100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

C841 LEGAL ISSUES IN INFORMATION SECURITY

Puntuación
-
Vendido
-
Páginas
7
Grado
A
Subido en
23-10-2023
Escrito en
2023/2024

C841 Legal Issues in Information Security Performance Assessment Task 2 on mandatory and discretionary access control. Sharing secret data is only with those necessary and only when it is required. This policy is normally enforced by individuals on separate projects and for separation between different departments. The Information Technology (IT) department of TechFite created user accounts with elevated privileges (Administrative) for personnel that did not require such privilege. They also had no routing and approval policies for account creation. Accounts were created at the request of Carl Jaspers for non-existent personnel. These accounts had access to other departments such as Payroll and Human Resources. Using the Least Privilege and Bell-LaPadula = methods would have prevented users masquerading as other users and company/client data would have retained confidentiality. B2. Security Awareness Training and Education (SATE) is a key component of success within a company. Normally, prior to receiving a company user account, a user must accept and sign an Acceptable Use Policy (AUP). But if the employee does not understand all of the terms listed on the policy, they may unintentionally violate the policy. User training helps to mitigate this. For a program of user training to be successful, it must be structured to the needs of the organization, the needs and level of knowledge of the employees (students). Security awareness training must provide some sort of proficiency quiz or examination (i.e. verbal question and answer period, written examination, hands-on performance exercises or examination) and the training must be engaging. Security awareness training must also be provided by an experienced person, at frequently scheduled (example: quarterly), with attendees from the management to user levels. Various structures can be created to account for user level, mid-grade management, senior management and executive personnel to ensure the proper level of training to the appropriate audience. All scheduled training sessions should be documented, reviewed, and audited. Review and audit procedures will ensure the intent was achieved and provide documented evidence of employee understanding. If retraining must occur for an employee after training attendance, it should happen quickly with a more thorough question and answer session to facilitate correct understanding of the subject. B2a. Security training must occur to prevent incidents. Departments such as Payroll, Supply & Logistics, and Human Resources will normally require additional training in the protection of Personally Identifiable Information (PII) and the protection of financial data. As with many IT issues, user error is one of the highest number of problems faced. A properly structured training program that is geared toward all employees is key to success within TechFite’s SATE program. Security awareness training should be conducted on a quarterly basis and documentation reviewed at the quarterly management review. Preferably, the quarterly management review should be conducted a few days prior to training. This is to provide management the ability to review the previous quarter’s training and address any issues. The practice of providing the training, reviewing the results, and addressing any concerns prior to upcoming training event will lead to a structured, sound training program. Having the training at these intervals will also keep employees aware and up-to-date with processes, procedures, and best practices of the company and possibly prevent or mitigate future incidents. B2b. Currently at TechFite, Security Awareness Training and Education is not being conducted. There is no documentation that they have the program in place. Training and education for each Downloaded by denis munene () lOMoARcPSD|

Mostrar más Leer menos
Institución
C841 LEGAL ISSUES IN INFORMATION SECURITY
Grado
C841 LEGAL ISSUES IN INFORMATION SECURITY









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
C841 LEGAL ISSUES IN INFORMATION SECURITY
Grado
C841 LEGAL ISSUES IN INFORMATION SECURITY

Información del documento

Subido en
23 de octubre de 2023
Número de páginas
7
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$8.29
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
contenthive76 Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
62
Miembro desde
2 año
Número de seguidores
34
Documentos
1949
Última venta
1 mes hace

2.8

5 reseñas

5
1
4
1
3
1
2
0
1
2

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes