Wednesday, July 17, 2019

The thrust of the Computer Security Plan

The thrust of the discipline processing arranging certificate Plan part of the art Plan is to ensure that the information brasss to be deployed by the comp whatsoever testament be in line with of the strategic relegation and vision of the company. In order to meet that the information applied science infrastructure and resources depart meet the requisite requirements of every strategic, tactical and operational plan, the company decided to divide on the right footing by adapting the standards contained in the ISO/IEC 177992005 or specifically know as the Information Technology earnest Techniques Code of Practice for Information Security Management. By purchasing the ISO 17799 Toolkit, the company bath conjoin the roadmap for a much deposit information systems environment, implement the policies contained in the toolkit, and in the end obtain ISO 17799 certification to add more value to the consulting occupation.Specifically, the company provide ab initio address the following aras that require speedy attention1. drug user trademark methods and policies This will be ground on class 11.1.1 of ISO 17799 wherein, An get at control policy should be established, authenticated, and reviewed based on business and security requirements for entrance. overture control rules and rights for each user or group of users should be clearly utter in an access control policy. entrance money controls are both logical and somatogenic and these should be considered together. Users and service winrs should be assumption a clear statement of the business requirements to be met by access controls.2.Desktop policies This will be based on Sections 11.3.2 neglected user equipment and 11.3.3 Clear desk and clear filmdom policy wherein, Users should ensure that unattended equipment has curb protection. All users should be made conscious(predicate) of the security requirements and procedures for protecting unattended equipment, as well as their respon sibilities for implementing much(prenominal)(prenominal) protection. Users should be talk over to terminate active sittings when finished, unless they tin can be guaranteed by an appropriate fix mechanism, e.g. a password protected concealing saver log-off mainframe computers, servers, and office PCs when the session is finished secure PCs or terminals from unauthorised use by a winder lock or an equivalent control. A clear desk policy for papers and obliterable storage media and a clear diffuse policy for information processing facilities should be adopted.3.Remote user authentication methods and policies This will be based on Section 11.4.2 User authentication for external users of ISO 17799 wherein, Appropriate authentication methods should be used to control access by distant users. Authentication of remote users can be achieved use, for example, a cryptological based technique, hardware tokens, or a challenge/response protocol. Possible implementations of such techn iques can be found in various virtual private communicate (VPN) solutions. Dedicated private lines can withal be used to provide toast of the source of connections. Dial-back procedures and controls, e.g. using dial-back modems, can provide protection against unauthorized and unwanted connections to an organizations information processing facilities. This type of control authenticates users onerous to establish a connection to an organizations lucre from remote locations.4. tidings policy This will be based on Section 11.3.1 Password use of ISO 17799 wherein, Users should be required to follow good security practices in the plectron and use of passwords. All users should be advised to keep passwords confidential avoid retention a paper or software record of passwords, unless this can be stored unwaveringly and the method of storing has been approved change passwords whenever in that location is any indication of possible system or password compromise assign quality passwo rds with sufficient minimum duration which are easy to remember not based on anything somebody else could easy guess or obtain using person related information not vulnerable to dictionary attacks free of resultant identical, all-numeric or all-alphabetic characters change passwords at uniform intervals or based on the issuing of accesses, and avoid re-using or cycling elder passwords change temporary passwords at the start-off log-on not include passwords in any automated log-on process, not use the self corresponding(prenominal) password for business and non-business purposes.5.Communication process for email, secure file exchange via email This will be based on Section 10.1.1 Documented operating procedures of ISO 17799 wherein, Operating procedures should be documented, maintained, and made available to all users who essential them. Documented procedures should be prepared for system activities associated with information processing and communication facilities, such as computer start-up and close-down procedures, backup, equipment maintenance, media handling, computer live and mail handling management, and safety. Operating procedures, and the documented procedures for system activities, should be treated as formal documents and changes authorized by management. Where technically feasible, information systems should be managed consistently, using the same procedures, tools, and utilities.To further manage the information technology infrastructure and resources, the plan calls for the adoption of the best-of-breed address by way of making original that the building blocks of information security (Shaurette 2002) are fully exploited. These building blocks include the optimal use of security policies, authentication, access control, anti-virus/ suffice filtering systems, virtual private networking (VPN)/encryption methodologies, pic services consulting, intrusion protection system, and macrocosm key infrastructure (PKI)/certification governme nt activity (CA)/digital signatures systems. This is considered to be the first metre towards finding a technique for framework and evaluating the security of a system (Stjerneby 2002).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.