...Project: Information Security Project 1 Name: Ashiqul Abir Class: NT2580 Date: 02/28/2013 Information security best practice project: The information security best project was housed within the Oxford University computer emergency response team. The project sought build on the knowledge, commentary and information gathered during the 2009 self-assessment exercise. One of the main objectives of the project was to develop an information security toolkit, which includes the policies, guidelines, documentation and education and awareness programmers. Information security: In a devolved environment, such as a collegiate university, it is imperative that policy should not go into retail about how those objectives should be met. It also defines the scope of the policy and identifies roles and responsibilities for security. Information security toolkit: The example polies can be tailored to suit the individual needs of your department, college or hall. The toolkit focuses on some areas like, IT management Operations Network Management Physical Security Building on the 2009 self-Assessment: The 2009 Self-Assessment exercise asked unit within the collegiate university to assess their current approach to IT operations, management and security against recommended best practice guidelines. The information gathered helped the advisory group to understand where further attention, resource, and best practice...
Words: 280 - Pages: 2
...Purpose This project provides you an opportunity to analyze risks, threats, and vulnerabilities and apply countermeasures in the information systems environment. Required Source Information and Tools ------------------------------------------------- Web References: Links to Web references are subject to change without prior notice. These links were last verified on June 12, 2014. To complete the project, you will need the following: 1. Access to the Internet to perform research for the project * Microsoft Windows How-To, including: * Optimize Windows for Better Performance: http://windows.microsoft.com/en-us/windows/optimize-windows-better-performance - optimize-windows-better-performance=windows-7 * Monitor Attempts to Access and Change Settings On Your Computer / To Turn On Auditing: http://windows.microsoft.com/en-us/windows7/monitor-attempts-to-access-and-change-settings-on-your-computer * What Information Appears in Event Logs? http://windows.microsoft.com/en-us/windows/what-information-event-logs-event-viewer - 1TC=windows-7 2. Course textbook Learning Objectives and Outcomes You will: * Explain how to assess risks, threats, and vulnerabilities * Evaluate potential outcomes of a malware attack and exposure of confidential information * Evaluate information systems security countermeasures * Explain how system hardening relates to a company’s IT security policy framework * Analyze the purposes...
Words: 1575 - Pages: 7
...Introduction: Information security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. This publication specifically addresses assessment and analysis of security control effectiveness and of organizational security status in accordance with organizational risk tolerance. Security control effectiveness is measured by correctness of implementation and by how adequately the implemented controls meet organizational needs in accordance with current risk tolerance. Organizational security status is determined using metrics established by the organization to best convey the security posture of an organization’s information and information systems, along with organizational resilience given known threat information. This necessitates: • Maintaining situation awareness of all systems across the organization; • Maintaining an understanding of threats and threat activities; • Assessing all security controls; • Collecting, correlating, and analyzing security-related information; • Providing actionable communication of security status across all tiers of the organization; and • Active management of risk by organizational officials. Purpose: The purpose of this guideline is to assist organizations in the development of an ISCM strategy and the implementation of an ISCM program that provides awareness of threats and vulnerabilities, visibility...
Words: 4395 - Pages: 18
...Why Information Security Management Is Important For Payday Lending Business Laquinta Denise Mason A Prospectus Presented to the Information Technology College Faculty Of Western Governors University In Partial Fulfillment of the Requirements for the Degree Master of Science in Degree Area 3/14/2014 Abstract The purpose of this project was to ensure the client is compliant with the requirements specified by the Grahm-Leach-Bliley Act. Information is what drives business today and if the information is not available or reliable then the business cannot function. Most customer’s information, financial records, medical records, and sales records are stored on computers today. Clients and the government expect business to maintain the availability, integrity and confidentiality of their information. The project was created to address the importance of Information Security Management and compliance for businesses in the financial sector. ABC Loans are a small independently owned payday loan company. The client was concerned about the recent penetration of local business networks and wanted me to perform an assessment on his network and determine the vulnerable areas of his networks and the recommendations for making it more secure and GLBA compliant; now that the assessment is completed the client is aware of the vulnerabilities and the areas where they are not meeting GLBA requirements. My capstone will focus on the steps that will assure...
Words: 8774 - Pages: 36
...Project Outline Project Description A. Users at The Department of Social Services are constantly and consistently getting viruses on the organizations computers, also their boss has complained that the specific users are always unable to meet their deadlines. The employees logged onto their computers and downloaded music, works from unauthorized servers, save confidential files to the computer desktop instead of the shared drive, download music and unauthorized personal software on the organization computer system. I. Introduction 2.1.0 Background A. The Department of Social Services assist people who are affected by personal and widespread crisis, for instance they help people who are in need of money for health care, food, heating, child services, protective services, shelter, clothing, and so on. This organization provides various services to people or families in need of human services in surrounding communities. Because of the nature of their business conducted at The Department of Social Services its imperative that information on computers is safe and can not be compromised at any time. Their work is of a confidential nature and the data on the computers, databases, and servers have to stay safe and not to be shared with anyone other then the people who are responsible for that information. 2.1.1 Problem Statement A. While the Department of Social Services is in the business of helping others it seems as though there is a problem...
Words: 1946 - Pages: 8
...Food &Drug Administration (FDA) IT Security Project Plan ITEC640-9043 October 14, 2015 Table of Contents Introduction…………. …………………………………………………………………Page 3-4 Project Organization…………………….……………………………………………....Page 5-6 Statement of Need ………………………………………………………..…………….Page 7-8 Project Definition ………………………………………………………………………Page 8-10 Approach to Developing Project Plan………………………………………………….Page 11-12 References………………………………………………………………………………Page 13 Introduction Green Team Consulting Company is a team of professional project managers, who are hired to assist organizations with known network integrity issues after a cyber attack or data breach. The Greet Team is an investigative firm that specializes in a high quality, detailed analysis of the breach, development of a project mitigation plan, evaluation of any legal implications that may result in the future, and implementation strategies of new systems and workflows that will ensure future network security. Walter Harris, the Chief Operations Officer of the Food and Drug Administration or FDA, has contracted with the Green Team after a critical data breach that exposed confidential information. The data that was exposed includes but is not limited to: employee records, new pharmaceutical drug proposals, clinical trial results, and complaints filed about products the FDA regulates. The three main goals of this project will be to target the cause of the data breach, review the consequences this breach...
Words: 2776 - Pages: 12
...that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise's resources are used responsibly. Information Security Governance or ISG is a subset discipline of Corporate Governance focused on information Security systems and their performance and risk management. A security policy is an overall general statement produced by senior management (or a selected policy board or committee) that dictates what role security plays within the organization. There are three types of policies; regulatory, advisory, and informative. There are also three types of security policies; organizational, issue specific and system specific. Standards refer to mandatory activities, actions, rules, or regulations. Also standards can give a policy its support and reinforcement in direction. Standards could be internal, or externally mandated as well. Procedures are detailed step-by-step tasks that should be performed to achieve a certain goal such as procedures on how to install operating systems, configure security mechanisms, implement access control lists, set up new user accounts, assign computer privileges, etc… Procedures are considered the lowest level in the policy chain because they are closest to the computers and users If a policy states that all individuals who access confidential information must be properly authenticated, the supporting procedures will explain the steps for this to happen by defining the access criteria for authorization...
Words: 626 - Pages: 3
...Boss, I Think Someone Stole Our Customer Data- Assignment # 5 Name Withheld Strayer University Professor Name Withheld Project Risk Management (BUS 519) December 11th 2011 1. Of the four (4) commentaries that follow the case, select the one (1) that you believe to be the best solution to reporting the plan to address the problem and state why. Of the four commentaries, the one that I believe to be the best solution to address the issues faced by Flayton Electronics is that of James E. Lee. I particularly liked his recommendations because it addressed all the key areas that are necessary in a risk response plan. Lee’s recommendations are typical of contingency planning; according to Heldman (2005), contingency planning is a form of acceptance because if the risk occurs, you are willing to accept the consequences and devise a plan to deal with those consequences. He is in favor of acting with urgency by addressing the affected parties, as the longer it takes for the company to do this will make then appear less credible, Lee also recommended that once the risk is discovered, timing is an important element in implementing a risk response plan to minimize damages. This should be in the form of a prompt public disclosure once adequate information has been gathered; brand restoration should be initiated through public statements to help improve the company’s image; toll-free hotlines should be set up to address customers concerns; loyalty incentives in the...
Words: 1683 - Pages: 7
...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks...
Words: 229697 - Pages: 919
...Overview Risk Management Framework (RMF) RMF Steps / FAQs / Guides Applying the RMF to Federal Information Systems Course Security Categorization Security Controls Security Assessment Authorization and Monitoring Security Configuration Settings Industrial Control System Security Compliance Resources News Events Schedule FAQs - FISMA Project FISMA NEWS {Aug. 20, 2013} -- The FISMA Standard / Publication schedule has been updated. Click here to view updated schedule of FISMA documents. {Apr. 29, 2013} -- Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations has been approved as final. To view the full announcement of document release. {Apr. 29, 2013} -- The FISMA Standard / Publication schedule has been updated. Click here to view updated schedule of FISMA documents. {Jan. 18, 2013} – NIST anticipates the release of Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal information Systems and Organizations (Final Public Draft) on Tuesday, February 5th. The final public comment period will run from February 5th through March 1st. Final publication is expected by the end of April. {Nov. 8, 2012} -- Links to keynote presentations on Emerging Risk Management and Cyber Security Strategies are available at: Continuous Monitoring – FCW Executive Briefing Cybersecurity 2013 – Security Management Strategies Keynote Presentation by Dr. Ron Ross and Risk Management – Managing...
Words: 599 - Pages: 3
... |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A ...
Words: 1433 - Pages: 6
...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT2580 Introduction to Information Security Week 1, Unit 1 – Information Systems Security Fundamentals Class Plan Time Duration: This Class Period will be approximately 4 ¾ Hours in length. It will be divided 2 ¾ hours for Theory and 2 ½ hours for Lab. Content Covered: • Textbook o Chapter 1 - Information Systems Security Objectives: After completing this unit, the student should be able to: • Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts: ▪ Confidentiality, integrity, and availability (CIA) concepts ▪ Layered security solutions implemented for the seven domains of a typical IT infrastructure ▪ Common threats for each of the seven domains ▪ IT security policy framework ▪ Impact of data classification standard on the seven domains Materials: Week 1 PowerPoint Presentation Assignment Overview: Refer to Assignment 1: Match Risks/Threats to Solutions in the Graded Assignment Requirements section of this instructor guide. In this assignment, the students need to match common risks or threats within the seven domains of a typical IT infrastructure with the possible solutions or preventative actions. Use the hand out worksheet NT2580.U1.WS1.doc. Refer to Assignment 2: Impact of a Data Classification Standard, you must write a brief report...
Words: 530 - Pages: 3
...This document is to describe the Information Security requirements of Online Application Services and Application Service Providers that engage in business with McBride Financial Services. This policy applies to any use of Online Loan Applications (OLA) and any outsourcing to Application Service Providers (ASP) by McBride Financial Services, independent of where hosted. The Online Loan Application or Application Service Provider's Sponsor must first establish that its project is an appropriate one for the OLA/ASP model, prior to engaging in any additional infrastructure teams within McBride Financial Services or any external Application Service Providers. The department wanting to use an Online Loan Application or any Application Service Providers service must confirm that the Application Service Providers chosen to host the loan applications of McBride Financial Services complies with this policy. The Business Function to be outsourced must be evaluated against the following. The requester must go through the OLA/ASP engagement process with the Information Security Department to ensure affected parties are properly engaged. In the event that McBride Financial Services data or loan applications are to be manipulated by, or hosted at, any ASP's service, the ASP sponsor must have written, explicit permission from the data/application owners. A copy of this permission must be provided to the Information Security. The information to be hosted by an ASP must fall under...
Words: 528 - Pages: 3
...an acceptable cost and reinforce the security policy of the organization. They must include controls that contribute to individual accountability, auditability, and separation of duties. Administrative controls define the human factors of security and involve all levels of personnel within an organization. They determine which users have access to what organizational resources and data. Administrative controls can be broken down into two categories: preventive administrative controls and detective administrative controls. Preventive administrative controls are techniques designed to control personnel’s behavior to assure the confidentiality, integrity, and availability of organizational information. Some examples of preventive administrative controls are: security awareness and technical training, separation of duties, disaster preparedness and recovery plans, terminating and recruiting procedures, and user registration for computer access. 2. How does the absence of Administrative Controls impact corporate liability? The absence of administrative controls will have a negative impact on corporate liability. The main reason is that the organization has not put in place controls that meet a standard considered reasonable by most organizations that share similar backgrounds or work environments to protect data and resources. By not having these administrative controls in place, an organization can be held liable should a breach of security occur. An excellent example of a corporation...
Words: 902 - Pages: 4
...particularly liked his recommendations because it addressed all the key areas that are necessary in a risk response plan. Lee’s recommendations are typical of contingency planning; according to Heldman (2005), contingency planning is a form of acceptance because if the risk occurs, you are willing to accept the consequences and devise a plan to deal with those consequences. He is in favor of acting with urgency by addressing the affected parties, as the longer it takes for the company to do this will make then appear less credible. Lee also recommended that once the risk is discovered, timing is an important element in implementing a risk response plan to minimize damages. This should be in the form of a prompt public disclosure once adequate information has been gathered; brand restoration should be initiated through public statements to help improve the company’s image; toll-free hotlines should be set up to address customers concerns; loyalty incentives in the form of discounts and sales should be given to compensate those customers that still stay loyal to Flayton’s; releasing a formal public relations statement to acknowledge the breach and to assure the public that the matter is being taken care of; finally handling secondary risks that may have occurred as a result of the situation i.e. blogs, social media, faulty media reports, etc. Lee argued that if Brett Flayton and his team can mitigate the effects of the damage to their brand and reputation, they will be able to...
Words: 1650 - Pages: 7