Friday, April 26, 2019
A Risk Management Policy Essay Example | Topics and Well Written Essays - 750 words
A Risk steering Policy - Essay ExampleTo determine the full extent of an organizations vulnerability to hostage breaches, a insecurity assessment should be undertaken to gather comprehensive information and data prior to intention the risk management policy. Due to the fast pace of technology, attack tools frequently change parallel with updates in software package increasing the probabilities of security risks. In this particular case, the organization faced the avocation types of threats unauthorized entry from the internal personnel and confidentiality breach as a result of infiltration by a navvy or an attacker. The assessment indicates weakness in their overall information security system and policies requiring the revisions and enforcement in risk management.Proposed Management Risk PoliciesTo address the risk on information being stolen by inside personnel, the succeeding(a) measures are recommended (1) strengthen company policies on recruitment and screening new IT a pplicants and present IT personnel to include background checking in terms of past work experiences, credentials and qualifications (2) a code of discipline must(prenominal) be incorporated in the policies to contain sanctions for violations and infractions of policies, particularly on confidentiality of information, to wit reprimand for initial violations, word of advice for subsequent infractions, suspension without pay, expulsion, outright firing, as required (3) a classification of both hardware and software systems according to crucial importance must immediately be made to determine authorized and depose users depending on lengths of service and roles and responsibilities (4) codes and personal access numbers must be assigned and (5) a rotation of critical authorized employees must be implemented as a check and balance mechanism, coincident with regular monitoring and audits of critical and crucial confidential areas. To address the hacker or attacker from infiltrating th e system, the following courses of action are suggested (1) apply software security, (2) control use of administrative privileges, (3) control access base on the need to know, (4) continuous vulnerability testing and remediation, (5) install anti-Malware defenses, (6) limit and control ports,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.