6.4 - Protection Measures to mitigiate information breaches in information security Flashcards
Policies
Leaders of organisations set policies for staff to follow.
Security policies set out how breaches should be address and how IT equipment should be used securely
Staff need to be TRAINED in how to follow the policies
What is Staff Access Rights and what is the principle?
Setting out who should be able to view what
Principle: Access should be limited to only those who need it - by using tiered levels of access, this then means there’s less mistakes being made.
Responsibilities of staff - what is it & provide some policy examples.
The expectations on how to use the IT securely.
A policy could be:
- Set complex passwords and the policy should say what they mean by a complex password
- Encrypt all personal data - should say how to do that
- Don’t write down logins on notes and why
- Don’t use USB sticks to prevent malware being introduced to the computers/take personal data from computers
Risk Assessments
Regular checks (every month) on the CURRENT RISKS and how READY the organisation is to defend against these risks.
HIGH RISK - lots of issues/likely
Effectiveness of Protection Measures
- Reviewing current measures
- May set out when and how the current measures are tested.
Disaster Recovery Plan
- what is it and what should it then include
Setting out what steps are needed following a major incident.
Should include:
- Who is responsible for what: who will lead
- Dos and Dont’s for staff. (Do - backing up data.) (Don’t - not talking to the media so that they don’t know about the breach. )
- Contingencies: alternative provisions (e.g temporary office, uploading data to cloud storage, using alternative equipment until its over)
- Outline expectations for backing up when it should be, and what is the timeline of data recovery
After disaster
Recovery measures by doing backups
Replacement of hardware - purchased for equipment that is corrupted or destoryed
Reinstall software on new hardware
Updating and improving the policies