Final Project - Computer Science
In this Project Final you are to update, refine and combine the past seven weeks of Labs to create the Information Security Plan into final document. Remember that you are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. You are creating the final Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook).
eTextbook: Management of Information Sec...
descriptionCover Page
descriptionTitle Page
descriptionCopyright Page
descriptionPreface
descriptionAuthor Team
descriptionAcknowledgments
descriptionOur Commitment
descriptionForeword
keyboard_arrow_rightChapter 1. Introduction to the Management of Infor...1
descriptionIntroduction to Security3
descriptionCNSS Security Model5
keyboard_arrow_rightThe Value of Information and the C.I.A. Triad7
descriptionConfidentiality8
descriptionIntegrity
descriptionAvailability
descriptionPrivacy9
descriptionIdentification
descriptionAuthentication
descriptionAuthorization
descriptionAccountability
descriptionKey Concepts of Information Security: Threats and ...10
keyboard_arrow_rightThe 12 Categories of Threats
descriptionCompromises to Intellectual Property12
descriptionDeviations in Quality of Service14
descriptionEspionage or Trespass15
descriptionForces of Nature19
descriptionHuman Error or Failure20
descriptionInformation Extortion
descriptionSabotage or Vandalism22
descriptionSoftware Attacks23
descriptionTechnical Hardware Failures or Errors
descriptionTechnical Software Failures or Errors29
descriptionTechnological Obsolescence34
descriptionTheft
descriptionSome or All of the Above35
descriptionWhat Is Management?36
keyboard_arrow_rightBehavioral Types of Leaders
descriptionManagement Characteristics37
descriptionPlanning38
descriptionOrganizing
descriptionLeading
descriptionControlling39
descriptionGovernance40
descriptionSolving Problems
descriptionStep 1: Recognize and Define the Problem
descriptionStep 2: Gather Facts and Make Assumptions
descriptionStep 3: Develop Possible Solutions41
descriptionStep 4: Analyze and Compare Possible Solutions
descriptionStep 5: Select, Implement, and Evaluate
keyboard_arrow_rightPrinciples of Information Security Management42
descriptionPlanning43
descriptionPolicy
descriptionPrograms
descriptionProtection44
descriptionPeople
descriptionProjects45
descriptionChapter Summary46
descriptionReview Questions47
descriptionExercises48
descriptionClosing Case49
keyboard_arrow_rightChapter 2. Compliance: Law and Ethics52
keyboard_arrow_rightInfoSec and the Law53
descriptionTypes of Law54
descriptionRelevant U.S. Laws55
descriptionInternational Laws and Legal Bodies72
descriptionState and Local Regulations73
descriptionPolicy versus Law
keyboard_arrow_rightEthics in InfoSec76
descriptionEthics and Education80
descriptionDeterring Unethical and Illegal Behavior83
keyboard_arrow_rightProfessional Organizations and Their Codes of Cond...
descriptionAssociation for Computing Machinery (ACM)
descriptionInternational Information Systems Security Certifi...84
descriptionSANS85
descriptionInformation Systems Audit and Control Association ...
descriptionInformation Systems Security Association (ISSA)86
keyboard_arrow_rightOrganizational Liability and the Need for Counsel87
descriptionKey Law Enforcement Agencies88
descriptionChapter Summary90
descriptionReview Questions91
descriptionExercises92
descriptionClosing Case93
keyboard_arrow_rightChapter 3. Governance and Strategic Planning for S...98
keyboard_arrow_rightThe Role of Planning100
descriptionPrecursors to Planning101
keyboard_arrow_rightStrategic Planning103
descriptionCreating a Strategic Plan
descriptionPlanning Levels105
descriptionPlanning and the CISO106
keyboard_arrow_rightInformation Security Governance108
descriptionThe ITGI Approach to Information Security Governan...109
descriptionNCSP Industry Framework for Information Security G...111
descriptionCERT Governing for Enterprise Security Implementat...113
descriptionISO/IEC 27014:2013 Governance of Information Secur...115
descriptionSecurity Convergence117
keyboard_arrow_rightPlanning for Information Security Implementation119
descriptionIntroduction to the Security Systems Development L...124
descriptionChapter Summary134
descriptionReview Questions135
descriptionExercises
descriptionClosing Case136
keyboard_arrow_downChapter 4. Information Security Policy140
keyboard_arrow_rightWhy Policy?141
descriptionPolicy, Standards, and Practices145
keyboard_arrow_rightEnterprise Information Security Policy
descriptionIntegrating an Organization’s Mission and Objectiv...
descriptionEISP Elements147
descriptionExample EISP Elements148
keyboard_arrow_downIssue-Specific Security Policy152
descriptionElements of the ISSP153
descriptionImplementing the ISSP155
keyboard_arrow_rightSystem-Specific Security Policy
descriptionManagerial Guidance SysSPs158
descriptionTechnical Specification SysSPs159
keyboard_arrow_rightGuidelines for Effective Policy Development and Im...163
descriptionDeveloping Information Security Policy
descriptionPolicy Distribution
descriptionPolicy Reading164
descriptionPolicy Comprehension165
descriptionPolicy Compliance
descriptionPolicy Enforcement166
descriptionPolicy Development and Implementation Using the Se...167
descriptionAutomated Tools171
descriptionOther Approaches to Information Security Policy De...172
descriptionSP 800-18, Rev. 1: Guide for Developing Security P...174
descriptionA Final Note on Policy
descriptionChapter Summary176
descriptionReview Questions177
descriptionExercises178
descriptionClosing Case179
keyboard_arrow_rightChapter 5. Developing the Security Program
keyboard_arrow_rightOrganizing for Security
descriptionSecurity in Large Organizations
descriptionSecurity in Medium-Sized Organizations
descriptionSecurity in Small Organizations
descriptionPlacing Information Security Within an Organizatio...
descriptionComponents of the Security Program
keyboard_arrow_rightInformation Security Roles and Titles
descriptionChief Information Security Officer
descriptionConvergence and the Rise of the True CSO
descriptionSecurity Managers
descriptionSecurity Administrators and Analysts
descriptionSecurity Technicians
descriptionSecurity Staffers and Watchstanders
descriptionSecurity Consultants
descriptionSecurity Officers and Investigators
descriptionHelp Desk Personnel
keyboard_arrow_rightImplementing Security Education, Training, and Awa...
descriptionSecurity Education
descriptionSecurity Training
descriptionTraining Techniques
descriptionSecurity Awareness
keyboard_arrow_rightProject Management in Information Security
descriptionProjects versus Processes
descriptionPMBOK Knowledge Areas
descriptionProject Management Tools
descriptionChapter Summary
descriptionReview Questions
descriptionExercises
descriptionClosing Case
keyboard_arrow_rightChapter 6. Risk Management: Identifying and Assess...250
keyboard_arrow_rightIntroduction to Risk Management251
descriptionKnowing Yourself252
descriptionKnowing the Enemy
descriptionAccountability for Risk Management253
keyboard_arrow_rightRisk Identification254
descriptionIdentification and Prioritization of Information A...255
descriptionThreat Assessment264
descriptionThe TVA Worksheet271
keyboard_arrow_rightRisk Assessment and Risk Appetite
descriptionAssessing Risk274
descriptionLikelihood
descriptionAssessing Potential Impact on Asset Value (Consequ...275
descriptionPercentage of Risk Mitigated by Current Controls
descriptionUncertainty
descriptionRisk Determination276
descriptionLikelihood and Consequences278
descriptionDocumenting the Results of Risk Assessment279
descriptionRisk Appetite281
descriptionChapter Summary282
descriptionReview Questions283
descriptionExercises284
descriptionClosing Case285
keyboard_arrow_rightChapter 7. Risk Management: Controlling Risk288
keyboard_arrow_rightIntroduction to Risk Control289
descriptionRisk Control Strategies290
descriptionDefense
descriptionTransference291
descriptionMitigation
descriptionAcceptance293
descriptionTermination
keyboard_arrow_rightManaging Risk295
descriptionFeasibility and Cost–Benefit Analysis298
descriptionOther Methods of Establishing Feasibility304
descriptionAlternatives to Feasibility Analysis306
keyboard_arrow_rightRecommended Risk Control Practices308
descriptionQualitative and Hybrid Measures
descriptionDelphi Technique309
descriptionThe OCTAVE Methods310
descriptionMicrosoft Risk Management Approach311
descriptionFAIR312
descriptionISO 27005 Standard for InfoSec Risk Management313
descriptionNIST Risk Management Model314
descriptionOther Methods
descriptionSelecting the Best Risk Management Model317
descriptionChapter Summary318
descriptionReview Questions319
descriptionExercises320
descriptionClosing Case322
keyboard_arrow_rightChapter 8. Security Management Models325
descriptionIntroduction to Blueprints, Frameworks, and Securi...326
keyboard_arrow_rightAccess Control Models327
descriptionCategories of Access Controls328
descriptionOther Forms of Access Control334
keyboard_arrow_rightSecurity Architecture Models
descriptionTrusted Computing Base335
descriptionInformation Technology System Evaluation Criteria
descriptionThe Common Criteria337
keyboard_arrow_rightAcademic Access Control Models
descriptionBell-LaPadula Confidentiality Model338
descriptionBiba Integrity Model339
descriptionClark-Wilson Integrity Model340
descriptionGraham-Denning Access Control Model
descriptionHarrison-Ruzzo-Ullman Model
descriptionBrewer-Nash Model (Chinese Wall)341
keyboard_arrow_rightOther Security Management Models
descriptionThe ISO 27000 Series342
descriptionNIST Security Publications346
descriptionControl Objectives for Information and Related Tec...352
descriptionCommittee of Sponsoring Organizations355
descriptionInformation Technology Infrastructure Library
descriptionInformation Security Governance Framework356
descriptionChapter Summary358
descriptionReview Questions359
descriptionExercises360
descriptionClosing Case
keyboard_arrow_rightChapter 9. Security Management Practices364
keyboard_arrow_rightIntroduction to Security Practices
descriptionBenchmarking365
descriptionStandards of Due Care/Due Diligence366
descriptionSelecting Recommended Practices369
descriptionLimitations to Benchmarking and Recommended Practi...370
descriptionBaselining371
descriptionSupport for Benchmarks and Baselines372
keyboard_arrow_rightPerformance Measurement in InfoSec Management
descriptionInfoSec Performance Management374
descriptionBuilding the Performance Measurement Program377
descriptionSpecifying InfoSec Measurements378
descriptionCollecting InfoSec Measurements379
descriptionImplementing InfoSec Performance Measurement382
descriptionReporting InfoSec Performance Measurements385
keyboard_arrow_rightTrends in Certification and Accreditation386
descriptionNIST SP 800-37, Rev. 1: Guide for Applying the Ris...387
descriptionChapter Summary392
descriptionReview Questions393
descriptionExercises
descriptionClosing Case394
keyboard_arrow_rightChapter 10. Planning for Contingencies398
keyboard_arrow_rightIntroduction to Contingency Planning399
descriptionFundamentals of Contingency Planning401
descriptionComponents of Contingency Planning405
descriptionBusiness Impact Analysis406
descriptionContingency Planning Policies412
keyboard_arrow_rightIncident Response
descriptionGetting Started413
descriptionIncident Response Policy414
descriptionIncident Response Planning415
descriptionDetecting Incidents420
descriptionReacting to Incidents423
descriptionRecovering from Incidents425
keyboard_arrow_rightDisaster Recovery432
descriptionThe Disaster Recovery Process434
descriptionDisaster Recovery Policy435
descriptionDisaster Classification436
descriptionPlanning to Recover438
descriptionResponding to the Disaster
descriptionSimple Disaster Recovery Plan439
keyboard_arrow_rightBusiness Continuity444
descriptionBusiness Continuity Policy445
descriptionContinuity Strategies447
descriptionTiming and Sequence of CP Elements448
descriptionCrisis Management450
descriptionBusiness Resumption451
keyboard_arrow_rightTesting Contingency Plans454
descriptionFinal Thoughts on CP455
keyboard_arrow_rightManaging Investigations in the Organization456
descriptionDigital Forensics Team
descriptionAffidavits and Search Warrants457
descriptionDigital Forensics Methodology458
descriptionEvidentiary Policy and Procedures461
descriptionLaw Enforcement Involvement462
descriptionChapter Summary463
descriptionReview Questions465
descriptionExercises466
descriptionClosing Case467
keyboard_arrow_rightChapter 11. Personnel and Security470
keyboard_arrow_rightIntroduction to Personnel and Security
descriptionStaffing the Security Function472
descriptionInformation Security Positions474
keyboard_arrow_rightInformation Security Professional Credentials
description(ISC)2 Certifications486
descriptionISACA Certifications490
descriptionGIAC Certifications493
descriptionEC-Council Certifications494
descriptionCompTIA Certifications496
descriptionISFCE Certifications497
descriptionCertification Costs498
descriptionEntering the Information Security Profession499
keyboard_arrow_rightEmployment Policies and Practices501
descriptionHiring502
descriptionContracts and Employment504
descriptionSecurity as Part of Performance Evaluation
descriptionTermination Issues505
descriptionPersonnel Security Practices507
descriptionSecurity of Personnel and Personal Data
descriptionSecurity Considerations for Temporary Employees, C...508
descriptionChapter Summary514
descriptionReview Questions515
descriptionExercises
descriptionClosing Case516
keyboard_arrow_rightChapter 12. Protection Mechanisms523
keyboard_arrow_rightIntroduction to Protection Mechanisms524
descriptionAccess Controls and Biometrics525
keyboard_arrow_rightManaging Network Security533
descriptionFirewalls534
descriptionIntrusion Detection and Prevention Systems545
descriptionRemote Access Protection549
descriptionWireless Networking Protection552
descriptionScanning and Analysis Tools555
descriptionManaging Server-Based Systems with Logging559
keyboard_arrow_rightCryptography564
descriptionEncryption Operations566
descriptionUsing Cryptographic Controls573
descriptionManaging Cryptographic Controls577
descriptionChapter Summary579
descriptionReview Questions580
descriptionExercises581
descriptionClosing Case582
descriptionAppendix584
Jump to Page
Go
menueTextbook: Management of Information Securitymenu_openeTextbook: Management of Information Securityhelp_outlineQuick Tour
printPrint
searchSearch
bookAnnotations
text_fieldsAccessibilitycloseAccessibility options
Font SizeA
A
Text FontDefault
Open Sans
Lucida Sans Unicode
Tahoma
Trebuchet MS
Georgia
Verdana
Times New Roman
Arial
sans-serif
Segoe UI
Background ColorDefault
Normal
Sepia
Black
Read Aloud
Listen to this page
replay_5
play_circle_filled
forward_5
stop
Reading speed
Slow
Normal
Fast
Voice
Male - Australia
Male - United Kingdom
Female - United States
Male - United States
bookmark_borderBookmark
more_vertTerms and Conditions
Privacy Policy
Help & Support
keyboard_arrow_leftPrevious pageIssue-Specific Security Policy
Next pageImplementing the ISSPkeyboard_arrow_right
replay_5
play_circle_filled
forward_5
stop
cancel
2
The Prohibition Use Section of ISP
The Prohibition Use Section of ISP
The prohibition use section of the ISP specifies the activities considered unacceptable when using Mahtmarg Manufacturing Company’s network connection. It also indicates the information that should not be accessed using its systems and practices that employees should not engage in (Boiko & Shendryk, 2017). Further, it documents the regulatory stipulations that employees should follow to ensure that they utilize the company’s information systems appropriately.
Prohibition of Illegal Conduct
Mahtmarg Company will assess and discontinue the accounts and connections of the individuals using its services who will engage in actions that violate its policies. Subsequently, the company may take legal steps against the users who engage in offensive acts (Boiko & Shendryk, 2017). Some of the actions under this category include conveying messages that have sexual intonations, such as pornographic content. Additionally, it comprises information that perpetrates hatred in the populace, or other undesirable practices such as racism and cruelty.
System and Network Activity Restrictions
Copyright Infringement
The company does not permit the users to use the platform to engage in actions that violate the copyright of other individuals by producing their content without their consent. The infringement of copyrights may include the illegal production of third parties’ music or movies.
Proprietary Information Disclosure
The company does not permit users to infringe upon and expose the confidential business information of other users (Gronwald, 2020). Any individuals found to be guilty of infiltrating the private content of others will face stiff penalties such as termination of their accounts.
Unauthorized Use for Personal Business
The company does not permit users to utilize the network to participate in activities other than for official business. For example, users cannot use the company’s information systems for personal use, such as browsing social networking sites like Facebook and Twitter.
Malicious Business
The company will look out for and take action against any activities that compromise the effectiveness of its services. For example, it will not condone illegal activities meant to deceive others, such as gambling (Gronwald, 2020). Further, it forbids any actions that allow harmful elements such as viruses and Trojan horses to access the network.
Account Disclosure
The company prohibits users from using the network to engage in malicious activities such as accessing the accounts of other individuals. The illegality includes attempts to hack the security information of other users.
Email and Communication Activity Restrictions
Unsolicited Emails
Mahtmarg Company reserves the right to filter out and limit the transmission of unsolicited emails using its networks. Unsolicited emails in this context include bulk transference of promotional messages (Boiko & Shendyk, 2017). Subsequently, it consists of the conveyance of messages with political overtones.
Harassment
The company does not permit the network to send emails whose contents are meant to harass the recipients. The company will penalize the users who use the platform to spread such content.
Chain Letters
Users of the Mahtmarg network are not allowed to use the platform to send chain letters, which encourage the transmission of the same content severally to different individuals.
Spam
The company strictly forbids users of the network from sending messages considered spam (Boiko & Shendryk, 2017). The practices encompassed in this category include sending content to unwilling parties or sending the same content severally to the same recipients.
Blogging and Social Media Activity Restriction
The company will monitor how users of its services utilize social media to ensure that it does not violate any stipulated statutes.
Representation of the Company on Blogs or Social Media
The company allows enterprises to use social networking platforms to promote their activities. However, while using the network for this function, users should refrain from engaging in activities that infiltrate the confidentiality of companies or those present therein. Firstly, users are not allowed to share private information about individuals, such as their names, ages, or residential places, without their consent (Boiko & Shendryk, 2017). Subsequently, it is forbidden to share private information about the company, such as its financial health, the products that will be launched in the market in the near future, or the techniques that the company uses in its operations (Gronwald, 2020). Further, the company forbids any attempts to discredit an enterprise by posting damaging content about its employees without due cause.
Separations of Personal and Professional Comments
The company does not allow inappropriate use of social media in a manner that is harmful to companies. For example, it does not allow users to post content on behalf of companies without adequate consent. It is fundamental for users to indicate whether the information they document on networking sites such as Facebook are their personal comments, or they have the explicit permission of the company to post information on its behalf (Boiko & Shendryk, 2017). Subsequently, the company will not allow inappropriate use of social networking sites, such as posting information on behalf of a company, without seeking permission to do so.
Conclusion
The prohibition section of the ISP will ensure responsible and effective use of Mahtmarg Company’s network to benefits the users. It will help in eliminating any activities or violations that will interfere with the effectiveness of the services. It will ensure that the network is used without any unprecedented hitches.
References
Boiko, A., & Shendryk, V. (2017). System integration and security of information systems. Procedia Computer Science, 104, 35-42.
Gronwald, K. D. (2020). Integrated Business Information Systems. Springer Berlin Heidelberg.
Authorized uses
Authorized uses
The technology is used by both the customers and the organizations who have expressed their interests. Fiber cable is the current trending technology which has facilitated increasing the speed in the cables and people experience high intensity in transmitting the data files. The technique reduces traffic thus ensuring people can conduct different research at the anticipated speed. The technology can be used by those organization using the internet space to cater to the clients’ requirements (Hall & Minto, 2019). For an extended period, it has been a challenge because of the slow internet speed but introducing the fiber cable has eliminated that challenge. The clients can purchase the entity and use them at their home comforts for communication and internet space exploration.
Fair and responsible use expounds on the policies which should be considered. For instance, the office internet should be used strictly for work purposes and not surfing the internet for individual benefits. The employees should comprehend that the fiber cable is extremely costly thus should not be diverted to other non-beneficial use (Hall & Minto, 2019). Additionally, they should be responsible in that the passwords should not be given to external members. It will prevent external threats from maneuvering into the company’s software system. All workers should be responsible and collaborate to protecting the organization from unwarranted attacks which might result from the internet.
Companies have to protect personal and propriety information. Such data can be protected by giving limited access towards the storage systems. Few people should have the control over such information and only when it is necessary (Hall & Minto, 2019). Public hotspot should be banned because they have contributed to threats in the organization. the policies should include prohibiting the external forces from accessing hotspot. Another tactic is through encrypting the password and internet information to ensure it is accessible within the organization.
Reference
Hall, A. J., & Minto, C. (2019). Using fiber optic cables to deliver intelligent traffic management in smart cities. In International Conference on Smart Infrastructure and Construction 2019 (ICSIC) Driving data-informed decision-making (pp. 125-131). ICE Publishing.
1
3
IS311 Security Operations (11-AUG-21 - 05-OCT-21 [80050])
Introduction
Mahatmarg Manufacturing is an organization that offers fiber cable to local organizations, government organizations, and individual customers. This information security plan is documentation of the organizations plan and security measures that will be put in place to help in securing the personal and sensitive data of the organization.
Purpose
The Information Security Plan (ISP) is aimed to create an operational, tangible, and procedural plan which will help in securing the data of the customers of the Mahatmarg Manufacturing organization. The objectives of the plan are to ensure the information assets and customer data of the organization are secure and protected from loss, destruction, and also from being accessed by unauthorized personnel who might have malicious intentions towards the organization. The purpose of this plan is to give an overview of what is required of the employees and also the controls which are in place in the organization (Jayanthi, 2017). The plan will also describe the roles and responsibilities, and the expected behavior from all the individuals who will have access to the information. The ISP will also incorporate the input of all the departments and the managers of the organization.
Scope
The scope of the ISP represents the definition of information including what is excluded or included. The scope will cover the storage of the information on the computers and databases and the format in which the information is presented to the employees; either printed or in soft copy (Nieles et al., 2017). The scope of the ISP entails the process of assessing the information risks and vulnerabilities and also includes the controls used to ensure that the information in the organization is secure.
Roles and responsibilities
In regard to this policy, the following are the roles and responsibilities of the different employees in the organization.
Chief Information Officer- top executive in the manufacturing organization who will be charged with the responsibility of the implementation of computer technologies and helps in the support of the organizational objectives and goals regarding the information technology systems ( Dhillon et al., 2018)
• Information Security Officer- is responsible for maintaining a secure environment for the customers and other stakeholders through monitoring the organizations premises and the systems of the organization.
• Information Security Architect- will be responsible for helping enforce and implement the policy by helping recommend the ways and methods in which the manufacturing entity can update and upgrade the security of the organization.
• Information Security Coordinator- help in the evaluation and the coordination of the security programs of the organization and they do so by ensuring that the programs put in place are effective and also identifies the needs for any additional resources in the organization.
• Data Proprietor (Administrative official)- Has oversight authority over data and also will help in establishing the purpose and the functions of the different data resources.
• Data Custodian (Technical staff)- The data custodians will work directly with the data owners and will also be charged with the responsibility of maintenance, protection, and storage of information.
References
Dhillon, G., Torkzadeh, G., & Chang, J. (2018, June). Strategic planning for IS security:
designing objectives. In International Conference on Design Science Research in Information Systems and Technology (pp. 285-299). Springer, Cham.
Jayanthi, M. K. (2017, March). Strategic planning for information security-DID mechanism to
befriend the cyber criminals to assure cyber freedom. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 142-147). IEEE
Nieles, M., Dempsey, K., & Pillitteri, V. Y. (2017). An introduction to information security.
NIST special publication, 800(12), 101.
4
Information Security Plan
Information Security Plan
Authentication and Encryption
Authentication is used to determine the identity of a person accessing the information on a site. It involves the use of a user name and a password. Authentication will also be carried out through fingerprints, voice recognition, and retina scans. The authentication will not determine the tasks an individual can engage in or the files that one sees. The process only identifies and verifies the identity of the person or the system.
Encryption involves the transformation of data to an unreadable form by anyone without decryption keys. The encryption process utilizes several protocols such as Socket Layer (SSL) protocols and Secure Shell (SSH) protocols. Data that utilizes SSL transactions are usually encrypted between the browser and the webserver. Encryption allows data to be sent across the internet with minimal risks of being intercepted (Safa et al., 2016). This is especially important for critical data such as credit card numbers and social security numbers.
Roles and duties of a System Administrator
The systems administrator is responsible for monitoring and alerting any key concerns/issues in the organizations infrastructure and applications. A system administrator must know how to set up alerts based on monitoring thresholds to obtain on-call notifications during significant incidents. The systems administrator should be knowledgeable on how to use external system outputs and metrics to determine the health of their systems (Moody et al., 2018).
A system administrator is in charge of the administration of all applications and services. The system administrator is also responsible for managing passwords and SSO practices and policies in the organization and aids other employees in accessing the system. The administrator also offers procedures and sets policies on how files are organized and shared within the organization. This offers security from external attacks and allows easy access to files. The system administrator is also responsible for software installation and updates to minimize the threat of attacks. Above all, the administrator should advocate security to all staff during the formulation of policies and installation of servers.
User Responsibilities
Users are also responsible for cyber security protection within an organization. All users are expected to have a basic understanding of cyber security risks and how to avoid falling victim to cyber-attacks. The users should be willing to engage in educational activities organized by the organizations management (Moody et al., 2018). Users are also expected to abide by cyber security policies and procedures. Such policies include an acceptable usage policy, email usage policy, and BYOD policy, among others.
Auditing
Identifying regular cybersecurity audits helps organizations establish rules for handling sensitive customer and employee information. Auditing also helps the organization remain update with security measures. It also helps identify physical security vulnerabilities Auditing also helps in formulating new security policies for the organization (Moody et al., 2018). It prepares the organization for emergency responses during cybersecurity breaches.
Configuration
Configuration involves security measures implemented when installing and building computers and networks devices to reduce vulnerabilities to cyber-attacks. Configuration helps in reducing the risk of outages and security breaches (Safa et al., 2016). Accurate records ensure formal configurations in control processes.
References
Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS quarterly, 42(1).
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. computers & security, 56, 70-82.
Running head: Limitations of liability 2
Limitations of liability 2
Limitations of liability
Limitations of liability
The section covers various forms of liability of the Information Security Plan (ISO). The plan covers limitations on liability under two sections: statement of liability and other disclaimers.
1.0. Statement of liability or disclaimers
The liability of the organization is limited to the provisions given on the liability clause of the organization policy. Any other liability not subject to the policies will be subject to negotiations among the parties involved. It is the duty of the company to comply to the provisions outlined below an all employees and members of staff are expected to comply accordingly.
1.1. Liability on foreseeable losses
The company will not be liable for losses incurred as a result of incidents that occur after engagement into an agreement with a third party. However, the event must be reasonably unseen by the company before engagement into the agreement with the third party. In case of an employee acting on behalf of the company, there has to be disclosure to the relevant supervisor on the occurrence of the loss and a disclosure that it was not possible to foresee the loss of data before engagement with the third party.
1.2. Liability on the avoidable disasters
The company will be liable for loss of client data if there is an occurrence of a breach of safety protocols on client information. The event of breach must be avoidable if certain mechanisms were put in place. However, the liability of the company is based on the nature of breach and one that does not relate to the third party. This excludes errors made by the vendor of an information system or errors made by an employee. It is the duty of the company to ensure information relating to the operations and clients of the company is well-protected against loss.
1.3. Plausible deniability
In case of a transaction between a third party and a company official, there has to be formal processes which includes following the protocols into the organization. Any third-party accessing services of the company must report through the reception and gain access to the department in need of. This enable the company to establish presence of the individual into the company and ensure the company is responsible of all transactions done within the company’s premises. In such cases, the company is liable for any loss of information or any other form of damage that may occur in the process of client details management among the members of staff. However, any other form of business that is carried out contrary to the outlined procedure is considered unofficial. The company is not liable for any damages incurred in the process of accessing services contrary to company’s protocols. Without official communication, neither the company nor the top officials are held accountable for any discrepancies in such cases. However, the employee shall be held in contempt of the company’s policies which is subject to disciplinary review.
2.0. Other disclaimers
2.1. Repudiation of employees
The company expects all employees and members of staff to comply with the company’s policies. This include ensuring they use company’s technology appropriately and ensure there is no breach that can lead to loss of information from the company’s information systems. Employee’s conduct has a major contribution to the reputation of the company. This requires at most vigilance in ensuring all the conditions are aligned with. However, in case of violation of company’s policies, the employee will be subject to disciplinary action. This include repudiation of the employee to ensure such actions are not repeated.
Violation of Policy
Violation of Policy
Every staff member in the Mahtmarg organization should adhere to the given policy. They are equally responsible for reporting circumstances that might violate the provided guidelines. Breaking the policies is massive damage to the organization and would impact the employees. Managers should be keen to ensure that all policies are incorporated without experiencing challenges (Lammie, 2021). Therefore, they are responsible for ensuring conduct is upheld, and those deliberately violating the policies are punished. Disciplinary is essential because it discourages other workers from violating the provided policies. The punishment could be mild and severe depending on the situation. The primary alternative is ensuring they have eradicated policy breakage.
Steps were taken to report a policy violation
The first step to reporting the violation has ultimate evidence that the violated policy has damaged the organization. Sometimes the culprit might escape being questioned or punished because the witness lacked enough evidence to incriminate them to the circumstance. Therefore, the evidence should be collected and taken to the next step, where the manager is informed about the occurrences. The step is significant because the supervisors will weigh the accuracy of the evidence and focus on solving the case. The witness should proceed and address the moral conduct department about the occurrence (Lammie, 2021). He can decide to be an anonymous witness and report the incidents without revealing his identity. The significant part is proving that an essential policy has been broken and immediate action should be taken. Hiding identity will protect an individual from unnecessary critics or life threats. Another step is to understand that reporting violations is part of an employees duty and thus should not feel threatened. The primary goal is to develop an institution with the best staff members who care for its welfare. After reporting, the witness provides the platform for the administration process to incorporate various investigations and uncover the reality.
Penalties for policy violation
Various penalties can be given for policy violations to prevent such occurrences from happening. Minor transgressions are given mild punishments, and the person is allowed to resume their duties. The first penalty that can be given is contract termination, and the victim is sent away from the company. Serious offenses call for permanent solutions because the action might repeat suppose the individual is forgiven (Lammie, 2021). For instance, mistakes like leaking the organizations private information to malicious sources are a policy violation which the administration cannot forgive. Such an individual is extremely dangerous and can repeat the crime if given a chance. Moreover, any other individual in the organization will be tempted to break similar conduct. Therefore, that culprit should be laid off for the organizations future benefit, and legal actions are taken to ensure that they serve their term for violating company codes.
Additionally, another penalty that can be given is demoting an individual from their high organization position. It happens for small code breakage, and lowering them to a minor position will strip them of some of the power possessed in the firm (Lammie, 2021). The company will find a more legible person who will take the position and stay away from policy breaching. Penalties are generally significant since people are punished for making mistakes that could break the organizations conduct. Companies that take few actions against the suspect will be affected because different employees will take advantage and compromise the policies, thus leading to its downfall.
Reference
Lammie, D. Q. (2021). Copyright Violation in the Information and Technology Industry. Available at SSRN 3793340.
4
Policy Review and Modification
6. Policy Review and Modification
Scheduled Review of Policy
The information security policy will require an annual review to look at whether the policy meets the needs of the organization. The information security policy of the company shall also be reviewed at scheduled intervals when significant changes occur to assess the impact of the changes in policies and procedures. The information policy review shall be conducted in case of the following events:
1) Adoption of new information system or services, or significant changes to the existing information system.
2) Adoption of new critical infrastructure in the organization or any significant changes to the existing infrastructure.
3) Implementation of cloud services for the storage and processing of information as this could pose an information security threat.
The annual review will focus on identifying any existing information threats and any incidences of the information getting to unauthorized individuals or use of information for malicious reasons (Moody et al., 2018). The policies and procedures will be reviewed to see whether they comply with all the relevant laws and guidelines provided. In case the policy is not effective then there will be need for modification of the policy.
Procedures for modification
If the ISP is not working as desired then there will be need for modification which will be done by the Information Technology (IT) team in the organization. During the annual review the threats and risks together with their weight and significant impact on the policy will be analyzed. Once this is done the needed modifications will be identified by the IT team. The modifications and updates will be done according to how significant the risks and threats are. The modifications will be made by the IT team and the modified policy submitted to the IT management and the ISO for review (Sharma & Warkentin, 2019). Once the policy is deemed to have incorporated all the changes it will be available to the employees and the concerned stakeholders. The employees can access the ISP policy through their portals and also within the organization when need be.
References
Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information
security policy compliance. MIS quarterly, 42(1).
Sharma, S., & Warkentin, M. (2019). Do I really belong?: Impact of employment status on
information security policy compliance. Computers & Security, 87, 101397.
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident