Security Policy Flashcards
Why is there a security policy?
To comply with the Data Protection Act that has been set out by the Government. This helps protect the company from any prosecution.
Security Policy Factors
Physical Security
- –Locks
- –Biometric
- –Metal Detectors
- –Bared Windows
- –Security Guards
Logical Security
- –Passwords
- –Frequency of change
- –Security of Passwords
- –User Names
- –Level of Access
- –Firewall
- –Encryption
- –Anti-virus
Continuous Investigation of Irregularities
- –Query any transaction that is out of ordinary
- –Query and file that is unusually opened.
Personnel Administration
- –Training, including prevention of accidental misuse.
- –Fitting the employee to the task.
- –Ensuring staff are controlled and can get into rooms.
- –Screening staff (making sure they don’t have bad history).
Operational Procedures
- –Disaster recovery plan.
- –Dealing with threats.
- –Backup
- –Updating anti-virus
Disciplinary
- –Verbal Warning
- –Written Warning
- –Dismissal
- –Prosecution
User accounts and logs
Auditing - keeps a record of who had done what on the network (1)
Auditing keeps records of:
- –Who (usernames) logged on (1)
- –What details of files accessed/ details of changes made/ details of from which machine/ details of programs they used (1)
- –When the times they logged on and off (1)
Security Policy Risks
Terrorism - Cyber attacks to slow down or prevent online services (DDOS)
—Consequence: Loss of reputation
Criminal sabotage - Attacks on firewalls by viruses to destroy data
—Consequence: Loss of business and income
Theft by Hacker/Employee - Hacking into data to steal companies private files or copying the files onto disc and selling it to rivals.
—Consequence: Cost of recovering data
Natural Disasters - Floods, Earthquakes etc.
—Consequence: Cost of recovering data
Accidental Altering of Data - Overwriting files or accidental deletion of files
—Consequence: Legal action
Theft of Data - Stealing storage media containing data
—Consequence: Loss of business and income Bankruptcy
Fire – Electrical fire in server room
—Consequence: Cost of new hardware
Misuses to ICT systems
—Introduction of viruses- by downloading games, not scanning portable media, not keeping virus scanners up-to-date etc.
—Misuse by employees of the ICT facilities, e.g. using telecommunications for own purposes (e.g. phone calls, email, videoconferencing, etc.) and using printers for personal use.
—Distribution of material that is racially or sexually offensive- for example, sending offensive jokes by e-mail or text messages, circulating offensive images over the organisations network etc.
—Misuse of data for illicit purposes- for example, using e-mails and text messaging to bully someone at work or school/college
—Using data to set up own business, etc.
—Blackmail, computer fraud or selling to other organisations.
—Violating terms of copyright or software agreements thus causing the company to face legal action from software supplies or other affected organisations.
—Taking data from the system and not protecting it. e.g. loosing a laptop.
Operational procedures for preventing misuse
—Screening potential employees- no criminal record, competence, qualifications, references
Routines for distributing updated virus information and virus scanning procedures- up-to-date virus checking software
—Define procedures for downloading from the internet, use of floppy discs, personal backup procedures
—Establish security rights for updating web pages- only authorised staff should be able to alter website content
—Establish a disaster recovery programme- the series of steps that would be taken if data loss occurred
—Set up auditing procedures (audit trials) to detect misuse- keeps details of what was changed, who changed it and when to detect fraudulent activity.
Disaster Recovery plan: factors
- –Cost
- –Risk
- –Data
- –Hardware/Software/Communications
- –Personnel, Responsibilities and Training
- –Procedures
Disaster Recovery plan: Cost
Set up a budget for it
What backup medium should be used? Tape or disc?
Raid systems depending upon the speed or money available to recover the data
Hardware can be replaced how much money have they got
Software can be re-installed. (or de-bugged by the programming department)
Disaster Recovery plan: Risk
What problems could occur?
Likelihood of them occurring e.g. are they going to get an earthquake in the UK
Disaster Recovery plan: Data
No business can afford to lose its data.
Backups of all data should be regularly made. This means that the worst case scenario is that the business has to go back to the situation of the last backup and carry on from there. Backups may take a long time- often tape-streamed at night.
Disaster Recovery plan: Hardware/Software/Communications
The total or partial loss of computing equipment or software
The complete or partial loss of telecommunications equipment or services
The complete or partial loss of the premises housing the IT equipment.
The loss of essential services such as electricity, heating or air conditioning
Alternative communication/ computer systems may be arranged in case a network goes down or alternative power supply
Disaster Recovery plan: Personnel, Responsibilities and Training
The loss of certain key employees (e.g. loosing all the qualified network staff in one go due to them choosing to form their own facilities organisation)
The loss of maintenance or support
Make one person responsible for backups so people don’t think other ae doing it and it does not get done or so they use online bank companies or both
Screening potential employees
Routines for distributing updated virus information and virus scanning procedures
Define procedures for downloading from the internet, use of floppy discs, personal backup procedures
Define staff code of conduct for using computer systems e.g. no abusive emails. No illicit use etc.
What response would staff make when the disaster occurs
Disaster Recovery plan: Procedures
Produce procedures for minimising the risks
Test the plan on a regular basis to make sure it is still sufficient
Establish physical protection system (firewalls etc.)
Establish security rights for file access and updating web pages
Establish a disaster recovery programme. This starts with a back up policy to secure the data so it can be recovered later e.g. backup procedures required.
How often should backups be taken?
Restoration policy backup every day/hour and rotate tapes to ensure there is always a copy to restore files
What type of backup? Where the backup is to be stored?
Decide upon types of backup full, incremental or differential depending upon how many items of data are changed
Set up auditing procedures (audit trails) to detect misuse
Premises location