Wednesday, June 12, 2019
A Risk Management Policy Essay Example | Topics and Well Written Essays - 750 words
A Risk Management Policy - Essay ExampleTo determine the full consummation of an establishments vulnerability to security breaches, a pretend assessment should be undertaken to gather comprehensive entropy and data prior to designing the risk management policy. Due to the fast pace of technology, attack tools frequently change parallel with updates in software increasing the probabilities of security risks. In this particular case, the organization faced the following types of threats unauthorized access from the internal personnel and confidentiality breach as a result of infiltration by a hacker or an attacker. The assessment indicates weakness in their overall information security system and policies requiring the revisions and enforcement in risk management.Proposed Management Risk PoliciesTo address the risk on information being stolen by inside personnel, the following measures are recommended (1) strengthen company policies on recruitment and screening new IT applicants and present IT personnel to include minimise checking in terms of past work experiences, credentials and qualifications (2) a code of discipline essential be incorporated in the policies to contain sanctions for violations and infractions of policies, particularly on confidentiality of information, to wit reprimand for initial violations, warning for subsequent infractions, suspension without pay, expulsion, outright firing, as required (3) a classification of both hardware and software systems agree to crucial importance must immediately be made to determine authorized and trust employrs depending on lengths of service and roles and responsibilities (4) codes and personal access numbers must be assigned and (5) a rotation of critical authorized employees must be implemented as a check and balance mechanism, concurrent with unremitting monitoring and audits of critical and crucial confidential areas. To address the hacker or attacker from infiltrating the system, the following cou rses of action are suggested (1) apply software security, (2) control use of administrative privileges, (3) control access based on the need to know, (4) continuous vulnerability testing and remediation, (5) install anti-Malware defenses, (6) limit and control ports,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.