Preview

IS3550 Final Project

Powerful Essays
Open Document
Open Document
4998 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3550 Final Project
1.0 INTRODUCTION
The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.
2.0 COMPLIANCE LAWS
The Federal Acquisition Regulation (FAR), issued by the Department of Defense, guides the content of military contracts. Federal government organizations other than the military and intelligence agencies must follow the Federal Information Security Management Act of 2002. Federal Information Processing Standards (FIPS) 200, "Minimum Security Requirements for Federal Information and Information Systems," defines the minimum security requirements that information systems must meet. While the military does not have to follow FISMA, they do enact the security policies contained in the act. The military also implements the security controls found in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems; and NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. NIST SP 800-53, Appendix F, contains the Security Control Catalog. There is currently no specific law directing the information security policy content for defense contractors. However, Congress is proposing to make the policies in FISMA and the security controls in NIST SP 800-53 applicable to contractors that are awarded military contracts. Information Assurance Implementation, DoD Instruction 8500.2, states the computer network security controls required to be implemented in military computer networks (Enclosure 4, Attachments 1 thru 5). The other references noted in this paper give broad

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Is3350 Unit 5

    • 880 Words
    • 4 Pages

    Electricity at work Regulations 1989. This legislation places the4 responsibility of electrical item on to the employer.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3445 Project part 1

    • 317 Words
    • 1 Page

    First off e-commerce is one of the best things for business whether you have your whole business through the web or partly. If you have a physical store, you are limited by the area that you can sell your product or offer service. An ecommerce website opens your business to the world. In addition to these two drivers,online retail is also driven by traffic from search engines. One of the most important positives of ecommerce is the lowered cost. A part of these lowered costs could be passed on to customers in the form of discounted prices. Advertising and marketing is global and you get a better buying market. For personnel use the automation of checkout, billing, payments, inventory management, and other operational processes, lowers the number of employees required to run an ecommerce setup. last but not least Real estate, the store does not need a prominent physical location. you can Locate the Product Quicker, eliminate travel time and cost, provide comparison shopping, also cross reference deals, bargains, coupons, and group buying.if you do open a e-business vulnerabilities that need to be taken into account if you decide to create an e-commerce site is security internal and external. Hackers attempting to steal customer information or disrupt the site or server containing customer information that is stolen. Also Imposters can mirror your ecommerce site to steal customer's money. authorized administrators/users of an ecommerce website downloading hidden active content need to watch the attacks on ecommerce system. Scans should be frequently done on your server. this will help identify any malicious programs that may be running worms, viruses or Trojan horses. Limited user access will ensure that you know exactly who has access to your ecommerce system and assign each user with unique access authentication method.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I was able to review the duplicate KG’s and resolve them. There were several different issues that cause the duplication.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Is3350 Unit 4

    • 2336 Words
    • 10 Pages

    Giving problems in staff meeting so every staffs know this situation and they can also know their risk.…

    • 2336 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Is3350 Project 2

    • 949 Words
    • 4 Pages

    No, because at some point you have to take ownership, even in the face of danger.…

    • 949 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As you have requested, here are the “Internal Use Only” data classification standard four the company. I have broken down the IT Infrastructure by its 7 domains, paying particular attention the first 3 which are the Internal Use Only layers.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    The account policy for first World Bank would be a very simple and easy policy. Basically all personnel will only have one account at a time, each person will only have their account on the system that they have business being on. You can be assigned to multiple groups within the system if need be. Before anyone can be added to the system, they will have to read and sign the User Account Policy; this will make sure that no one can say that they “didn’t know”.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    This instruction obligates that “all information assurance (IA) and IA-enabled IT products incorporated into DOD information systems shall be configured in accordance with DOD approved security configuration guidelines”. This mandate provides that recommendations delineated in STIG checklists, will ensure DOD environments address those security requirements.…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Is3350 Unit 4

    • 572 Words
    • 3 Pages

    | You could/ could not discuss the role of software and hardware components. Your understanding in this section…

    • 572 Words
    • 3 Pages
    Satisfactory Essays