal, external, and environmental risks 7 3.2 Disaster Recovery Strategy 8 3.3 Disaster Recovery Test Plan 8 3.3.1 Walk-throughs 8 3.3.2 Simulations 9 3.3.3 Checklists 9 3.3.4 Parallel testing 9 3.3.5 Full interruption 9 4. Physical Security Policy 10 4.1 Security of the building facilities 10 4.1.1Physical entry control 10 4.1.2 Security offices, rooms and facilities 11 4.13.Isolated delivery and loading areas 12 4.2 Security of the information systems 12 4.2.1Workplace protections 12 4.2.2Unused ports and cabling 13 4.2.3 Network/server equipment 13 4.2.4 Equipment maintenance 13 4.2.5 Security of laptops/roaming equipment 13 5. References 14

Executive Summary The objective of this proposal is to present the information security policy created for Bloom Design Group. The issue of a company’s network security continues to be crucial because the results of data loss or significant system failure can be disastrous for a company. An alarming number of companies fail to realize how vulnerable their network is to internal, external, and environmental risks. One of the top priorities of an organization should be maintaining and securing its network in order to protect its important and vital assets. The plan will outline the steps needed for Bloom Design Group to ensure the security of all data systems and equipment within their organization.
The CIA triad of information security outlines the areas of protection that need to be addressed; information confidentiality, information integrity, and information

Similar Documents

Premium Essay

Human Resources Security Information

...Human Resources Information Security Standards Human Resources Information Security Standards Standards August 2009 Project Name Product Title Version Number Human Resources Information Security Standards Standards 1.2 Final V1.2 Final Page 1 of 10 Human Resources Information Security Standards Document Control Organisation Title Author Filename Owner Subject Protective Marking Review date Wokingham Borough Council Human Resources Information Security Standards Steve Adamek, Head of Business Systems G\Government Connect\WBC Policies Head of Business Systems IT Policy Internal Public April 2010 Revision History Revision Date Revisor Previous Version Description of Revision V2.1 V2.2 V2.3 V2.4 V1.0 V1.1 V1.2 Laura Howse Laura Howse Steve Adamek Laura Howse Laura Howse Laura Howse Laura Howse 2.0 2.1 2.2 2.3 2.4 1 1.1 Updated to include WBC references Updated to incorporate WBC changes Updated to incorporate Unison changes Updated to incorporate Unison changes Final Version Updated to include feedback from Human Resources Updated to include feedback from Human Resources Document Approvals This document requires the following approvals: Sponsor Approval Name Date Director of Transformation General Manager for Business Services & Section 151 Officer Head of Business Systems Deputy Head of Human Resources Computacenter Service Manager (Outsourced IT Provider) Document Distribution Andrew Moulton Graham Ebers Steve Adamek Maureen Vaughan-Dixon...

Words: 2757 - Pages: 12

Premium Essay

Password Guidance

...cy/index.html Retrieved on February 27, 2014 nist.gov. (2011).NIST Policy on Information Technology Resources Access and Use. Retrieved from http://www.nist.gov/director/oism/itsd/policy_accnuse.cfm Retrieved on February 27, 2014 HHS, 2007. HIPAA Security Series. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/adminsafeguards.pdf Retrieved on March 8, 2014Task 1Heart Healthy Information Security Policy:The information security policy is divided into two major parts – the policy for any new user entering the organization and the password management:New Users:All the new users will get appropriate access and rights, which will be reflective of their responsibilities in the organization. These accesses will enable the user to access all the required data files and information to complete their tasks. While assigning the rights and accesses to the new user a a document should be signed between the new user and the supervisor which will detail all the roles and responsibilities that the user will perform and also the corresponding access and rights. In case the user requires any administrator access then signature of the respective manager will be required. All the new users will have to undergo an orientation program and some additional training which will tell them about the work place, work culture, security policies, information security policies etc. The additional trainings will focus on password management, remote device protection, file downloads...

Words: 283 - Pages: 2

Premium Essay

It 244 Week 1

...Appendix A Final Project Overview and Timeline Final Project Overview In completing each assignment, you build the sections of an Information Security Policy. Final Project Timeline You should budget your time wisely and work on your project throughout the course. As outlined below, the assignments in the course are designed to assist you in creating your final project Information Security Policy. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to successfully complete your final project of creating an Information Security Policy. □ Week One: Introduction Review the two company profiles provided in your syllabus and select the one you will use for your final project company. You design the Information Security Policy for this company throughout the course. Once you have decided which company you are using, it may not be changed; therefore, considerable thought should be put into this decision. Next, decide which type of information security policy—program-level, program-framework, issue-specific, or system-specific—is appropriate for your final project company. Assignment: Final Project Information Security Policy: Introduction Complete and submit Appendix C. Note. Section 1 Introduction of Appendix C corresponds to Section 2 of Appendix B in the final compilation due in Week Nine. In completing Appendix C, provide an overview of your final project company...

Words: 899 - Pages: 4

Free Essay

Time

...Health Insurance Portability and Accountability Act Compliance Guide US Department of Health and Human Services Information Security Program Health Insurance Portability and Accountability Act (HIPAA) Compliance Guide September 14, 2005 Page i Health Insurance Portability and Accountability Act Compliance Guide US Department of Health and Human Services Table of Contents Table of Contents .......................................................................................... i Preface.........................................................................................................iii Document Change History ............................................................................iv 1. Introduction ....................................................................................... 1 1.1 1.2 1.3 1.4 2. 2.1 Purpose ........................................................................................... 1 Background...................................................................................... 1 Scope.............................................................................................. 2 Document Organization ..................................................................... 4 HIPAA Administrative Simplification Requirements ........................... 5 General Overview ............................................................................. 5 2.1.1 HIPAA Administrative Simplification Goals and Objectives ............. 5...

Words: 12363 - Pages: 50

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...

Words: 18421 - Pages: 74

Premium Essay

Network Penetration Testing

...Establish employee routines, (Social Engineering) e. Obtain ID card/s, (Theft or Falsify)   2. Gain entry to the building. (Pretext, Deceit, Employment)   a.    Establish Office layout b.    Establish Sensitive offices (Including ComCen and IT rooms) c.    Establish Evacuation routines    3. Acquisition of Intelligence.   a.    Obtain Hard & Soft Copy Information b.    Obtain Top Managerial Personal Information, (Addresses etc) c. (Optional deployment of Ethical Hacking)   4. Disruption/Sabotage   a.    Insertion of dummy explosive/incendiary devices (Packages, Letter Bombs etc). b.    Abduction plan 5. Report The time frame is variable dependent on current security protocols and staff awareness. Client Network Penetration Testing Proposal Document Reference xxx-xxxx-xx Contents 1 Background 3 2 Scope 4 2.1 Types of Attack 4 2.2 Report 5 2.2.1 Executive Summary 5 2.2.2 Technical Report 5 2.2.3 Recommendations 5 2.2.4 Security Policy 5 3 Phase 1 – Internal 6 3.1 Scope 6 3.2 Deliverable 6 4 Phase 2 – Internet 7 4.1 Scope 7 4.2 Deliverable 7 5 Phase 3 – WarDial 8 5.1 Scope 8 5.2 Deliverable 8 6 Phase 4 – Wireless 9 6.1 Scope 9 6.2 Deliverable 9 7 Phase 5 – 3rd Party Access 10 7.1 Scope 10 7.2 Deliverable 10 8 Phase 6 – Remote Access 11 8.1 Scope 11 8.2 Deliverable...

Words: 2185 - Pages: 9

Premium Essay

Dfhdfh

... |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A ...

Words: 1433 - Pages: 6

Free Essay

Test One

...Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544 June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems Highlights of GAO-15-544, a report to congressional committees. Why GAO Did This Study What GAO Found Since 2010, the United States has suffered grave damage to national security and an increased risk to the lives of U.S. personnel due to unauthorized disclosures of classified information by individuals with authorized access to defense information systems. Congress and the President have issued requirements for structural reforms and a new program to address insider threats. The Department of Defense (DOD) components GAO selected for review have begun implementing insider-threat programs that incorporate the six minimum standards called for in Executive Order 13587 to protect classified information and systems. For example, the components have begun to provide insider-threat awareness training to all personnel with security clearances. In addition, the components have incorporated some of the actions associated with a framework of key elements that GAO developed from a White House report, an executive order, DOD guidance and reports, national security systems guidance, and leading practices recommended by the National Insider Threat Task Force. However, the components...

Words: 17616 - Pages: 71

Free Essay

Network Sec

...Network Security Policy Practices Every company or corporation with a computer network that has valuable assets stored has a well planned network security policy in place. A network security policy is defined as a manuscript that defines the regulations for computer network admission identifies policies and how they are enforced, and gives a basic layout of proper security procedures. Without a policy to prepare, prevent and respond to security breaches, reliability of the network could be compromised. Basic beginning steps to implementing a security policy, or preparing, include accessing the jeopardy to the network and creating a response panel. Next we look at the continuation, or prevention, of the network which consists of monitoring the network for violations and a security change management practice for when the policy needs to be updated. The final step for the policy is the review process which goes over past events and incidents, and implementing modifications to the existing policy to adapt these breaches. Each of these steps is essential to the integrity and continuation of a secure network and must be subject to constant observation and change. New types of viruses and attacks are dreamed up on a daily basis, and we need to be prepared to prevent and respond as quickly as possible in order to provide network availability to company employees and needs. Preparation is the groundwork in handling the security measures for a security policy and provides a...

Words: 2079 - Pages: 9

Premium Essay

Advance Issue in Ict

...ADVANCED ISSUES IN ICT | | | Semester | : | June 2013 | Course Leader | : | Iznora Aini Zolkifly | Office Location | : | Faculty of Business and Information Technology, Block B1-3A, Leisure Commerce Square | Consultation Hours | : | Tuesday : 2.30 pm – 4.30p.m Thursday : 2.30 pm – 4.30p.m jk | Telephone | : | 03-76277373 | E-mail | : | iznora@unitar.my | Tutors (Optional) | : | | | | | | | Course Synopsis The course contains current issues in Information and Communication Technology that focus on the area of information science, computer networking, multimedia, medical informatics and information security and computer forensic. Exposure through visitation, events, and seminar will be implemented in this course in order to obtain the global technology as it is impacting all walks of life all over the world. Course Objectives The objectives of this course are: * To expose students to the various area in IT through visitation and events. * To provide a series of seminar in order to gain current issues and trends in ICT. * To develop a knowledgeable and skilled computer professionals guided by the needs of companies and employers. Learning outcomes * Present verbally on current issues in different areas of information and communication technology through group presentation and discussions. * Summarize the latest technology offered in order to solve the real world problem. * Document the finding on current issues and trends in ICT from...

Words: 832 - Pages: 4

Premium Essay

Network Security

... | |Department of Information Technology | |ISSC361: IT Security: Information Assurance | |3 Credit Hours | |8 Week Course | |Prerequisite(s) :None | |Table of Contents | |Instructor Information |Evaluation Procedures | |Course Description |Grading Scale | |Course Scope |Course Outline | |Course Objectives |Policies | |Course Delivery Method |Academic Services | |Resources |E-Book Links | |Instructor Information ...

Words: 4918 - Pages: 20

Premium Essay

We Are Cool

... | |Department of Information Technology | |ISSC361: IT Security: Information Assurance | |3 Credit Hours | |8 Week Course | |Prerequisite(s) :None | |Table of Contents | |Instructor Information |Evaluation Procedures | |Course Description |Grading Scale | |Course Scope |Course Outline | |Course Objectives |Policies | |Course Delivery Method |Academic Services | |Resources |E-Book Links | |Instructor Information ...

Words: 4921 - Pages: 20

Premium Essay

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...

Words: 3381 - Pages: 14

Premium Essay

Capitol Punishment

...Chapter 13 Assessment 1. What is a policy? a. An overall statement of information security scope and direction. 2. What is information security governance? b. Executive management providing strategic direction, oversight, and accountability for an organization’s data and IT resources 3. What type of policy would an organization use to forbid its employees from using organizational e-mail for personal use? c. Acceptable use policy 4. What is software piracy? d. Unauthorized copying of software e. Unauthorized distribution of software 5. What is information security management? f. Middle management providing day-to-day guidance and oversight for an organization’s information and information resources. 6. Employer monitoring can be a normal term of employment if advance notice is given. g. True 7. What is a standard? h. A list of mandatory activities that must be completed to achieve an information security goal. 8. Which law states requirements for federal agency information security governance? i. FISMA 9. A guideline is a list of mandatory activities that must be completed to achieve an information security goal. j. False 10. Which role is the senior most information technology official in an organization? k. CIO 11. What is a procedure? l. A checklist of actions that should be performed to achieve a certain goal. 12. Which management...

Words: 292 - Pages: 2

Free Essay

Scope of Service

...[pic] STATE GOVERNMENT DEPARTMENT OF FINANCE AND ADMINISTRATION REQUEST FOR PROPOSALS FOR INFORMATION SECURITY ASSESSMENT SERVICES (ISAS) RFP NUMBER: 427.04-107-08 |CONTENTS | |SECTION | | |1 |INTRODUCTION……………………………………………………………………………….3 | |2 |RFP SCHEDULE OF EVENTS………………………………………………………………..................................6 | |3 |PROPOSAL REQUIREMENTS………………………………………………………………7 | |4 |GENERAL REQUIREMENTS & CONTRACTING INFORMATION………………….…..9 | |5 |PROPOSAL EVALUATION & CONTRACT AWARD…………………………………....13 | | | |RFP ATTACHMENTS: | | ...

Words: 40549 - Pages: 163