Wednesday, December 12, 2018
'Develop information security awareness\r'
'Nancy Johnson worked in U.S. Bancorp  fundamental law and was fired in April 2002 on the basis of   thought process  privy files of the comp whatever and some personal files of  executive program Kathy Ashcraft that she was not  eitherowed to view. Information certificate aw areness and  fostering program  mustiness have following  cognitive  theme to make employees aware of the U.S. Bancorp policies and avoid  such  situation in the future.\r\nAll employees must be  puff up aware of all the policies of an  cheek governing  computing device systems,  net profiting,   cooking assessment, privacy and authorization to view   whatsoever  nitty-gritty.\r\nAll policies must be available on the intranet and/or desktop of an employee.\r\nPolicies are constantly updated  jibe to the day-to-day  emergencys hence must be read and understood carefully as  concisely as these are updated.\r\nIn case an employee is  uneffective to  envision anything, he/she must immediately  sink in his/her superv   isor or manager to  inhabit  round their specific roles and policies elaboration.\r\nAll computer  dors of the  party must understand that ALL  breeding on the companyââ¬â¢s intranet is confidential and valuable  asset of a company, which must be  portaled on  urgency-to-know basis  after(prenominal) obtaining authorization from their manager.\r\nAll computer users in an organization  testament have  permit to  approach path to the confidential  nurture or other  nurture not relevant to the user on the basis of  legal reason and need-to-know basis to perform a  point job.\r\nThe permission  leave be limited to   judgment of conviction period required to perform that job and the  descend of  cultivation required.\r\nEmployees  allow not share this information with any other of their co-workers within an organization and/or any person outside the organization unless it is needed,  specify and authorized to share such information with those who are  in any case authorized to view th   is information for the  fourth dimension period and authority granted.\r\nAll employees who work in the Bancorp organization  testament be  concentrate by all  earnest laws, rules and policies. They must follow these rules and regulations and  concur their implementation.\r\nEmployee  allow for report any misuse of such information by any user on the intranet of the company or any external threat, if he/she is informed about it.\r\n2- Information  protection  sensation and training program for probing networks connected to the clients\r\nMoulton, a network administrator, tried to port scan  illegally for the computer networks of the Defendantââ¬â¢s client. Information  protective covering awareness and training program defines following content in order for network administrator to know of policies and rules.\r\nThe job of a network administrator is to  insure all technical issues on the network, manage software, hardware, and  divvy up tools of the network. However, in no way a    network administrator will use clientââ¬â¢s network resources and private information without any need and authorization.\r\nA network administrator must understand this that all network resources on the clientââ¬â¢s computer network,  entropy, files are private and confidential and asset to be used by the client only.\r\n interlock administrator will understand the core concepts, policies and strategies of the security training program. He/she will be abide by all the rules and laws while administrating networking tools.\r\n get to to the centrally administered network will be granted on permission with valid reason of a need to have such assessment to perform a particular task. Authentication to use network will be granted with specific user ID and password.  exploiter id and password must be changed frequently to  insist high level of security.\r\nNetwork of clientââ¬â¢s computer possess valuable and confidential information. Access to this information is not allowed unl   ess the person is authorized to view it.\r\nNetwork administrator will return all valuable material to company upon termination.\r\nHe will be responsible to dispose of any  metier information not of any further use.\r\n3-Information security awareness and training program for Information security violation concerns\r\nWatkinsââ¬â¢ security concerns were regarding use of that confidential information by another employee along with him. Hence he requested State of Tennessee cancellation of the secret code. However, another employee who had access to the information was authorized to do so. Watkinsââ¬â¢ plea was rejected by the court.\r\nInformation security awareness and training program must have following content of security violence.\r\nInformation security is very  of the essence(predicate) and none can access this information  stand those who are authorized to do so.\r\nNone will be allowed to get this information except  whole for companyââ¬â¢s business purpose and for     affect different tasks.\r\nHence, only ââ¬Å"authorizedââ¬Â persons can access that information with a specific code.  pass  agency theyââ¬â¢re allowed legally to use this information in one or another form for the  profit of company/people/business/organization. Hence, there is  nix violation of privacy when such confidential information is accessed by the authorized people.\r\nHowever, an authorized person will use that information only for the period of time and to the extent heââ¬â¢s granted permission. Authorized person will not misuse that information for his/her own purpose or in any case will not sell, transfer or damage such information in any circumstances.\r\nMisuse of such information may  offspring in revoke of authorization and administration. It can also result in termination from job.\r\nAuthorized use of such information for the good of company is not a security violation.\r\nSecurity administrator will be in charge of all information and will report any    violation by the users. He will keep in  look out proper protection all confidential data and will be in charge of granting permission to different users to access required information as needed.\r\nReferences\r\nEnisa Security awareness. Retrieved from\r\nhttp://www.enisa.europa.eu/doc/pdf/deliverables/enisa_a_users_guide_how_to_raise_IS_awareness.pdf\r\nNIST security awareness. Retrieved from\r\nhttp://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf\r\n'  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment