Outline for Security Program Management Tabletop Exercise Method

Verified

Added on  2022/08/12

|9
|669
|25
Report
AI Summary
This document provides an outline for a security program management tabletop exercise, focusing on configuration and patch management methods, including documentation and identification of changes, rationale or justification, assessment of potential changes and impact, testing processes, system documentation updates, communication of changes, contingency plans, and documented review and approval. It also details an incident response plan with phases for assembling a team, detecting and ascertaining the source, containing and recovering, assessing damage, notification, and preventing future incidents. Furthermore, it covers email security awareness training, emphasizing awareness of links, attachments, scams, and spear phishing, and a disaster recovery plan including inventory, downtime tolerance, responsible personnel, and communication plan. The plan aims to protect company data and mitigate threats, ensuring data confidentiality, integrity, and availability.
Document Page
P A RT 2 .
O U T L I N E F O R A
S E C U R I T Y P R O G R A M
M A N A G E M E N T TA B L E T O P
E X E R C I S E
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
METHOD FOR
CONFIGURATION AND PATCH
MANAGEMENT.The methods for configuration and patch management
are including:
Documentation and identification of changes.
Rationale or justification.
Assessment if potential changes and impact that
include criticality and implications of security.
Testing processes for ensuring the changes are
functioning as intended.
Updating all of the system documentations those are
appropriate upon the completion of significant changes.
Document Page
CONTD.:
Communication of important changes as well as
the planned schedule of them to the
stakeholders by utilizing a standard template.
Contingency or rollback plan.
Documented review as well as approval by the
authority of designated change control.
Document Page
INCIDENT RESPONSE PLAN:
The incident response is basically a structured methodology that is
used for handling the security breaches, security incidents as well as
cyber threats. An incident response plan that is well defined allows
an organisation to minimize and identify the damage as well as it
helps in reducing the cost of a cyber attack. The phases of incident
response plan are as follows:
Assembling a team.
Detect and ascertain the source
Contain and recover
Assess the damage and severity
Begin the notification process
Start immediately for preventing the similar type of incident in
future.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
EMAIL SECURITY
AWARENESS TRAINING:
The email security training is basically a program of security
awareness which helps the employees of an organisation to deal
with different types of attacks of email borne. The training should
include about links, attachments, scams and spear phishing.
The threats can be sent as attachments, the employees have to
aware about the attacks.
The attacks can also be done by sending vulnerable links. The
employees have to be ensure that the link is safe before opening.
The employees need to be aware about any money related scams
or invitation sent via emails.
The employees have to understand that the hackers can target
specially to their organisation.
Document Page
DISASTER RECOVERY PLAN:
The disaster recovery plan is basically a structured and
documented approach which describe how the
organisation can resume their work quickly after an
unplanned incident. It is one of most essential part of
BCP (business continuity plan). The plan includes:
Inventory hardware and software
Define the tolerance for downtime and data loss
Lay out the responsible person as well as identify
backup personnel
Create a communication plan
Document Page
CONCLUSION:
Thus, it can be concluded that the information
security plan is basically a documentation of a plan of
an organisation. The plan is used for protecting the
company data and information as well as the personal
information that are sensitive. The plan is having the
ability to mitigate the threats that are against an
organisation and it helps an organisation to protect
confidentiality, integrity as well as availability of data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES:
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs
more holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines
for effective information security management. Auerbach Publications.
Ortmeier, P. J. (2017). Introduction to security. Pearson.
Pereira, T., Barreto, L., & Amaral, A. (2017). Network and information security challenges
within Industry 4.0 paradigm. Procedia manufacturing, 13, 1253-1260.
Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity
based model to reduce information security insider threats in organisations. Journal of
information security and applications, 40, 247-257.
Document Page
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]