Presentation is loading. Please wait.

Presentation is loading. Please wait.

EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.

Similar presentations


Presentation on theme: "EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally."— Presentation transcript:

1 EECS 4482 Fall 2014 Session 8 Slides

2 IT Security Standards and Procedures An information security policy is at a corporate, high level and generally is not detailed enough for day to day operations and system configuration. Standards and corporate procedures should be developed to take the information security policy to a lower level as a basis for defining system requirements, guiding employee behavior, educating system users, configuring system software and writing operation procedures.

3 IT Security Standards and Procedures Each standard or corporate procedure should address a specific subject such as password and firewall. Organizations can refer to professional sources like Control Objectives for Business and Information Technology (COBIT) and International Standards Organization (ISO) as benchmarks to assess the comprehensiveness of their security standards. ISO 17779 provides guidelines and a framework for organizations to implement information security.

4 IT Security Standards and Procedures Standards should be supplemented with local procedures that fit each division and computing platform. In addition to standards, there are corporate security procedures for certain areas where there is little fluctuation among operating areas, such as procedures for reporting loss of equipment.

5 Standards & Procedures Topics Anti-virus. Appropriate use of information and information technology procedures. Cryptography. Data centre. Procedures for installation of hardware and software. Procedures for disposal of data, media and equipment

6 Standards and Procedures Topics eBusiness Email Firewall Incident response procedures Information classification Intrusion detection and prevention Loss reporting procedures Mobile computing

7 Standards and Procedures Topics Password Patching Routers Servers Software design Virtual private network Wireless Workstations

8 Secenario 1 A local system administrator (SA) receives a call from a law enforcement officer requesting any information that can be provided for a specific IP number. The situation sounds very serious and the officer is explaining that this information is critical to determine how to proceed. Which policy, standard or procedures will guide this? What should the SA do? Who should approve the action? Approval before or after?

9 Scenario 2 An administrative assistant has filed a complaint with the university legal department that her boss spends an enormous amount of time surfing the web and searching for porn. There have been no previous complaints concerning this activity and the individual being accused has a good university record. Which policy, standard or procedures will guide this? What questions need to be answered? What steps should be taken? What should be represented in policy?

10 Scenario 3 A small group of graduate students are not overly happy with the networking arrangements they have in their work space. They have complained to the local network administrator but the situation has still not been resolved to their satisfaction. One of the graduate students purchases a small wireless access point and installs it in the work space for others to use. Which policy, standard or procedures will guide this? What questions need to be answered? What steps should be taken? What should be represented in policy?


Download ppt "EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally."

Similar presentations


Ads by Google