Question

In: Computer Science

What elements should be included in an Information Security Policy for a corporate entity? What elements...

What elements should be included in an Information Security Policy for a corporate entity? What elements should be included in the policy no matter the size of the business? Why?

3 References please.

Solutions

Expert Solution

  • Confidentiality

    When protecting information, we want to be able to restrict access to those who are allowed to see it; everyone else should be disallowed from learning anything about its contents. This is the essence of confidentiality. For example, federal law requires that universities restrict access to private student information. The university must be sure that only those who are authorized have access to view the grade records.

    Integrity

    Integrity is the assurance that the information being accessed has not been altered and truly represents what is intended. Just as a person with integrity means what he or she says and can be trusted to consistently represent the truth, information integrity means information truly represents its intended meaning. Information can lose its integrity through malicious intent, such as when someone who is not authorized makes a change to intentionally misrepresent something. An example of this would be when a hacker is hired to go into the university’s system and change a grade.

    Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or someone authorized to make a change accidentally deletes a file or enters incorrect information.

    Availability

    Information availability is the third part of the CIA triad. Availability means that information can be accessed and modified by anyone authorized to do so in an appropriate timeframe. Depending on the type of information, appropriate timeframe can mean different things. For example, a stock trader needs information to be available immediately, while a sales person may be happy to get sales numbers for the day in a report the next morning. Companies such as Amazon.com will require their servers to be available twenty-four hours a day, seven days a week. Other companies may not suffer if their web servers are down for a few minutes once in a while.


Related Solutions

What provisions should be included in a model privacy and security policy that patients might use...
What provisions should be included in a model privacy and security policy that patients might use in making decisions related to their privacy and the security of their PHRs?
1. List ten (10) elements that should be included in your institution's credit policy. 2. What...
1. List ten (10) elements that should be included in your institution's credit policy. 2. What are the advantages of a credit institution having a written loan policy? 3. State the four (4) things an effective credit risk management system should do. 5. Explain, in general terms, how to conduct a credit risk assessment.
Define, discuss and develop information security policy with all its elements.
Define, discuss and develop information security policy with all its elements.
Describe the basic elements of human nature and how they affect information security policy development and...
Describe the basic elements of human nature and how they affect information security policy development and impact information security policy implementation issues. Propose at least three ways that organizations can overcome this policy development and implementation issues.
Describe the basic elements of human nature and how they affect information security policy development and...
Describe the basic elements of human nature and how they affect information security policy development and impact information security policy implementation issues. Propose at least three ways that organizations can overcome these policy development and implementation issues.
Discuss the elements that should be included in the project charter. What critical role does the...
Discuss the elements that should be included in the project charter. What critical role does the charter play in a project?
explain the concept of Corporate Information Security. What is it? Why is it important?
explain the concept of Corporate Information Security. What is it? Why is it important?
What elements do you believe should be included in Disaster Recovery planning and why?
What elements do you believe should be included in Disaster Recovery planning and why?
What type of information should NEVER be included in a medical record?
What type of information should NEVER be included in a medical record?
So should information security team first assess the corporate culture prior to attempting to implement an...
So should information security team first assess the corporate culture prior to attempting to implement an insider threat program
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT