This document provides an overview of computer security, including the importance of data protection, IT security policies, and IT security standards. It also discusses regulatory compliance for IT security and provides recommendations for safeguarding data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: COMPUTER SECURITY Computer Security Name of the student: Name of the university: Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1COMPUTER SECURITY Table of Contents Security policy framework.........................................................................................................2 List of 5 threat policies:..........................................................................................................2 IT security standards..................................................................................................................6 2-3 IT security standards with explanation............................................................................7 Regulatory Compliance for IT security................................................................................10 Recommendation:....................................................................................................................10 Conclusion................................................................................................................................11 References:...............................................................................................................................12
2COMPUTER SECURITY Security policy framework Definition: The most valuable asset in today’s world is data and for these reason only it is important to maintain security of data. Data breach and failure in providing security measures can result into an economic risk across the world. Thus considering the importance of maintaining security of the nation and its economy, an executive order was released by the president ofUnited States in order to take measures of reducing the cyber threats. (Atoum, Otoom and Abu Ali 2014). A Cyber safety framework help san organisation to well understand, achieve and decrease the cyber security jeopardies. It assists in decisive activities that are most significant to assure serious processes and facility delivery, in turn it helps in prioritizing the investments and helps in maximizing the impact of each dollar spent on cyber security (Piro, Boggia and Grieco 2014). It consequences from a shift of agreement to actions and species outcomes by providing a shared language to discourse cyber security risk administration. A cyber security framework is a type of guidance that is achieved voluntarily based on the existing standards, practices and guidelines of organisations to better manage security risks. List of 5 threat policies: While signing contracts with clients it is often seen that IT security policies are the major concern. In most of the cases problem arise of having an out dated IT security policy or either having a policy that is not in place with the desired IT policy frameworks. For understanding the purpose of foundation of data governance there are some top-level IT security policies which needs to be followed. Among those top IT security policies 5 of them are mentioned below: 1.AUP (Acceptable Use Policy):
3COMPUTER SECURITY This IT threat policy is meant for making users inform about the acceptability of the use if technologies. Acceptable Use of Policy is a platform for all employees which has the purpose to assure the rules that needs to be followed while following the roads of Internet Technology. This policy covers almost all corporate resources includinghostcomputers,applicationservers,mailservers,fileservers, communication servers, fax servers and various computer networks (Isaacset al. 2014). Following this policy requires to consult the legal department of the specified company in order to create and publish the policy to create an impact on the corporation. The standard of following the Acceptable Use policy may differ from company to company. Some of the sub policies that needs to be followed under the AUP policy this includes: Access No expectation of privacy Responsibility of passwords Legitimate business purpose Communication of trade secrets 2.DR/BCP The Disaster Recovery, Business Continuity Plan policy helps in assuring that the business has a real time risk management facility. The policy includes retorting to denial of service attacks, fires, deluges, hurricanes or any supplementary types of potential disruption attacks to services (Alshammari and Alwan 2016). The policy of business continuity seeks in keeping the business running in every situation and thus
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4COMPUTER SECURITY results in redundancy of systems and personal plans. The disaster recovery policy helps in recovering the plan from disruptive attacks in services. Some of the sub policies that needs to be followed under this policy are listed from the SunGard: Recovery tasks- This sub policy provides a list of specific activities in order to recover and to support each of the strategies that are outlined in this section. Personal Recovery- This sub policy includes identifying specific peoples that are involved in the continuity plan of the business. Timeline plan- This sub policy includes a main body that lays out the steps that are needed for carrying out the activity plans. Critical resource requirements- This part of the policy includes detailed requirements of the resources in the basis of quantity. 3.Change management: This type of IT threat policy helps in assuring that the changes in the organisation are managed, tracked and approved. This policy also helps in identifying that whether the systems are updated, replaced or modified (Doppelt 2017). In case if a firewall is implemented within a company’s software with out following the policy of change management then it may lead to ceasing of traffic of the business causing unexpected data loss (Trautman 2015). The change management policy helps in slowing down of the business process making a perfect plan to assure that the change and its potential creates an impact on the system of the corporate. The policy of change management includes all the external vendors and personnel who are given the access for defining, designing and production of software and systems. Change in management includes some sub policy which includes –
5COMPUTER SECURITY Managingofidentityandreviewingofinfrastructurenetworksandits associated risks and vulnerabilities. The policy includes some network topologies that maintains and describes the connection points, hardware components and services 4.Information security The information security IT policy lays the foundation of the risk management programs within an enterprise including its process, technologies and people. The informationtechnologysecuritypolicyservesasthepurposeofdefiningthe management, technology and personnel within the structure of the program (Mbowe et al.2014). The most important aspect of this policy includes defining roles of the IT manager or the security analyst, by defining the aspects of environment and its scope and the responsibilities of the employees and its organization. Some of the sub policies of the Information security policy includes- System Access Control Password policy User ID Insurance for Access to corporate information Anonymous User IDs Information Access. 5.Remote access The main determination of the IT security policy is to define the standards for connecting the network of the company from any host (Braun 2015). These standards are created to minimize the potential damages of the company from getting exposed resulting in un-authorized use of the resources of the company (Safa, Von Solms and Furnell 2016). The policy is applied to all the employees, vendors, and agents within the company connecting to other work stations of the company’s network.
6COMPUTER SECURITY The sub policies under this policy includes- Responsibility of employees, contractors’ agents and vendors of the company to ensure the remote access of the company’s network with the on-site users of the company (Zomers 2014). The policy also includes not permitting the access to internet for recreating the household members via network of the company (Kalaiprasath, Elankavi and Udayakumar 2017). The policy also includes that no employees of the company should provide their email id or passwords to any of the members of the company. IT security standards It is important to maintain some IT security standards while developing the guidelines for implementing the IT security policies in the IT projects. IT security standards are techniquesthatarepublishedinattempttosafeguardthecyberenvironmentofany organisation. 2-3 IT security standards with explanation Standard 1: ISO/IEC 2700011:2013: The ISO/IEC 2700011:2013 standard of information security for managing systems includes ten short clauses along with a long annex. This certification can be applied to any accredited certification body but before applying this standard in any certification process, the organisation needs to go through a formal process of auditing. The standard adopts a process-oriented approach for establishing, operating, maintaining, monitoring and implementing the Information Security Management System. Advantages:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7COMPUTER SECURITY The ISO/IEC 2700011:2013 standard provides a framework for managing the security system of a company. It has the following advantages: It protects the information of the clients and the employees. It effectively manages the risks related to te information security. It is extremely beneficial in achieving the compliance with some regulations such as the European Union General Data Protection Regulation (EU GDPR). It also helps in protecting the brand image of the company It also helps in maintain the confidentiality of the information that are stored. The ISO/IEC 2700011:2013 standard also allows the stakeholders and the customers the confidence in managing the risks. It also allows exchange of information securely. The standard also helps in enhancing the satisfaction of the customers improving the retention of the clients. Disadvantages: The drawbacks of theISO/IEC 2700011:2013 standard includes: It has its own design, targets and metrices that needs to be followed. It often misleads the customers Implementing this standard is somewhat time consuming and it has high project costs. The standard is restricted to only businesses. The standard is limited to consumer awareness. Standard 2: NIST special publication 800-171 series The NIST special publication 800-171 series is a report of the computer security addressing the general guidelines and outcomes of research based on the computer securities
8COMPUTER SECURITY that are conducted by the industries, academics and governments (Shackelfordet al. 2015). This standard of security is currently acquired by the Department of Defense with the clause of 252.204-7012. Advantages: The NIST 800-171 standard delivers a set of strategies that helps in processing the needs of the company by safeguarding the information (Johnsonet al. 2016). The requirements that are recommended in this standard are generally consequent from the FIPS publication 200 besides the security control baseline of NIST Special Publication 800-53 (Almuhammadi and Alsaleh 2017). It covers the security control features of the US federal information system. Unlike other security standards, it is one of the first standard to create an impact on the subcontractor in addition to the prime stage contractors. Disadvantages: By complying, it is assumed that organisations will have less risk issues but implementing this standard does not help in measuring the risks. The standard can show directional improvement but is unable to display the improvement of the ROI. Without having a proper report on the level of risk, there is no guidance for the company for the tiers. Standard 3: COBIT 5 This IT security standard stands for Control Objectives for information and technology linked to it. It was developed by the ISACA for IT governance and management. One of the important aspects of the COBIT standard is that it provides a set of controls in order to mitigate the risks (Mangalaraj, Singh and Taneja 2014). In order to compliment the
9COMPUTER SECURITY COBIT standard often the RISK IT framework is used that is developed by the ISACA in order to mitigate all types of cyber threats that are faced while using the IT. Advantages: The advantages of COBIT 5 includes: It helps in maintaining high quality information to support the decisions of the business. It helps in achieving the strategic goals of the business and helps in realizing the benefits of the business through effective innovative use of IT. The COBIT 5 standard also helps in achieving excellence in operation via reliable and efficient application of technology. It also benefits in supporting obedience with applicable laws, agreements, guidelines and plans. Disadvantages: The disadvantages of COBIT 5 includes: It has a complicated concept and structure. It lacks implementation of guidelines and proven benefits. It does not provide a concrete method of guidelines which facilitates the organisation. Keeping the COBIT standard up to date based on the organisational changes is a bit time consuming. Regulatory Compliance for IT security In todays world, with everything being droven by data, it is important to have some IT security compliances in order to secure data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10COMPUTER SECURITY The most common of the regulatory compliances include: 1.GDPR-or in other words General Data Protection Regulation which aims in protecting the citizens from data loss. It is applied to almost every company residing in the EU but can also be applied to other companies. 2.CIA Act-The Central Intelligence Agency Act of 1949 is passed to meet the protection of data through the security of CIA. Recommendation: Cyber threats are the major concerns that are arising in todays world and business organisations are facing most of the cyber threats which often leads to losing of data. Few measures that are recommended for overcoming this cyber threat includes: 1.Understanding the importance of sensitive data 2.Educating the employees about the recent cyber threats like Distributed denial of service attack, phishing, spoofing, ransomware, cracking passwords and many more. 3.It is important that organisations should adopt proper IT security policies following suitable IT security standards. 4.Hardware should be secured by locking down of computers and servers. 5.If needed business organisations need to hire security experts to safeguard the data. Conclusion Thus, from the above report it can be concluded that with the proliferation of data and the types of data that people usually use, it is important to protect the business organisations from the cyber security threats that are emerging now a days. As most of the business organisations are moving to online platforms it has become easier for potential hackers to
11COMPUTER SECURITY reach the customer base and steal credentials from their accounts causing threats like scams and various security risks like denial of service attacks, phishing, ransomware and many more. Thus, business organisations need to tale necessary steps to put an effective cyber security plan using various policies and standards and hence protect the business lines from getting disrupted from getting hacked.
12COMPUTER SECURITY References: Atoum, I., Otoom, A. and Abu Ali, A., 2014. A holistic cyber security implementation framework.Information Management & Computer Security,22(3), pp.251-264. Mbowe, J.E., Zlotnikova, I., Msanjila, S.S. and Oreku, G.S., 2014. A conceptual framework for threat assessment based on organization’s information security policy.Journal of Information Security,5(04), p.166. Trautman, L.J., 2015. Cybersecurity: What about US policy.U. Ill. JL Tech. & Pol'y, p.341. Isaacs, N., Kaminski, K., Aragon, A. and Anderson, S.K., 2014. Social networking: Boundaries and limitations part 2: Policy.TechTrends,58(3), p.10. Alshammari, M.M. and Alwan, A.A., 2016. IT disaster recovery and business continuity based on VMware SRM solution for Kuwait Oil Company (KOC). Braun, B., 2015. Preparedness, crisis management and policy change: The euro area at the critical juncture of 2008–2013.The British Journal of Politics and International Relations,17(3), pp.419-441. Doppelt, B., 2017.Leading change toward sustainability: A change-management guide for business, government and civil society. Routledge. Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations.Computers & Security,56, pp.70-82. Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A. and Herawan, T., 2015. Information security conscious care behaviour formation in organizations.Computers & Security,53, pp.65-78.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13COMPUTER SECURITY Zomers, A., 2014. Remote access: Context, challenges, and obstacles in rural electrification.IEEE Power and Energy Magazine,12(4), pp.26-34. Kalaiprasath, R., Elankavi, R. and Udayakumar, D.R., 2017. Cloud. Security and Compliance-A Semantic Approach in End to End Security.International Journal Of Mechanical Engineering And Technology (Ijmet),8(5), pp.987-994. Shackelford, S.J., Proia, A.A., Martell, B. and Craig, A.N., 2015. Toward a global cybersecurity standard of care: Exploring the implications of the 2014 NIST cybersecurity framework on shaping reasonable national and international cybersecurity practices.Tex. Int'l LJ,50, p.305. Almuhammadi, S. and Alsaleh, M., 2017. Information Security Maturity Model for Nist Cyber Security Framework.Computer Science & Information Technology,51. Mangalaraj, G., Singh, A. and Taneja, A., 2014. IT governance frameworks and COBIT-a literature review. Johnson, C., Badger, M., Waltermire, D., Snyder, J. and Skorupka, C., 2016.Guide to cyber threat information sharing(No. NIST Special Publication (SP) 800-150 (Draft)). National Institute of Standards and Technology. Piro, G., Boggia, G. and Grieco, L.A., 2014, March. A standard compliant security framework for ieee 802.15. 4 networks. In2014 IEEE World Forum on Internet of Things (WF-IoT)(pp. 27-30). IEEE.