Premium Essay

Unit 9 Assignment 1 – Policy Monitoring and Enforcement Strategy

In:

Submitted By iamviking
Words 419
Pages 2
Unit 9 Assignment 1 – Policy Monitoring and Enforcement Strategy
Introduction
This policy establishes minimum practices to ensure the Department of Defense systems and organizations with direct ties to the U.S. Government are in compliance with current directives and requirements. Networks are audited to maintain awareness of the operating environment, to detect indications of security problems, and to ensure systems and networks are used for authorized purposes. Security is a mission critical function of the Department of Defense and its proper execution has a direct impact on all missions and capabilities of the national defense.
Purpose
This policy is issued to:
• Provide a mechanism for improved oversight of organizational information security programs.
• Ensure compliance with the Federal Information Management Security Act (FISMA)
• Comply with Department of Defense IT Security Policy
Scope
This applies to all employees and contractor employees using or operating Department of Defense computer systems, as well as the systems and networks, and to contractor employees providing services to the U.S. Government networks.
Policy
Department of Defense policy requires that monitoring shall be used for the following:
• Individual accountability monitoring shall be used to support employee compliance by providing a log of user actions.
• Intrusion detection monitoring, shall be designed and implemented to record appropriate information to assist with investigation and/or prosecution of the incident.
An audit trail will include information to establish what activity has occurred and who or what led to the infraction. The following represents the events that would provide an acceptable audit trail:
• User login –successful, unsuccessful.
• Service startup and shutdown - successful and unsuccessful.
• User account permission modifications - successful and

Similar Documents

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...

Words: 18421 - Pages: 74

Free Essay

Report on Fishing

................................. vi EXECUTIVE SUMMARY ............................................................................................................. 1 1. INTRODUCTIONp .................................................................................................................. 4 1.1 Vision of DFR .................................................................................................................. 5 1.2 Mandate of DFR ............................................................................................................... 5 1.3 Functions of DFR ............................................................................................................. 5 1.4 Legal Policy and Institutional Framework ....................................................................... 6 2. CAPTURE FISHERIES ........................................................................................................... 7 2.1 2.2 2.3 2.4 2.5 3. Fisheries Resources Base in Uganda ................................................................................ 7 The Water Bodies Unit ..................................................................................................... 8 Fisheries Co-Management ................................................................................................ 9 Fishing...

Words: 14382 - Pages: 58

Premium Essay

Management

...Framework for Enterprise Risk Management © 2013 Johnson & Johnson Contents Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 J&J Strategic Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 What is Risk?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 J&J Approach to Enterprise Risk Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Governance & Oversight. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 . . 2 3 Introduction In order to deliver value to our consumers, patients, caregivers, employees, communities and shareholders, we at Johnson & Johnson (J&J) must understand and manage the risks faced across our entire organization. Risks are inherent in our business activities and can relate to strategic threats, operational issues, compliance with laws, and reporting obligations. This document...

Words: 3109 - Pages: 13

Premium Essay

Administrative Code

...effectiveness of the Government will be enhanced by a new Administrative Code which incorporates in a unified document the major structural, functional and procedural principles and rules of governance; and WHEREAS, a new Administrative Code will be of optimum benefit to the people and Government officers and employees as it embodies changes in administrative structures and procedures designed to serve the people; NOW, THEREFORE, I, CORAZON C. AQUINO, President of the Philippines, by the powers vested in me by the Constitution, do hereby promulgate the Administrative Code of 1987, as follows: INTRODUCTORY PROVISIONS SECTION 1. Title. — This “Administrative Code of 1987.” Act shall be known as the SECTION 2. General Terms Defined. — Unless the specific words of the text, or the context as a whole, or a particular statute, shall require a different meaning: (1) Government of the Republic of the Philippines refers to the corporate governmental entity through which the functions of government are exercised throughout the Philippines, including, save as the contrary appears from the context, the various arms through which political authority is made effective in the Philippines, whether pertaining to the autonomous regions, the provincial, city, municipal or barangay subdivisions or other forms of local government. (2) National Government refers to the entire machinery of...

Words: 111254 - Pages: 446

Free Essay

Managing Executive

...WORKSHOP REPORT ON THE ASSIGNMENT OF FUNCTIONS TO MUNICIPALITIES CONTENTS Acronyms 4 Session1: Introduction 5 1.1 Introduction 5 1.2 Rationale behind the Workshop 6 1.3 Workshop Objectives 7 Session 2: Workshop Papers 9 2.1 Opening Remarks 9 Ms Margot Davids - Chief Director – Children 2.2 Devolution of Legislative Powers to Municipalities: 10 Prof Jaap de Visser - Community Law Centre – UWC 2.3 Local Government, The South Africa Constitution and Child Rights 13 Andre Viviers - UNICEF SA 2.4 S.A. Law Reform Commission- Position Paper: Local Government and the Implementation of the Children’s Act 15 Dr Jackie Loffell - Johannesburg Child Welfare 2.5 Local Government and the Implementation of the Children’s Act: Framework on Assignment of Functions 18 Ms Matlogonolo Sebopela - National Department of Social Development 2.6 EPWP Social Sector (ECD) and Local Government 22 Ms Pearl Mugerwa - Department of Public Works 2.7 Situational Analysis of Children with Disabilities in South Africa 26 Ms Manthipi Molamu-Rahloa - National Dept of Social Development 2.8 Services needed by Children with Disabilities from Local Government 30 Mr Danie Botha-Marais - National Council for Persons with Disabilities (NCPPDSA) 2.9 ...

Words: 17451 - Pages: 70

Free Essay

Bb Guideline

...TERRORIST FINANCING 16 September, 2012 Bangladesh Financial Intelligence Unit BANGLADESH BANK FOCUS GROUP Coordinator Mr. Md. Eskander Miah Deputy General Manager Bangladesh Financial Intelligence Unit Bangladesh Bank Member Mr. Rafiqul Islam Joint Director Bangladesh Financial Intelligence Unit Bangladesh Bank Mr. Kamal Hossain Deputy Director Bangladesh Financial Intelligence Unit Bangladesh Bank Mr. Md. Iqbal Hossain Deputy Director Department of Financial Institutions and Markets Bangladesh Bank Mr. Md. Ferdous Zaman Sardar Assistant Director Bangladesh Financial Intelligence Unit Bangladesh Bank Preface In response to the growing concern about money laundering and terrorist activities, the international community has acted on many fronts. The United Nations (UN) was the first international organization to undertake significant actions to fight against money laundering through adopting several conventions and resolutions. Following UN action, the Financial Action Task Force on Money Laundering (FATF) was formed by G-7 countries in 1989 as the first intergovernmental body which has recommended forty recommendations to combat money laundering in 1990. In October 2001, the FATF expanded its mandate to deal with the funding of terrorist acts and terrorist organization, and it took the important step of creating the Eight (later expanded to Nine) Special Recommendations on Terrorist Financing. These 40+9 Recommendations have been endorsed by over 180 countries and are universally...

Words: 25043 - Pages: 101

Free Essay

Reforming the Russian Budget System: a Move to Mor

...expressed in this Working Paper are those of the author(s) and do not necessarily represent those of the IMF or IMF policy. Working Papers describe research in progress by the author(s) and are published to elicit comments and to further debate. The Russian federal government has recently initiated a fundamental reform of its budget system, encompassing important policy, procedural, and institutional changes. This paper reviews this reform agenda with reference to the experience of industrial countries that over the past two to three decades have followed a similar reform path toward a more devolved budget management system. From this perspective, the importance of the strength of existing public expenditure management systems to accommodate increased devolution and the scope for employing decentralized agencies is explored. An assessment of the present Russian reform plans in light of this review reveals a number of concerns. First, the speed of the reforms contemplated appears overly ambitious when judged by the experience of other countries. Second, the preparedness of budget institutions is questionable. Third, change management capacity needs strengthening with a more carefully defined strategy. Last, in light of these concerns, it is argued that the scope and “big-bang” approach of the current reform plans may need reformulation into a more sequenced strategy with clearer reform priorities. JEL Classification Numbers: E6, D7, P2 Keywords: Budget...

Words: 11287 - Pages: 46

Premium Essay

Nestle Erp

...2010 INFORMATION MANAGEMENT PBSA 823 Chicken Run Group Assignment Lecturer: Mr. J. C. Coetzee 9/18/2010 Nestlé struggles with Enterprise Systems CRITERIA FOR MARKING MBA-ASSIGNMENTS 1 | Meeting the objectives of the assignmentThe extent to which: | 60 | | *1.1 | the assignment was understood and answered comprehensively | 10 | | *1.2 | independent (own) thought is reflected | 10 | | 1.3 | insight in the topic was demonstrated | 10 | | 1.4 | logical, systematic thought and reasoning is demonstrated | 10 | | 1.5 | quality research (literature study and / or empirical work) was done | 10 | | 1.6 | conclusions are logic, meaningful and substantiated | 10 | | 2 | Presentation and technical aspectsThe extent to which: | 30 | | 2.1 | the content shows a logical andintegrateddevelopment and forms a balancedholisticwhole | 15 | | 2.2 | the executivesummary reflects the content comprehensively and meaningfully | 5 | | 2.3 | the table of contents, references and list of sources are noted correctly | 5 | | 2.4 | the style and language (grammar) meet the requirements | 5 | | 3 | General quality rating | 10 | | | Evaluator’s general evaluation mark of the assignment’s quality - taking into consideration the above and other factors | | | | TOTAL | 100 | | Assignment Word Count: Chicken Run Group Members “There is nothing more determined than poultry with a plan…” Bezuidenhout, P.J. 1224 6093 Botha...

Words: 4468 - Pages: 18

Premium Essay

C-Tpat and the Asian Consumer Electronic Products

...March 27, 2009 Running Head: C-TPAT and The Asian Consumer Electronic Products Incorporating Customs -Trade Partnership Against Terrorism (C-TPAT) Requirements within Procurement Strategies for a USA-Asian Supply Chain of Consumer Electronic Products Abstract “The Customs-Trade Partnership Against Terrorism (C-TPAT) was created by U.S. Customs and Border Protection (CBP) in direct response to the terrorist attacks that were launched against the United States on September 11, 2001”(www.ctpat.com), to enforce this in shipping of goods from foreign entities. Asia a leader in consumer electronic had to find ways to ship the products also combating the requirements set by CBP. This paper explains what C-TPAT does and ways Asia and other foreign entities can comply with C-TPAT. Introduction CBP established C-TPAT in an attempt to secure and safeguard the integrity of U.S. borders against future attacks by terrorists who might seek to further their terrorist activities by hijacking containers entering the United States and using such containers to smuggle in conventional arms or chemical or biological weapons. In seeking to secure and safeguard U.S. borders against future terrorist attacks, C-TPAT focuses on enlisting the cooperation and participation of all parties involved in shipping products to or importing products into the United States. “The USA Patriot Act, signed into law October, 2001, inspections at ports, regulated airport screening, and heightened at land-based...

Words: 2225 - Pages: 9

Premium Essay

R600 20

... Army Command Policy Headquarters Department of the Army Washington, DC 6 November 2014 UNCLASSIFIED SUMMARY of CHANGE AR 600–20 Army Command Policy This administrative revision, dated 6 November 2014-o Updates Equal Opportunity Policy (paras 6-2c(8)(c) and 6-2c(8)(f)). This administrative revision, dated 30 October 2014o Updates summary of change bullet (para 2-8b). o Makes administrative changes (throughout). This rapid action revision, dated 22 October 2014-o Updates purpose (para 1-1). o Updates responsibilities for the ready and resilient campaign (paras 1-4a-d). o Directs readers to the Army Publishing Directorate’s “notes” page on AR 60020 for additional guidance on the Army Sexual Harassment/Assault Response and Prevention Program (para 1-4e(6)). o Clarifies the groups of personnel who must be informed of the Army’s accommodation of religious practices policies (para 1-4f). o Adds the categories “senior field grade officers,” “senior field grade warrant officers,” ”field grade warrant officers,” “company grade warrant officers,” “enlisted noncommissioned officers,” and “junior enlisted Soldiers” (table 1-1). o Adds policy that the senior commander is normally, but not always, the senior general officer at an installation (para 2-5b(4)(a)). o Adds policy for command responsibility for the Total Army Sponsorship Program (paras 2-5b(4)(a)16 and 2-5b(4)(c)8). o Clarifies policy on how Army command...

Words: 87879 - Pages: 352

Premium Essay

Management Information System

...Management Information Systems Comptroller’s Handbook May 1995 Management M Management Information Systems Introduction Background Risks Associated with MIS Assessing Vulnerability to MIS Risk Achieving Sound MIS MIS Reviews Examination Objectives Examination Procedures Internal Control Questionnaire Purpose MIS Policies or Practices MIS Development User Training and Instructions Communication Audit Conclusion Verification Procedures Table of Contents 1 1 3 4 5 6 9 10 17 17 17 18 19 20 20 21 22 Comptroller's Handbook i Management Information Systems Management Information Systems Background Introduction A management information system (MIS) is a system or process that provides the information necessary to manage an organization effectively. MIS and the information it generates are generally considered essential components of prudent and reasonable business decisions. The importance of maintaining a consistent approach to the development, use, and review of MIS systems within the institution must be an ongoing concern of both bank management and OCC examiners. MIS should have a clearly defined framework of guidelines, policies or practices, standards, and procedures for the organization. These should be followed throughout the institution in the development, maintenance, and use of all MIS. MIS is viewed and used at many levels by management. It should be supportive of the institution's longer term strategic goals and objectives. To the other extreme...

Words: 5493 - Pages: 22

Premium Essay

Virus Attacks

...Chapter 3 Planning for Contingencies Chapter Overview The third chapter of the book will articulate the need for contingency planning and explore the major components of contingency planning. In this chapter, the reader will learn how to create a simple set of contingency plans using business impact analysis and prepare and execute a test of contingency plans. Chapter Objectives When you complete this chapter, you will be able to: • Understand the need for contingency planning • Know the major components of contingency planning • Create a simple set of contingency plans, using business impact analysis • Prepare and execute a test of contingency plans • Understand the unified contingency plan approach Introduction This chapter focuses on planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill. “Procedures are required that will permit the organization to continue essential functions if information technology support is interrupted.” On average, over 40% of businesses that don't have a disaster plan go out of business after a major loss. What Is Contingency Planning? The overall planning for unexpected events is called contingency planning (CP). CP is the process by which organizational planners position their organizations to prepare for, detect, react to, and recover from events that threaten the security of information resources and assets, both human and...

Words: 3573 - Pages: 15

Premium Essay

Q Pharma Sample Quality Report

...DOCUMENT TYPE DOC NO. REVISION Quality Management Policy TITLE ISSUED BY QMP-001 EFFECTIVE DATE 1.0 PAGE Q Pharma Quality System Manual rJ Boatman 16 Feb 2007 1 of 32 SUPERCEDES CSSC QSM-001 iPT QSM-001 QUALITY MANAGEMENT POLICY QUALITY SYSTEM MANUAL QMP-001 Rev. 1.0 Prepared by Date (Signed) Jeff Boatman, Director of Quality Reviewed by 01 Feb 2007 Date (Signed) Alexis Stroud, Compliance Manager Reviewed by 07 Feb 2007 Date (Signed) Raymond Roggero, iPT Business Unit Manager Reviewed by 2/7/07 Date (Signed) Robert Lorence, CSSC Business Unit Manager Approved by 9 Feb 2007 Date (Signed) Patrick Den Boer, President and CEO 16 Feb 2007 ©2007 Q Pharma Incorporated. Unauthorized reproduction or distribution prohibited. CONTROLLED DOCUMENT • VERIFY LATEST REVISION • PRINTED COPY IS UNCONTROLLED IF NOT STAMPED IN RED DOCUMENT TYPE DOC. NO. REVISION Quality Management Policy TITLE QMP-001 1.0 PAGE Quality System Manual TABLE OF CONTENTS 0. Page 2 of 32 1. 2. 3. 4. 5. 6. INTRODUCTION .........................................................................................................................4 0.1 General...............................................................................................................................4 0.2 Process Approach ................................................................................................................

Words: 10681 - Pages: 43

Premium Essay

Training

...Chapter 7 Prevention of Sexual Harassment 7–1. Overview The prevention of sexual harassment is a commander’s responsibility. The EOA plays a pivotal role by assisting the commander with policy awareness, training, command climate assessments, complaints processing and overall advisory assistance concerning the prevention of sexual harassment. 7–2. Chain of command responsibilities Commanders and supervisors will— a. Ensure that assigned personnel (to include RC personnel under their jurisdiction) are familiar with the Army policy on sexual harassment. b. Publish and post written command policy statements for the prevention of sexual harassment. All statements will be consistent with Army policy. They will include the local command’s commitment to the Army’s policy against sexual harassment and will reaffirm that sexual harassment will not be tolerated. The statement will explain how and where to file complaints and will state that all complainants will be protected from acts or threats of reprisal. Each ACOM/ASCC/DRU, installation, separate unit, agency, and activity down to company, troop or battery level will publish a sexual harassment command policy statement. Units should coordinate these policy statements with the servicing staff judge advocate or legal advisor before publishing them. c. Continually assess and be aware of the climate of command regarding sexual harassment. Identify problems or potential problems. Take prompt, decisive action to investigate...

Words: 36437 - Pages: 146

Premium Essay

Mba Syllabus

...SRM UNIVERSITY (Under section 3 of UGC Act, 1956) FACULTY OF MANAGEMENT SCHOOL OF MANAGEMENT MBA FULL TIME CURRICULUM AND SYLLABUS - 2013-14 1 Code MB 13101 MB 13102 MB 13103 MB 13104 MB 13105 MB 13106 SRM University MBA - Revised Curriculum - 2013-14 Semester –I Thinking and Communication Skills (Practical) Accounting for Decision Making Philosophy for Management Economics for Managers Managerial Statistics Managerial Skills (Practical) Semester-II Financial Management Management Information System Marketing Human Resource Management Production And Operation Management Legal Aspects of Business Semester- III Summer Internship (8 weeks)(Practical) Entrepreneurship Strategic Management Business Analytics (Practical) Elective-1 Elective-2 Elective-3 Elective-4 Semester- IV Elective-5 Elective-6 Industrial Elective (Practical) Total Credit L 0 2 3 2 2 0 T 0 4 0 2 4 0 P 4 0 0 0 0 6 C 2 4 3 3 4 3 19 4 3 4 2 4 3 20 2 3 3 2 3 3 3 3 22 3 3 5 11 72 MB 13207 MB 13208 MB 13209 MB 13210 MB 13211 MB 13212 MB 13313 MB 13314 MB 13315 MB 13316 2 2 3 2 3 2 0 2 2 0 2 2 2 2 2 2 0 4 2 2 0 2 2 0 2 2 0 2 2 2 2 2 2 0 0 0 0 0 0 0 4 0 0 4 0 0 0 0 0 0 10 MB 13417 Functional Electives Marketing Finance Systems Human Resource Operations Vertical Electives Pharma Hospitality Enterprise Resource Planning Agriculture Hospital and Health Care Retailing Auto Industry Project Management Media and Communication Banking Financial Service Insurance   2 MB...

Words: 53231 - Pages: 213