CS-507 (CS507) Information Systems, Assignment # 5 Solution by VUsolutions
Wednesday, June 10, 2009 Posted In CS and IT Edit This 1. mSCOPE |
Information security |
means protecting information and information systems from |
unauthorized access, use, disclosure, disruption, modification or destruction. |
The terms information security, computer security and information assurance are |
frequently incorrectly used interchangeably. These fields ar e interrelated often and share |
the common goals of protecting the confidentiality, integrity and availability of |
information; however, there are some subtle differences between them. |
These differences lie primarily in the approach to the subject, the methodologies used, |
and the areas of concentration. Information security is concerned with the confidentiality, |
integrity and availability of data regardless of the form the data may take: electronic, |
print, or other forms. |
Governments, military, corporate, financial institutions, hospitals, and private businesses |
amass a great deal of confidential information about their employees, customers, |
products, research, and financial status. Most of this information is now collected, |
processed and stored on electronic computers and transmitted across networks to other |
computers. |
Should confidential information about a businesses customers or finances or new product |
line fall into the hands of a competitor, such a breach of security could lead to lost |
business, law suits or even bankruptcy of the business. Protecting confidential |
information is a business requirement, and in many cases also an ethical and legal |
requirement. |
For the individual, information security has a significant effect on privacy, which is |
viewed very differently in different cultures. |
The field of information security has grown and evolved significantly in recent years. As |
a career choice there are many ways of gaining entry into the field. It offers many areas |
for specialization including, securing network(s) and allied infrastructure, securing |
applications and databases, security testing, information systems auditing, business |
continuity planning and digital forensics science, to name a few.
|
2. Objective |
An Information Security Policy usually has the following objectives: |
To protect the organization's business information and any client or customer |
I. |
information within its custody or safekeeping by safeguarding its confidentiality, |
integrity and availability. |
To establish safeguards to protect the organization's information resources from |
II. |
theft, abuse, misuse and any form of damage. |
To establish responsibility and accountability for Information Security in the |
III. |
organization. |
To encourage management and staff to maintain an appropriate level of awareness, |
IV. |
knowledge and skill to allow them to minimize the occurrence and severity of |
Information Security incidents.
|
3. Responsibilities |
• |
Monitor to a reasonable level the use of the computer so as to detect breaches of |
the system's security. In the event of a serious breach being detected, especially if |
network security may have been compromised, CSD should be alerted so |
institutional corrective measures can be taken. |
• |
All user ids on departmental computers must be provided to the CSD to enable |
such users to be traced. |
• |
Ensure that each registered user is only allowed access to positively authorized |
facilities; the default on all computers should be to bar access. |
• • |
Ensure that all software and/or data that are accessed via the computer are |
• |
properly licensed for such access.
|
4. Implementation. |
To aid departments who have a real need to run their own computers in this way the CSD |
will: |
Provide a designated contact to liaise with departmental system administrators. |
• |
Operate a closed security mailing list that is regularly updated with the latest |
• |
national and international information on hacking attempts, tools, etc. All |
departmental system-administrators who are properly appointed and are recorded |
as such with the CSD will be included in this list. |
Provide regular training, advice and support to the designated departmental |
• |
system administrators. |
Assist a departmental system-administrator to correct a security loophole or |
• |
breach, especially where the integrity of the University network may be at risk. |
Periodically carry out checks, of its own and other network connected computers, |
• |
using tools provided by the industry or similar to those known to be available to |
would be hackers. This will be done to search for the various types of security |
problems that might exist. |