Preview

Unit 5 Assignment 1

Better Essays
Open Document
Open Document
1355 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Assignment 1
Unit 5 Assignment 1: Implementing Comprehensive Human Resources Risk Management Plan
Human Resources Risk Mitigation:
Objective • Human resources policies and practices should reduce the human risk factors in information technology (IT) security and information access controls. Decrease the risk of theft, fraud or misuse of information facilities by employees, contractors and third-party users.
Scope • the organization’s human resources policies, taken as a whole, should extend to all the persons within and external to the organization that do (or may) use information or information processing facilities. This could include:
* tailoring requirements to be suitable for particular roles within the organization for which persons are considered;
* ensuring that persons fully understand the security responsibilities and liabilities of their role(s);
* ensuring awareness of information security threats and concerns, and the necessary steps to mitigate those threats; and
* Providing all persons to support organizational privacy and security policies in the course of their normal work, through appropriate training and awareness programs that reduce human error; and ensuring that persons exit the organization, or change employment responsibilities within the organization, in an orderly manner.
Roles and responsibilities • Security roles and responsibilities of employees, contractors and third-party users should be defined and documented in accordance with the organization 's information privacy and security policies. This could include:
* To act in accordance with the organization 's policies, including execution of all processes or activities particular to the individual 's role(s);
* To protect all information assets from unauthorized access, use, modification, disclosure, destruction or interference;
* To report security events, potential events, or other risks to the organization and its assets
* Assignment of responsibility to individuals for



Bibliography: Custom Security Policies.com. 2012. http://www.instantsecuritypolicy.com/it_policies_procedures.html?gclid=CI_U3_HmpboCFc-Y4AodInIAWg (accessed 10 20, 2013). Ledanidze, Evgeny. Guide to Developing a Cyber Security and Risk Mitigation Plan. 2011. http://www.smartgrid.gov/sites/default/files/doc/files/CyberSecurityGuideforanElectricCooperativeV11-2%5B1%5D.pdf (accessed 10 20, 2013). Risk Mitigation Planning Including Contingencies. http://www.incose.org/sfbac/armor/id12.htm (accessed 10 20, 2013).

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the user domain, the most important security control is training. Regular training on the user and best practices of IT assets is a must. Users need to be trained (and regularly refreshed) on how to create strong passwords, as well as avoid allowing unauthorized access to their system. They need to be trained to identify social engineering and phishing scams, as well as how to physically secure their system when they are not using it.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As mentioned in our text, there are two ways to address security issues. First, the technical approach in which computer software and monitoring is used to monitor and control websites being visited or information being copied. Second, the communication methods and partnership and control by the Human Resources department. Because not all possible risks could be addressed by the use of technology there is also a great need to control the flow of information and proprietary technology by implementing policy. A bank for example could implement a security access policy following a “need to know” plan where only if necessary an employee could have access to data or information. The bank could also create an expectation of zero privacy where all files or devices on a company network whether owned or provided by the employee are subject to scanning or monitoring, and finally the automatic acceptance that devices such as peripheral blockers may be in place in order to avoid data extraction or movement. In regards to a new employee versus an employee who has given notice, a new employee could have restricted access that is only opened slowly as they acquire responsibilities and an employee leaving the firm depending on his level of access, the firm may opt to take his termination effective immediately.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The information stored by an organisation must be kept safe and secure at all times. This is to make sure that the organisation satisfies all of the legal requirements relating to the information which it keeps. The organisation has a duty of care to safeguard the information in its possession. This is to protect the security of its customers as well as its staff.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    * User education in awareness, safe computing practices, indicators of malicious code, and response actions.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    CSEC 630 Final Exam

    • 1055 Words
    • 4 Pages

    Includes how you implement information security solutions, such as secure e-mail and secure Web communications.…

    • 1055 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Maintaining and implementing of the security policies is one way that this can be accomplished, it is important the everyone knows their role in overall information security within the company.…

    • 717 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The organization will have certain policies and procedures in place and it will be your responsibility to ensure you have read policies and procedures and fully understand to ensure you adhere to these whilst working.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Areas similar to standards discussed Overview of the corporate philosophy on security Documents the Introduction and Purpose of the Information security policy of Chicago It provides a reasonable framework that helps the reader to understand the intent of the document…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Human Resource management teams work with the performance of activities such as bookkeeping, upholding policies and guidelines, employee performances, and ensuring labor laws are enforced. Human resource managers use information systems to help in their daily duties of payroll, training, and organizations of personnel files. Human Resource managers develop analyzes functions and determine the type of Human Resource Information system application is necessary to automate and create a strategic alliance for the Human resource department. The importance of determining the type of human resource information system application is to define which system can help make a business run more smoothly. A system is used to store, manipulate, analyze, acquire, retrieve and distribute important information. These systems will help Human resource managers by providing them with more data on strategic levels and allow for the function of more efficient and better information for decision making.…

    • 1016 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays