Campbellsville University Enterprise Information Systems Security Discussion

User Generated

inavznaqn

Computer Science

Campbellsville University E

Description

Enterprise Information Systems Security: A Case Study in the Banking Sector

APA Format is mandatory.

Plaigarism check need to be done.

Maximum Words are 500.

References are must.

The case outlines the Enterprise Information System Security framework with policies for Security, Awareness, Access Control, and Top Level Management Support. In addition to those policies, suggest three more security policies to help mitigate risk against security attacks. Distinguish the controls among people, technology, and business process operations. Use the template to discuss each new policy.

  1. Classify the security controls to support each policy according to preventive, detective, and corrective measures.
  2. What additional steps should you take to improve the company’s information security system? Would you suggest an audit?
  3. What recommendations would you give the bank CIO for how it might select a security management maintenance model? Include graphics if available.

Policy Overview

Summarize the policy in 5-7 sentences and state its purpose for management. This is typically an explanation of why the policy exists. Do not be too technical.

Scope

This is where you define who or what the policy applies to, from all employees to only cashiers that handle cash in the front office. If it applies to equipment, it could be all equipment, all servers, all network connected equipment, or just company issued cell phones. Be specific.

Policy

This is where the policy is actually defined. Do not be too specific, leave that to the procedures and controls that support the policy.

For example, a password policy might state that users cannot share passwords, passwords must be complex, help desk personnel never request passwords, and passwords must rotate periodically. The details of good password construction can be then put in a guideline document, instructions for the help desk on resetting passwords can be a procedure, and that Group Policy is used to force password changes every 60 days is a technical control. None of that should be in the policy, but it all needs to be properly documented and communicated to the people that need it - the guidelines to all staff, the help desk procedure to help desk staff, and the technical controls to the domain admins.

If you are in doubt remember that good policy statements talk about what the policy is trying to accomplish, and are addressed to a wide audience. Procedures and controls talk about how it is to be accomplished and are addressed to the staff that must carry it out.

Compliance Measurement

Typically, this section includes the job title of the person responsible for overseeing its implementation or the department if multiple people are responsible, a reference to audit mechanisms, and the consequences for failure to abide by policy.

Definitions, Related Standards, and Policies

This section usually contains definitions of technical or ambiguous terms, cross-references to applicable regulations, and other policies that relate to this policy. Examples include union contracts, discipline policies, and implementation guidelines. In our password policy example, this where readers would be told to consult the password construction guideline document.

Policy Exceptions

If there any circumstances that might allow temporary exception to the policy, such as during an emergency, define them here. If there is anyone with the authority to temporarily waive the policy, they should be identified by job title. This section is often omitted since many policies do not allow any exceptions.

How can the Policy(s) be Improved

List your recommendations

Policy Recommendations for Security Management Maintenance Model

List your recommendations.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

The files below contain complete work of your assignment. Kindly let me know if you need any clarification.

Running Head: SECURITY POLICIES OUTLINE

Security Policies Outline
Name
Institutional Affiliation
Date

1

SECURITY POLICIES OUTLINE

2
Security Policies Outline

Regular Data Backup Policy
Answer
System Disaster Management Policy
Answer
Personal Device Usage Policy
Answer
Classification of the Policies
Answer

SECURITY POLICIES OUTLINE

3
References

List of work referenced.


Running Head: SECURITY POLICIES

1

Security Policies
Name
Institutional Affiliation
Date

SECURITY POLICIES

2
Security Policies

Regular Data Backup Policy
Policy Overview
Regular data backup is required in every organization to mitigate the risk of losing data. Regular
data backup policy will have to be implemented to make sure the bank does not lose valuable
asset which is data. This is a preventive policy to make sure the bank's data is secure. The IT
director will be in charge of making sure this policy is implemented. Also, the backup data
should be stored in a secure location (Jun, Dongbo, & Xu, 2016).
Scope
This policy applies only to the bank’s system administrators who have clearance to handle the
bank’s data. The administrators are responsible for making sure the data in the system has been
backed up.
Policy
System administrators are supposed to carry out regular backup for the syst...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags