CS-507 (CS507) Information Systems, Assignment # 5 Solution by VUsolutions
Wednesday, June 10, 2009 Posted In CS and IT Edit This|     1. mSCOPE  |   
|     Information security  |   
|     means protecting information and information systems from  |   
|     unauthorized access, use, disclosure, disruption, modification or destruction.  |   
|     The terms information security, computer security and information assurance are  |   
|     frequently incorrectly used interchangeably. These fields ar e interrelated often and share  |   
|     the common goals of protecting the confidentiality, integrity and availability of  |   
|     information; however, there are some subtle differences between them.  |   
|     These differences lie primarily in the approach to the subject, the methodologies used,  |   
|     and the areas of concentration. Information security is concerned with the confidentiality,  |   
|     integrity and availability of data regardless of the form the data may take: electronic,  |   
|     print, or other forms.  |   
|     Governments, military, corporate, financial institutions, hospitals, and private businesses  |   
|     amass a great deal of confidential information about their employees, customers,  |   
|     products, research, and financial status. Most of this information is now collected,  |   
|     processed and stored on electronic computers and transmitted across networks to other  |   
|     computers.  |   
|     Should confidential information about a businesses customers or finances or new product  |   
|     line fall into the hands of a competitor, such a breach of security could lead to lost  |   
|     business, law suits or even bankruptcy of the business. Protecting confidential  |   
|     information is a business requirement, and in many cases also an ethical and legal  |   
|     requirement.  |   
|     For the individual, information security has a significant effect on privacy, which is  |   
|     viewed very differently in different cultures.  |   
|     The field of information security has grown and evolved significantly in recent years. As  |   
|     a career choice there are many ways of gaining entry into the field. It offers many areas  |   
|     for specialization including, securing network(s) and allied infrastructure, securing  |   
|     applications and databases, security testing, information systems auditing, business  |   
|     continuity planning and digital forensics science, to name a few. 
  |   
|     2. Objective  |   
|     An Information Security Policy usually has the following objectives:  |   
|     To protect the organization's business information and any client or customer  |   
|     I.  |   
|     information within its custody or safekeeping by safeguarding its confidentiality,  |   
|     integrity and availability.  |   
|     To establish safeguards to protect the organization's information resources from  |   
|     II.  |   
|     theft, abuse, misuse and any form of damage.  |   
|     To establish responsibility and accountability for Information Security in the  |   
|     III.  |   
|     organization.  |   
|     To encourage management and staff to maintain an appropriate level of awareness,  |   
|     IV.  |   
|     knowledge and skill to allow them to minimize the occurrence and severity of  |   
|     Information Security incidents. 
  |   
|     3. Responsibilities  |   
|     •  |   
|     Monitor to a reasonable level the use of the computer so as to detect breaches of  |   
|     the system's security. In the event of a serious breach being detected, especially if  |   
|     network security may have been compromised, CSD should be alerted so  |   
|     institutional corrective measures can be taken.  |   
|     •  |   
|     All user ids on departmental computers must be provided to the CSD to enable  |   
|     such users to be traced.  |   
|     •  |   
|     Ensure that each registered user is only allowed access to positively authorized  |   
|     facilities; the default on all computers should be to bar access.  |   
|     • •  |   
|     Ensure that all software and/or data that are accessed via the computer are  |   
|     •  |   
|     properly licensed for such access. 
  |   
|     4. Implementation.  |   
|     To aid departments who have a real need to run their own computers in this way the CSD  |   
|     will:  |   
|     Provide a designated contact to liaise with departmental system administrators.  |   
|     •  |   
|     Operate a closed security mailing list that is regularly updated with the latest  |   
|     •  |   
|     national and international information on hacking attempts, tools, etc. All  |   
|     departmental system-administrators who are properly appointed and are recorded  |   
|     as such with the CSD will be included in this list.  |   
|     Provide regular training, advice and support to the designated departmental  |   
|     •  |   
|     system administrators.  |   
|     Assist a departmental system-administrator to correct a security loophole or  |   
|     •  |   
|     breach, especially where the integrity of the University network may be at risk.  |   
|     Periodically carry out checks, of its own and other network connected computers,  |   
|     •  |   
|     using tools provided by the industry or similar to those known to be available to  |   
|     would be hackers. This will be done to search for the various types of security  |   
|     problems that might exist.  |