Chapter 4 Flashcards
3 basic rules when making a policy:
- Policy shouldn’t conflict with the law.
- Policy must be able to stand in court.
- Policy should be supported and administered.
What are the 4 Bulls-eye model layers?
- Policies.
- Networks.
- Systems.
- Applications.
Explain the difference between the following:
1- Policy
2- Standard
3- Guidelines
4- Procedures
5- Practices
1- policy is the guidelines for behavior in an organization.
2- standards are specifications in how the policy should be followed.
3- guidelines are non-mandatory recommendations.
4- procedures are step-by-step instructions to help follow policies.
5- practices are examples of actions that follow policies.
What are 6 guidelines for effective policy? / How to make policies effective?
1- approved by management.
2- properly spread.
3- read.
4- understood.
5- agreed-to.
6- fairly enforced.
What are the 3 types of IS policy?
- Enterprise IS program policy.
- Issue-specific IS policy.
- System-specific policy.
What’s “Enterprise Information Security Policy” (EISP)?
It sets the strategic direction of the organization’s security.
What’s “Issue-specific IS policy” (ISSP) and it’s elements?
It provides guidance and regulation for usage of IT.
ISSP elements:
- Statement of purpose.
- Authorized usage.
- Prohibition.
- System management.
- Violations of policy.
- Policy review and updates.
- Limitations of liability.
What’s “System-specific policy” (SysSP) and it’s elements?
They often function as procedures that are used when configuring or maintaining systems.
2 types of SysSP’s:
– Managerial guidance
– Technical specifications
Or combined in a single document.
2 types of SysSP’s:
– Managerial guidance
– Technical specifications
Or combined in a single document.
What are “Managerial Guidance SysSP’s”?
- Created by management
- Guides implementation of tech.
-Informs technologists of management intent.
What are “Technical specification SysSPs”?
It’s the system admins directions on implementing managerial policy.
Has 2 methods:
- Access Control Lists (ACLs).
- Configuration rules.
Name and explain the 2 methods for Technical specification SysSPs:
1- Access control lists: enables restricted access according to user, computer, time, etc.
2- Configuration rules: instructional codes that guide the execution of the system when information is passing through it.
What can ACLs regulate?
Name 4:
- Type of user. (Who)
- Time. (When)
- Location. (Where)
- Device. (How)
It is useful to view policy development as a 3 part project.
Explain the 3 parts of developing policy:
1- The policy is designed and written.
2- then, formal approval to the policy by the management.
3- lastly, the policy is applied in the organization.
How is policy distribution done?
Can be distributed by:
- hard copy.
- electronic.
*The organization must prove that the policy reached the end user.
*Destruction of old versions must be done to assure confidentiality