In: Computer Science
Based on your reading and on additional research on line, what are the major components of an IT or cyber security policy? If you work for a company are you aware of what the policy is for the company? Please describe it and if it corresponds to the reading or your research. If you are only a student, pick either the school, a bank you do business with or other company whose policy you can view and evaluate it. Write a 2 to 3 paragraph synopsis of what you found and your analysis. please write 2 to 3 paragraph on Creating an IT or Cyber Security Policy please study above question and answe
These are the vital points in cyber security policy and I have made
it easier to understand and succinctly. Hope you find it
useful.
Solution: The following are the major Security elements in IT
policy:
Integrity
Availability,
Utility,
Authenticity,
Nonfidentiality,
Nonrepudiation.
Solution: Yes, if i work in a company, the first thing is that I
will thoroughly go through the policy.
Cyber security policy (bank sector):
The main components namely , security awareness , security policy ,
access control and Top level management suport should be examined
when drafting bank cyber security .
The steps involved in Bank security policy are:
1. Collecting security risk assessments.
2. Consideration of security infrastructure strategy.
3.Deployment of access control without any constraints.
4. Integrating network and other security mechanism such as network
intrusion detection systems etc..
5. Finally maintaining , updating and monitoring policies and
process.
Challenges :
Tough regulations: Governing regulatory compliances is considered
as a difficult task since huge amount of regulations have been
deployed for larger and smaller banks which must satisfy
regulatory obligations.
Securing client data: The clients data are dynamic , therefore the
bank has to adopt policies which updates reagulary.
Third party risk : Only confident and monitored third parties can
be involved and certain must be made for third parties.
Evolving cyber threats : Each day more dangerous cyber threats are
introduced therefore the bank must be in par to handle these
evolving threats.
Approach to adopting bank secruuity policy consists of:
?1. Arrangement of plans: In this phase we can create blueprint for
policies, formalising leadership and means to know the
policy.
2. Create Design: Here we can make
requirements of systems engineering
And methods and finally build a policy.
?3. Deployment: Finally the policy plan can be deployed by
overcoming the challenges.
?4.Transition of operations : The storage of policy reviews against
frauds and threats can be managed and team concerning should take
over.