Question

In: Computer Science

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive...

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework. You may create and / or assume all necessary assumptions needed for the completion of this assignment. Write a three to five (3-5) page paper in which you: Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.

Solutions

Expert Solution

Information Security Framework (ISF)

When Chris opened that file, there was a breach on Best Stock's network targeting the firm's information base. The file contained a specialized worm or virus which was programmed to steal passwords of users logged on to the network the same time as it was released.

Best Stocks could have protected itself from these issues if it had implemented some form of information security using a certified information security frameworks (ISF).

Information security frameworks are a collection of standardized policies, procedures and guides, meant to direct a firm or any organization, which adopts its use, on how to protect its hardware, software, data, information, network, computing devices, users and clients from potential security breaches through their use of the firm's resources or services.

There are three main reasons for using the information security frameworks:

  • Ensure legal compliance with the country of operation's Data Protection Act.
  • Assure customers of their personal data safety and privacy.
  • Protect the entire firm from network security breaches and invariably, company's data breach.

There are several frameworks available which help in addressing key information security concerns like the popular ones listed below:

  • Control Objectives for Information and Related Technology (COBIT): A product of vendor-independent organization IT governance professionals. Its key point of focus is on reducing technical risks in an organization.
  • ISO 27000 Series: This was developed by the International Standards Organization and offers a much wider coverage over a company or organization's processes. It can also be applied to all types and sizes of organizations.

An example of a security policy, driven by the ISF mentioned above, are made up of sections or domains which address the company's operational processes or infrastructure as follows:

Security Policy Scope : This addresses the coverage scope of the security policy document and defines the roles and responsibilities to drive the document organizational-wide.

Organizational Security : This addresses the organization's security needs covering its staff, customers or clients, suppliers and other vendors handling key processes on its behalf.

Risk Assessment and Treatment : This helps define potential risks and subsequent responses to reduce its effect on the organization.

Asset Classification : The value of an asset determines the level of sophistication its protection would be. In order to implement this, the company's assets irrespective of its size or use are classified and protected.

Human Resources Security : This deals with the processes involved with staff engagement, onboarding and termination processes.

Physical and Environmental Security : Protection of the firm's building and physical entry access, as well as protection of the environment from the dangers which could have an impact on the building itself.

Communications and Operations Management : This section addresses the communication and operational channels of the organization. Protecting each channel on a need to know and access basis.

System Access Controls : This addresses the requirements and standards for the granting and maintenance of access to staff on systems, applications, and network.


Related Solutions

Managing IT security and risks Information security is critical in the development and implementation of information...
Managing IT security and risks Information security is critical in the development and implementation of information systems in organizations. Assume that you are developing a customer relationship management system for Morita Loan, list five methods that you can use to protect the data in such a system and discuss how you can implement these five means for information security.
The HIPAA Security Rule is a critical document for Health care Information Technology professionals to understand...
The HIPAA Security Rule is a critical document for Health care Information Technology professionals to understand and support. Review the HIPAA Security Rule and discuss: (1) importance of access controls in addition to audit controls, (2) what “emergency access procedures” mean under the Access Control standard, (3) how role-based access controls meet the HIPAA Privacy Rule Minimum Necessary standard, (4) what form of authentication best meets the Person or Entity Authentication standard for different healthcare applications.
Describe the basic elements of human nature and how they affect information security policy development and...
Describe the basic elements of human nature and how they affect information security policy development and impact information security policy implementation issues. Propose at least three ways that organizations can overcome this policy development and implementation issues.
Describe the basic elements of human nature and how they affect information security policy development and...
Describe the basic elements of human nature and how they affect information security policy development and impact information security policy implementation issues. Propose at least three ways that organizations can overcome these policy development and implementation issues.
Describe with examples, the various layers of security that are critical to your security plan policy.
Describe with examples, the various layers of security that are critical to your security plan policy.
A security policy is a document that states how the organisation plans to protect the organisations information Technology assets.
A security policy is a document that states how the organisation plans to protect the organisations information Technology assets. In your own words, state how a security policy affects the organisation's culture and the two things the policy must balance.
Use the Mundell-Fleming framework to show and explain how effective monetary policy and fiscal policy is,...
Use the Mundell-Fleming framework to show and explain how effective monetary policy and fiscal policy is, in raising output, in the following cases in the presence of imperfect capital mobility: (i) fixed exchange rate (ii) flexible exchange rate. Be sure to clearly explain your graphs and the various shifts that occur.
Discuss the importance of establishing an effective risk management policy in an insurance company giving one...
Discuss the importance of establishing an effective risk management policy in an insurance company giving one example of a risk management strategy used by insurance companies.
Having security policies and procedures that document and manage access to critical data and technology is...
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization.
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are creating the policy and then complete the policy using the framework.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT