100% (1)
page:
4 pages/≈1100 words
Sources:
6
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 25.92
Topic:

Elements of A Well Designed Information Security Policy

Research Paper Instructions:

Module 2 - Case
INFORMATION SECURITY SYSTEM PLANNING
Based on the reading materials at background section and your own research, prepare a 4-7 page paper to describe what an well designed information security policies should include. Get your insight from
The information security model provided by ISO and NIST
Information security system best practice case
Assignment Expectations
Your paper should provide a summary of your findings from the assigned materials and any good quality resources you can find. Please cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular:
Ability to consolidate ideas from reading materials.
Demonstration of your understanding on creating the process of information security policies and guidelines
The ability to express your ideas clearly.
Upload your paper when it is done.
Module 2
Required Reading
Information security policies
Information security policy, standard, or guideline? SANS information securiy policy template
Information security best practice
Princeton information security policy
George Washington University information security policy
University of Washington Medicine information security policies
Information security blueprint/models
ISO 27000 series International organization for standardization (ISO) and the international electrotechnical commission (IEC).
More on ISO 27000 series
ISO 27000 series provide general framework for information security management. However, many US organizations adopt guidelines from published by National Institute for Standards and Technology (NIST).
The best guides for information security management (NIST)
The Open Source Security Testing Methodology Manual (OSSTMM)
NIST Special Publications
NIST SP800-100 Information Security Handbook: A Guide for Managers
NIST SP800-44 Guidelines on Securing Public Web Servers
NIST SP800-45 Guidelines on Electronic Mail Security
NIST SP800-81 Secure Domain Name System (DNS) Deployment Guide
NIST SP800-48 Wireless Network Security (802.11, Bluetooth, and Handheld Devices)
NIST SP800-92 Guide to Computer Security Log Management
NIST & DISA Checklists
UNIX Security Checklist
Standard of Good Practice (SoGP)
ISO17799
Conclusions
Site security handbook published by the Internet Engineering Task Force (IETF)
Information security education and training
Information security awareness, training, and education
Information security awareness report: government workers' perspective
Contingency planning
Incident response plan
Five tips for building an incident response plan
Incident response plan example
Disaster recovery plan
Disaster recovery plan
More on disaster recovery
Business continuity plan
Business continuity plan
How to build a business continuity plan
Optional materials
Develop & Deploy an Air-Tight Security Policy. Retrieved on March 18, 2013, from http://www(dot)youtube(dot)com/watch?v=4g0XNTfkBv0

Research Paper Sample Content Preview:

Elements of A Well Designed Information Security Policy
Name:
Instructor:
Institution:
Date:
Introduction.
The primary aim of information security policies is to combat threats. It is the threat to information systems that necessitate the design and implementation of such policies. None would exist in the absence of the other. The ever-present impact of threats to information has made it mandatory that there is indeed a design, implementation, and enforcement of the policies formulated. Such policies ensure that everyone within the organization behaves in a particular manner that is in line with the requirements of the policy statements. This paper evaluates the elements of an effective and efficient information system policy. It covers management commitment and the general outline for the formulation of such policies.
Discussion
The first thing that a well-designed information security policy consists of is the objectives or the goals it intends to address. Secondly, it has the strategies that would be taken or implemented so as to achieve these outlined goals. An information system that has a nonexistent or weak security policy would just be patch-up efforts against threats. It is only through a well-designed or drafted set of policies, that all the measures can be condensed and assembled into one efficient system of combating the ever-present threats. This would, in turn, impact positively on the overall business of the organization (Vacca, 2013).
There is also the need to utilize current sets of elements and have a clear training procedure for the staff to the new changes. This is known as security training. Obsolete standards and training materials or guidelines are quite risky, as they can quickly make the management of the organization to have a false belief that they have a functional set of policies (Greene, 2014). It then makes them believe that the organization is running more efficiently than it is. To ensure that they eliminate such a false sense of security, organizations through their management teams need to check and test the policies and procedures periodically. In this manner, they can deal away with those that are outdated and ineffective.
As a primary requirement, an effective security policy should have a breakdown of the duties and responsibilities of each personnel thereof. The stipulation of the roles of each individual and staff or management helps to ensure accountability at all times, as far as security of information is concerned. The policy, therefore, needs to specify the type of information that can be accessed by what type or level of personnel. Assigning of security clearance levels is an important aspect of an effective policy (Bayuk, 2009).
Such a policy should also have procedures on incident handling as well as response. In other terms, it needs to have the procedures to follow in the case of a security breach in the organization's systems. This ensures that there is an alternative or fallback option during such emergencies (Bayuk, 2009).
It should also have a clear outline of the nature of physical security. For instance, the policy should dictate the methods in which individual buildings, or parts of the building, or safety procedures like card readers, are to be handled. It also dictates how other security aspects such as passwords, firewalls, antivirus, and accessibility, should be managed (DuBrock, 2009).
To remain updated, they can use the other option of sunsetting. This is the closing or shutting down of redundant operations and procedures in business, or simply phasing out some procedures. This can be done by just setting a fixed time limit of operation for each pr...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!