Free Essay

Is3350 Security Issues in Legal Context

In:

Submitted By Jeromie1313
Words 690
Pages 3
Security and Compliance Policy

Why is a security and compliance policy important? Businesses would not be in operation without a good security and compliance policy. Businesses need to be able to comply with government and state requirements. Security safeguards employee data, customer data, and business data. Without proper security, a business would compromise the quality of their data. There are several steps to identifying security and compliance procedures. It is necessary to any infrastructure to perform a risk assessment. This identifies any gaps in your infrastructure, classifies what is acceptable risk, and what isn’t. The first step is system characterization. In system characterization, you are identifying system components and their criticality in the environment. Production equipment would have a higher criticality in the event of an outage or virus outbreak versus a test machine which is generally open and does not contain safeguarded information. This process is important and pieces of equipment should be labeled for criticality. Servers need protection in the company, as well as other data center resources such as routers/switches. If a malicious user or rogue user were to interrupt business functionality by gaining access, this is a great risk to business continuity. Threat identification is the next step in a risk assessment. It is important to do port scans, virus scans, and observe permissions in an environment. This helps identify any possible threats in the environment and classify them. It’s important to maintain physical security and logical security in an environment. Identifying risks entails if doors are locked to certain areas, who has access to certain files and servers, as well as port scanning. Port scanning is important for identification of open and closed ports, secure and unsecure ports, and what could be a potential threat for the environment. Other steps involved are vulnerability identification, control analysis, and impact analysis. These steps help identify what is controllable, what can be prevented, and the impact of any attack or outbreak in the environment. The risk determination step helps decide the level of each risk as well as the likelihood. These risks will have steps and protocols to follow for any attack or outage that can have somewhat of a prediction. Generally if a user were to contract a virus, it’s important to have an idea of how to repair it. Risks needs to be classified of severity and this step helps with that. Control recommendations are also an important step. This approaches how to handle or steps to manage any risks or threats. Documentation and reporting is a final step and extremely important. There needs to be a system developed of any risk that occurs or has occurred, it would need to be documented such as where, why, and when. These questions need to be answered for future risks or similar occurrences. The infrastructure, file system, and configurations should be documented and safeguarded. In the event of a total loss, it would be important to have the documented installation on file in order to replicate the original system previously. It’s important to understand what needs to be protected in the company. Your equipment is extremely important, especially servers. Servers are not inexpensive pieces of equipment and provide business functionality. A router (such as Cisco) is expensive as well, and also need to be properly protected. Physical security is very important in an environment. Locked doors, key cards, cameras are critical for monitoring. It’s important to enforce password policies in order to protect user data and machines transported by users. It’s important to guard files and information used by the company. Security in any environment is important. It’s important to understand the concept of protecting data and resources. Employees depend on their privacy while working in an environment and don’t want to feel they are being watched their whole entire shift. They want to feel trusted and generally will become happier, but need to be aware of the controls and security measures in place. Employees need to be made aware of government regulations and security regulations in order to provide a safe and structured environment. These measures will ensure employee privacy, data security, and business continuity.

Similar Documents

Free Essay

Is3350 Assessment Answer Key

...IS3350 Security Issues in Legal Context QUIZ 1 IS3350 Assessment Answer Key Revision Table Change Date Implementation Date Updated Section Change Description Change Rationale 07/11/2011 All New Curriculum New Curriculum September 2011 December 2011 12/02/2011 Q12 and Q32 1) Final Exam Q12: Answer Key modified 2) Final Exam Q32: Both question and Answer Key modified Corrections -1- Change Date: 12/02/2011 IS3350 Security Issues in Legal Context QUIZ 1 Quiz 1 Answer Key Question Number Correct Answer Course Objective Tested 2.1, 2.5 2.3 2.3 1.3 2.5 Reference in Course Source Page (s) Ch 2, p. 37 Ch 2, p. 38 An Introduction to Law and Information Security Issues Ch 2, p. 38 Ch 2, p. 41 Ch 2, p. 56 1. 2. 3. 4. 5. b a b a c -2- Change Date: 12/02/2011 IS3350 Security Issues in Legal Context QUIZ 1 Quiz 2 Answer Key Question Number Correct Answer Course Objective Tested 4.1-4.2 4.2 4.2 4.3 4.4 Reference in Course Source Page (s) Ch 4, p. 94 Ch 4, p. 95 An Introduction to Law and Information Security Issues Ch 4, p. 93 Ch 6, p. 147 Ch 6, p. 161 1. 2. 3. 4. 5. c b c b b -3- Change Date: 12/02/2011 IS3350 Security Issues in Legal Context QUIZ 1 Quiz 3 Answer Key Question Number Correct Answer Course Objective Tested 5.2 5.4 5.1 6.3 6.4 Reference in Course Source Page (s) Ch 5, p. 135 Ch 7, p. 187 1. 2. 3. 4. 5. a c c b d An Introduction...

Words: 868 - Pages: 4

Free Essay

It Computer

...Windows Security Features. Chapter 1; Chapter 2. 2, Secure Access Control. Chapter 3. Lab 1; Assignment 1. 3, Windows Encryption. Chapter 4. IS 3340 - Windows Security - ITT Tech Flint Study Resources www.coursehero.com/sitemap/schools/1177-ITT.../1724144-IS3340/ Looking for help with IS 3340 at ITT Tech Flint? Course ... IS 3340 - Windows Security - ITT Tech Flint Study Resources ...... Quality answers or your money back. IS3340 Lab Unit 5 Assignment 1 : WINDOWS SE IS3340 ... www.coursehero.com/file/8721414/IS3340-Lab-Unit-5-Assignment-1/ Jan 26, 2014 - MOST POPULAR MATERIALS FROM WINDOWS SE IS3340. 1 Page ... IS3340 Lab Unit 5 Security Assessment Potential Risk ... Access Security > Ali > Notes > IS4670_15_Syllabus.pdf ... www.studyblue.com/notes/note/n/is4670_15_syllabuspdf/.../9759518 Feb 7, 2014 - Find and study online flashcards from Access Security. ... IS3350 Security Issues in Legal Context IS3230 Access Security IS3340 Windows Security IS3440 .... Don?t assume there is only one correct answer to a question ? You've visited this page 2 times. Last visit: 5/28/14 [DOC] Assignment www.webonthecloud.com/is3340/Assignments.docx This assignment builds on the scenario of Ken 7 Windows Limited, which was ... Provide the answers to the following questions to satisfy the key points of ... IS3340 Windo ws Security STUDENT COPY: Graded Assignment Requirements. [DOC] Syllabus - ITT Tech. www.webonthecloud.com/is3340/Syllabus.docx IS3340. Windows Security. Instructor...

Words: 287 - Pages: 2

Premium Essay

Information Security

...Security Issues in Legal Context Discussion 5.1: Privacy in the Workplace The Children's Online Privacy Protection Act, which went into effect date, April 21, 2000, affects U. S. commercial Web sites and third-party commercial Web sites that schools permit their students to access. "COPPA requires "operators of websites or online services directed to children and operators of websites or online services who have actual knowledge that the person from whom they seek information is a child (1) To post prominent links on their websites to a notice of how they collect, use, and/or disclose personal information from children; (2) With certain exceptions, to notify parents that they wish to collect information from their children and obtain parental consent prior to collecting, using, and/or disclosing such information; (3) Not to condition a child's participation in online activities on the provision of more personal information than is reasonably necessary to participate in the activity; (4) To allow parents the opportunity to review and/or have their children's information deleted from the operator’s database and to prohibit further collection from the child; and (5) To establish procedures to protect the confidentiality, security, and integrity of personal information they collect from children. Non-profit sites are not included in the act; however, many are voluntarily complying. The Children's Internet Protection Act went into effect April 20, 2001...

Words: 2799 - Pages: 12

Premium Essay

Test

...Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110 ...

Words: 2305 - Pages: 10