Friday, March 8, 2019
Information Security Policy Essay
1. Executive Summary ascribable in Week  ix Write 3 to 4 paragraphs  gravid a bottom-line summary of the  special(prenominal) measureable goals and objectives of the  certification  purpose, which  ordure be   physical exercise to define optimal  pledge architecture for the selected   backing concern scenario.The goal of this  aegis  insurance policy is to lay  appear a basic  mean for a secure information   trunk to be used by  elevation  stick out Group. This policy  result  comfort the  connections  bodys from threats that can  tally from humans and from  inherent disasters as well. The policy  get out  besides put into consideration the privacy, reputation,  intellect property and productivity of the  anthesis purpose Group. The continued operation of this  connection dep lasts on being able to  introduction and use resources within the  presidency and being able to  removed(p)  memory  approaching with security. Each  someones role in the company  get out be considered and  enam   or  advance  result be  march onn to ensure the efficient operation of the business, while  non giving access to those who  atomic number 18  non  received. This policy  go away also   answer oneself in the companys adherence to any governmental regulations.  whatsoever disruptions of  dish up or security related issues  pass on be dealt with  straight stylus by means of system software that is automated to handle  current threats. More serious issues  bequeath be dealt with by the IT staff whose  responsibility it is to oversee the everyday operation of the information system.2. IntroductionDue in Week One Give an overview of the company and the security goals to be achieved.2.1.  alliance overviewThe Bloom  spirit Group is a company that offers interior  be  afterwards service to businesses and individuals around the world. There  incarnate office is  dictated in  rude(a) York with a secondary office in Los Angeles for handling  trading operations on the West coast. They  corrobor   ate a web site that offers their  guests the  readiness to work up their designs online and then purchase them through a electronic order processing system.  alike, the designers use secure logins and passwords to access the web site. A  blown-up number of the workforce work remotely possibly   exploitation tablets or ipads connected to secure VPNs or Virtual Private Networks.2.2.  security system policy overviewBloom Design radical already provides secure logins and networks to their employees so they already  concur some  grammatical case of system setup already. However, this does not mean it is a system that works efficiently. I think the appropriate security policy to implement for this project would be system specific.2.3.  gage policy goalsAs applies to your selected scenario, explain how the confidentiality, integrity, and availability  beliefs of information security  allow be addressed by the information security policy.2.3.1. ConfidentialityThe policy I plan to implement     pull up stakes help to protect information by reviewing how the company stores  pure information such as employee and client records,  business secrets, and other  excitable data.2.3.2. IntegritySince the company will be  victimisation passwords and secure logins the system will not be accessible to the public. So the primary focus should be on the employees.  enfranchisement and verification can be done using a data log to  aliment records of employees activity while on the companys VPN. Also, the use of a firewall will help with integrity as it will pr effect employees from unknowingly accessing damaging websites.2.3.3. AvailabilityThe policy I plan to use will help with back-up and  date fromy by the possible use of cloud  repositing or a central data storage c submit. Although they are already using secure logins for access  view as the whole system  postulate to be reviewed. This is to make sure only  go byd personnel  put one  cross shipway access to sensitive areas.3. Disast   er  convalescence  seeDue in Week Three For your selected scenario,  tell the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for  assaying the DRP.3.1. Risk Assessment3.1.1. Critical business processesThe mission-critical business systems and services that must be  protect by this DRP are Payroll, Human   selection selective information, POS  stand-in media, and Web Servers and their services.3.1.2. Internal, external, and environmental risksExamples of internal risks that may affect business are  wildcat accessby individuals who are employed by the company, and those who arent employed by the company but still have access to individual stores computer systems, applications, or areas where the  legions and backup media are located. Other external and environmental risks include fire, floods, power outages, computer hardware failure, software glitches and failure, storms, and other acts of nature.3.2. Disaster Recovery StrategyMost cases, hav   ing an alternative site (a hot site, or cold site depending on the disaster) would be the correct way of dealing with most disasters. With Bloom design  collection I think having a warm site facility would be the best option. Warm sites are cheaper than hot sites but require   more(prenominal) effort. On the other hand, they are more expensive than cold-site facilities but  slight labor intensive and more likely to be effective in a disaster. Also, having a backup and retention site to work from, and recover from for the main servers and web services is a good idea.3.3. Disaster Recovery Test PlanFor  for  all(prenominal) one testing method listed, briefly  specify each method and your rationale for why it will or will not be included in your DRP test plan.3.3.1. Walk-throughsThis test plan would be a  gigantic way for the key personnel to come together and formulate a plan of action in the  fifty-fiftyt of an emergency. Due to Bloom Design  collection being spread crosswise a large    area it might require some  movie conferencing and traveling on the part of some employees.3.3.2. SimulationsI think this test plan is the most effective when compared to the others. Simulating an actual emergency is a great way for people to get used to  operate in a critical time under pressure. This will show you where your people have their strengths and weaknesses when trying to recover from a disaster.3.3.3. ChecklistsThis passive type of testing would be a good system to implement on a hebdomadary or monthly basis depending on the needs of the company. This will help in detecting problems before they become a major issue.3.3.4.  latitude testingSince Bloom Design group is updating their security parameters and do not have an equal type of system already implemented parallel testing would not be appropriate for this security policy.3.3.5.  replete interruptionI think this is another very effective way to test the system in the event of an emergency. However, to minimize incon   veniences to the customers it would have to be done during off hours.4. Physical  bail PolicyDue in Week Five Outline the Physical  bail Policy. Merkow and Breithaupt (2006) state, an often overlooked connection  surrounded by physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure (p.165).  portray the policies for securing the facilities and the policies of securing the information systems. Outline the  misrepresents mandatory for each category as relates to your selected scenario. These controls may include the  nextPhysical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas)  expert controls (such as smart cards, audit trails or access logs, intrusion detection,  appall systems, and biometrics) Environmental or life   -safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning)4.1. Security of the building facilities4.1.1. Physical entry controlsAt the two office locations (Los Angeles, New York) for Bloom Design Group I would use employee badges that double as an electronic key to access the building and other sensitive locations. This will work in conjunction withan access control system that limits  door/exit to the offices through one main entrance. There will be an employee entrance as well also to be accessed by an electronic badge.4.1.2. Security offices,  populates and facilitiesFor the security offices I would implement biometric scanners  due to the sensitive equipment inside. Other rooms and facilities of a sensitive nature will  hold electronic badges with a photo and name of the employee.4.1.3. Isolated delivery and  core areasFor these areas I would implement electronic key card access with the use of a CCTV system recording to a DVR.    With a CCTV camera located on the driver door in the loading area the person responsible for deliveries will know when a delivery is being make and can observe he outside environment before  enterprisingness the door.4.2. Security of the information systems4.2.1. Workplace protectionFor this part of the security policy I would utilize pre-employment screening and mandatory vacation time. This  clogs people from  concealment illegal activities while performing their duties. Also, I would setup privileged entity controls so operators and system administrators have special access to computing resources.4.2.2. Unused ports and cablingFor  bracing ports I would use a piece of security equipment that can be plugged into the unused port and can only be  remove by someone with a special key. This will help prevent unauthorized access into the network. For unused cabling I would secure it in a secure storage room which can only be accessed by authorized personnel. If the above mentioned equi   pment isnt available then the port should be removed.4.2.3. Network/server equipmentBeing that this is some of the most critical equipment for business operations I would use biometric locks and scanners on any room thatcontains this equipment. Also these rooms will be environmentally controlled with air conditioners and dehumidifiers to allow the equipment to  turn at peak efficiency.4.2.4. Equipment maintenanceSince a lot of the equipment is spread across a large region I would utilize remote  converse connections to troubleshoot issues. If the maintenance need is more severe than I would have a small centrally located facility that specializes in assessing and repairing malfunctioning equipment.4.2.5. Security of laptops/roaming equipmentFor laptops and roaming equipment I would install all devices with a GPS tracker and encryption software to protect against unauthorized access. The equipment itself would be stored in a secure storage room with access being tightly controlled.5.     adit Control PolicyDue in Week Seven Outline the  entre Control Policy. Describe how access control methodologies work to secure information systems5.1. AuthenticationAuthentication credentials permit the system to verify ones  credit credential. Authenticating yourself to a system tells it the information you have established to prove that you are who you say you are. Most often, this is a simple password that you set up when you receive the privilege to access a system. You may receive an  designate password initially with the requirement that you must reset it to something more  face-to-facesomething that only you can remember. However, passwords are the easiest type of authentication to beat. Free and wide available programs are available on the Internet to break the security afforded by passwords on most of the  coarsely used systems.With two or three factors to authenticate, an information  possessor can gain confidence that  exploiters who access their systems are indeed au   thorized to access their systems. This is accomplished by adding more controls and/or devices to the password authentication process. Biometric scanning uses unique human characteristics to  chance upon whether the person trying to gain access is authorized to enter or not. One  harshapproach to managing IDs and passwords is to create a password or PIN vault. These programs use secure methods to locally store IDs and passwords that are protected by a master password that unlocks the vault when its needed.5.2. Access control strategy5.2.1. Discretionary access controlThe discretionary access control system will be used for Bloom Design Group because this is the favored approach in the corporate environment and due to the wide area of operations this will allow several authorized users to have access to the system at any given time. The principle of least privilege is the predominant strategy to assure confidentiality. The objective is to give people the least amount of access to a sy   stem that is needed to perform the job theyre doing. The need-to-know dictates the privilege (authority) to perform a  performance or access a resource (system, data, and so forth). An information owner is one who maintains overall responsibility for the information within an information system. For the Bloom Design Group the information owner is going to be the corporate head of IT operations.5.2.2. Mandatory access controlIn a system that uses mandatory access control (MAC also called nondiscretionary access control), the system decides who gains access to information  found on the concepts of subjects, objects, and labels, as defined below. Since the Bloom Design Group is spread out over such a large area I do not think this is the best  weft for this scenario. MAC is better suited for military or governmental systems.5.2.3. Role-establish access controlRole-based access control (RBAC) groups users with a common access need. You can assign a role for a group of users who perform    the same job functions and require similar access to resources. This would also be appropriate for this scenario because it will allow the information owner to  slowly assign access to certain groups such as designers, office personnel, customer service associates and so forth.5.3. Remote accessRemote Access Dial-In  user Service (RADIUS) is a client/server protocol and software that enables remote access users to communicate with a centralserver to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to set up a policy that can be  utilise at a single administered network point. Having a central service also means that its easier to track usage for billing and for  holding network statistics. A virtual private network (VPN) is another common means for remote users to access corporate networks. With a VPN, a user connects to the Internet via his or her ISP and initiates a connection to the protected network (often using a    RADIUS server), creating a private tunnel between the end points that prevents eavesdropping or data modification.6. Network Security PolicyDue in Week Nine Outline the Network Security Policy. As each link in the chain of network protocols can be attacked, describe the policies covering security services for network access and network security control devices.6.1. Data network overviewDue to the large geographic distances between Bloom Design Group offices a WAN is going to be utilized. WAN covers a larger geographic area than a local area network (technically, a network that covers an area larger than a single building). A WAN can span the entire nation or even the globe using satellites.6.2. Network security services6.2.1. AuthenticationAccess to documents can be restricted in one of two ways by asking for a username and password or by the hostname of the web browser being used. For Bloom Design Group employees will need to enter a user ID and password to access restricted docume   nts and sites.6.2.2. Access controlUnlike authentication, which is security-based on the users identity, restricting access based on something other than identity is called access control. For Bloom Design group access control to physical locations will be done by controlled by electronic badges. More sensitive areas such as the server rooms will utilize biometric scanners.6.2.3. Data confidentialityThis service protects data against unauthorized disclosure and has two components content confidentiality and  means flow confidentiality. For Bloom Design group all messages transmitted and received through company offices will be encrypted to prevent the unauthorized viewing of sensitive company documents.6.2.4. Data integrityThe goal is to protect data from accidental or  malevolent modification whether during data transfer, data storage, or from an operation performed on it, and to  keep up it for its intended use. For Bloom Design Group the only people who will be authorized to make    changes or modifications will be the  school principal of the IT department and anyone else they deem necessary.6.2.5. NonrepudiationA service guaranteeing that the sender of a message cannot deny having sent the message and the receiver cannot deny having received the message. I do not think this will be necessary for Bloom Design group. However, if it does then the proper modifications can always be made.6.2.6.  enter and monitoringThese services allow IS specialists to observe system activity during and after the fact by using monitoring and logging tools. These include operating system logs, server records, application log errors, warnings, and observation of network, switch and router  merchandise between network segments. I do not think this will be necessary for Bloom Design Group as a whole. However, it will be utilized for any programs having to do with the servers due to its sensitive business content.6.3. Firewall systemOutline the roles of the following network security    control devices and how these basic security infrastructures are used to protect the companys network against malicious activity. Provide a description of each type of firewall system and how it is used to protect the network. Include how the firewall system is or is not applicable to the companys network configuration in your selected scenario.6.3.1. Packet-filtering router firewall systemThe most common Internet firewall system consists of nothing more than a packet-filtering router deployed between the private network and the Internet. A packet-filtering router performs the typical routing functions of forwarding  trade between networks as well as using packet-filtering rules to permit or deny traffic.6.3.2. Screened host firewall systemThe second firewall  caseful employs both a packet-filtering router and a bastion host. This firewall system provides higher levels of security than the previous  simulation because it implements both Network-Layer security (packet-filtering) and    Application-Layer security (proxy services). Also, an intruder has to penetrate two  fragmentize systems before the security of the private network can be compromised. This will be the option chosen for Bloom Design Group based on needs and cost. Since Bloom Design group is not a governmental or military related company then it doesnt require the most elaborate form of firewall protection.6.3.3. Screened-Subnet firewall systemThe final firewall example employs two packet-filtering routers and a bastion host. This firewall system creates the most secure firewall system, as it supports both Network-Layer and Application-Layer security while defining a demilitarized zone (DMZ) network.7. References pay heed all your references by adding the pertinent information to this section by following this example. American Psychological  friendship. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC Author.Information Security Principles and Practices   , by Mark S. Merkow, CISSP, CISM and Jim Breithaupt.  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.