Preview

Technical Controls

Good Essays
Open Document
Open Document
875 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Technical Controls
KELLER GRADUATE SCHOOL OF MANAGEMENT OF DEVRY UNIVERSITY

Technical Controls

SEC578: Practices Admin Phys & Ops Sec
Professor: Khader Jabra

November17, 2012

By
Angelo Daniels

Technical Controls
False sense of security happens all the time. Administrative, physical, and technical controls have played an important part in information security. Administrative controls consist of organizational policies and guidelines that help minimize the exposure of an organization. They provide a framework by which a business can manage and inform its people how they should conduct themselves while at the workplace and provide clear steps employees can take when they’re confronted with a potentially risky situation. Some examples of administrative controls include the corporate security policy, password policy, hiring policies, and disciplinary policies that form the basis for the selection and implementation of logical and physical controls. Administrative controls are of paramount importance because technical and physical controls are manifestations of the administrative control policies that are in place.
Technical controls use software and hardware resources to control access to information and computing systems, to help mitigate the potential for errors and blatant security policy violations. Examples of technical controls include passwords, network- and host-based firewalls, network intrusion detection systems, and access control lists and data encryption. Associated with technical controls is the Principle of Least Privilege, which requires that an individual, program, or system process is not granted any more access privileges than are necessary to perform the task.
Physical controls monitor and protect the physical environment of the workplace and computing facilities. They also monitor and control access to and from such facilities. Separating the network and workplace into functional areas are also physical controls. An important physical control



Bibliography: Auditor – General South Africa. (March 2010). Good Practice Guide User Account Management. Retrieved November 11, 2012 from http://www.agsa.co.za/Portals/1/Audit%20guidelines/ISA%20good%20practice%20march%202010F.PDF Clinch, Jim. (2009). ITIL V3 and Information Security. Retrieved November 13, 2012 from http://www.best-management-practice.com/gempdf/itilv3_and_information_security_white_paper_may09.pdf Posey, Clay. (2010). Strengthening Cybersecurity Series: A Best Practices Guide to Information Security. Retrieved November 14, 2012 from http://www.businessofgovernment.org/sites/default/files/A%20Best%20Practices%20Guide%20to%20Information%20Security.pdf Vacca, John R. (2009). Managing Information Security. Retrieved November 12, 2012 from http://www.scribd.com/doc/46730516/Managing-Information-Security

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    • Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics)…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Is404 Final Study Guide

    • 840 Words
    • 4 Pages

    3.p16 The purpose of access control is to regulate interactions between a subject and an object, such as data, a network or device…

    • 840 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Good Essays

    What are the different types of control systems? What are some advantages and disadvantages of the various control mechanisms? How does your organization use the steps of the control process?…

    • 543 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    This paper will discuss input controls and their various functions. An input control includes the necessary measures to ensure that data is correct, complete, and secure (Shelly & Rosenblatt, 2012). Input controls as it relate to user interface, includes audit trails, password security, data security, and encryption (Shelly & Rosenblatt, 2012). It is vital a company should take all needed measures to protect its data, which include customer, employees, and suppliers. Most assets have a value, but corporate data is priceless, because without safe, secure, accurate data, a company cannot function. (Shelly & Rosenblatt, 2012).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your…

    • 717 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Shameka Johnson SE5780 Practices for Administration of Physical & Operations Security Technical Controls Paper Administrative, Technical and Physical Controls (false sense of security) Administrative controls influence the choice of technical controls by giving guidelines and policies on hardware and software installation; such as, having a policy that states that all laptops must have a company standard encryption that the technical support staff supports. Another example, all employees must have the company standard antivirus software on their computers. Administrative controls are concerned largely with the security policies and standards that need to be adhered to throughout the organization.…

    • 871 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Context Data Flow Diagram

    • 290 Words
    • 2 Pages

    Show controls for validating input data, for obtaining a record, for ensuring successful completion of a process and for system security.…

    • 290 Words
    • 2 Pages
    Good Essays