In: Computer Science
Information security policies are the core internal guidance for an organization and must be enacted prior to the purchase of information security controls. There is a bit of a "chicken and egg" dispute in the information security community as to whether it is appropriate to first engage in risk assessment with policies created to address those findings or whether it is appropriate to first create policies against which a risk assessment can be performed. On a more granular level, security policy is meant to document what is important to a particular organization related to information technology assets, including data. This sequential order is critical to the success of an information security program because a successful program ensures that organizations do not spend too little or too much money when purchasing controls to enforce these policy decisions. For example, it is possible to purchase a certificate that uses DNA as the key to enforce an access control policy, but there are very few situations where that would be an appropriate or balanced choice. You are a new information security officer for Metro City Community College. Metro City has a small urban campus in downtown Detroit and also offers their catalog of courses online. One of the first tasks you are assigned is to create the information security policies that will guide all subsequent security projects that you propose. Use the study materials and engage in any additional research needed to fill in knowledge gaps. Write a 2–3 page paper that covers the following: •Describe the overall objectives of creating information security policy for this institution. •Analyze the benefits and challenges of enforcing information security policies within government agencies and organizations. •Evaluate how creation and enforcement of information security policies can impact customers and business partners that have a relationship with a government agency or organization.
As the Security Officer of Metro City Community, I’ll establish the Information security policy for my organization with the following objectives:
Scope of the Policies:
The scope of the policies will be limited to Metro City Community only.
Responsibilities –
Me as a Information Security Officer will be responsible
for:
-Daily overall security check
-Weekly Internal audits within all modules of the System.
-Risk Assessment on every new release and planning for further
improvements.
Lets talk of Benefits first:
Protects Data-Integrity
This is one key benefits of Information security policies that, it helps to secure and Confidentiality and Data integrity.
Data and Information Security:
Since Metro City is an online based course offering organization, hence its maximum data comprises of Intellectual property i.e. Information which has been developed by its creators and are their own efforts for providing knowledge and information to users.
Ability to sustain vulnerable cyber attacks
Since it’s an online course offering organization hence it mostly deals with Internet. As mentioned in the last point of the Objectives, the policies act as a regulating body for vulnerable internet security threats and possibility of any incoming hack
Overall Governing policies for the organization
Lays down an effective foundation for overall organization’s working policies.
Provides Cost effective solutions to avoid third party security outsourcing
An efficient in-house development of Information security policies can thus reduce costs which would have employed to avail external defense services to combat potential security threats.
Challenges faced to enforce Information Security Policies:
Some of the practical challenges which may be faced while implementing Information security policies in my organization are:
Impact over Customers and Business partners:
Customers and Business merchants taking services of the organization can be impacted in following ways:
Negative Impacts:
Positive Impacts: