Computer Security Policy D


Published on

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Computer Security Policy D

  1. 1. COMPUTER SECURITY POLICY Ridha Ben Hammouda EVEREST UNIVERSITY-South Orlando Campus © 2008
  2. 2. COMPUTER SECURITY POLICY <ul><li>Computer security professionals around the world face the same risks. This presentation takes a holistic approach to solving this problem and offers some helpful suggesions. </li></ul>
  3. 3. COMPUTER SECURITY POLICY <ul><li>Computer security policy needs of industry and government have been a priority since the early 1990’s. </li></ul><ul><ul><li>These policies relate to internet security, firewalls, virus protection and statistical methods of computer security. </li></ul></ul><ul><ul><ul><li>Internet security professionals around the world face the same risks when it comes to the lack of needed resources to develop and sustain an effective security policy (Waning Security, 1996, p. 3). </li></ul></ul></ul><ul><ul><ul><li>A holistic approach in computer security policy is needed (Scientists on Cybersecurity, 2002b, p. 38). </li></ul></ul></ul>
  4. 4. COMPUTER SECURITY POLICY <ul><li>The National Research Council, which advises the government on technology matter, examines cybersecurity issues including the nature of cybertrheats and common causes of system and network problems. </li></ul><ul><ul><li>The agency has developed some controversial policy recommendations, such as making software and system vendors legally responsible for insecure products and systems (Scientists on Cybersecurity, 2002c, p. 38). </li></ul></ul>
  5. 5. COMPUTER SECURITY POLICY <ul><li>The security risks posed by microcomputers need to be controlled because microcomputers are being used more frequently in large financial reporting systems. </li></ul><ul><li>These risks include threats to </li></ul><ul><ul><li>data integrity </li></ul></ul><ul><ul><li>unauthorized information access, and </li></ul></ul><ul><ul><li>theft. </li></ul></ul>
  6. 6. COMPUTER SECURITY POLICY <ul><li>A cost-effective security plan should </li></ul><ul><ul><li>identify business assets that need protection, and </li></ul></ul><ul><ul><li>risks from which the assets need to be safeguarded. </li></ul></ul><ul><ul><li>Controls can then be designed and based on the level of exposure to loss. </li></ul></ul>
  7. 7. COMPUTER SECURITY POLICY <ul><li>Specific security procedures that can be implemented include </li></ul><ul><ul><li>(1) policy statements on computer security guidelines, </li></ul></ul><ul><ul><li>(2) locking devices, </li></ul></ul><ul><ul><li>(3) password protection, </li></ul></ul><ul><ul><li>(4) security software such as data encryption programs </li></ul></ul><ul><ul><li>(5) data backup procedures to insure against accidental or intentional destruction of data (Herdman & Neary, 1987b, p. 9). </li></ul></ul>
  8. 8. COMPUTER SECURITY POLICY <ul><li>Research shows that corporate losses due to poor computer security are more likely to result from error than from fraud. </li></ul><ul><li>Further, more fraud losses are caused by employees than by outsiders </li></ul>
  9. 9. COMPUTER SECURITY POLICY <ul><li>. A proper corporate computer security program takes a team approach, with components including </li></ul><ul><ul><li>examination of the kinds of information the company deals </li></ul></ul><ul><ul><li>Consideration of the level of protection appropriate to each during every phase of its life </li></ul></ul><ul><ul><li>ongoing design </li></ul></ul><ul><ul><li>Education </li></ul></ul><ul><ul><li>Separation of functions </li></ul></ul><ul><ul><li>access controls </li></ul></ul><ul><ul><li>audit trails </li></ul></ul><ul><ul><li>regular backup </li></ul></ul><ul><ul><li>enforcement </li></ul></ul>
  10. 10. COMPUTER SECURITY POLICY <ul><ul><li>A well-documented, well-publicized security </li></ul></ul><ul><ul><li>policy can help companies comply with new </li></ul></ul><ul><ul><li>federal and state laws and prosecute violators </li></ul></ul><ul><ul><li>more effectively (Thackeray, 1988b, p. 45) </li></ul></ul>
  11. 11. COMPUTER SECURITY POLICY <ul><li>Data security across networks is also an important issue for network administrators. To secure intranetworks, some elements to include in a computer security policy are: </li></ul><ul><ul><li>(1) permission rules, </li></ul></ul><ul><ul><li>(2) responsibilities, </li></ul></ul><ul><ul><li>(3) unauthorized access to files and directories, </li></ul></ul><ul><ul><li>(4) unauthorized use of software, </li></ul></ul><ul><ul><li>(5) use of the network in for-profit activities, </li></ul></ul><ul><ul><li>(6) use of electronic mail, </li></ul></ul><ul><ul><li>(7) harassment, </li></ul></ul><ul><ul><li>(8) waste, </li></ul></ul><ul><ul><li>(9) abuse, </li></ul></ul><ul><ul><li>(10) theft, </li></ul></ul><ul><ul><li>(11) enforcement, </li></ul></ul><ul><ul><li>(12) workplace monitoring, </li></ul></ul><ul><ul><li>(13) network managers’ responsibilities </li></ul></ul><ul><ul><li>(14) use of the network for non-company tasks </li></ul></ul>
  12. 12. COMPUTER SECURITY POLICY <ul><li>The following procedures are recommended for application by internet security professionals: </li></ul><ul><ul><li>1. Permission – Use of computer facilities must be authorized by the owner of the information or by a senior manage. Prior permission to use another user’s computer account or user-ID from the owner of the account should be required. All computer or electronic files are considered private unless the owner has explicitly made them available to others. </li></ul></ul><ul><ul><li>2. Responsibilities – The user is owner of their data. It is their responsibility to ensure that it is adequately protected against unauthorized access. Keep passwords and accounts confidential; change passwords frequently. Do not leave terminals unattended without logging out first. Do not engage in any activity that is intended to circumvent computer security controls. Do not access the accounts of others with the intent to read, browse, modify, copy or delete files and directories without authorization. </li></ul></ul><ul><ul><li>3. Unauthorized Use of Software –Users should be prohibited from loading any software on any computer system (i.e. shareware o freeware software) without approval from the system administrator and your supervisor. Users should be expressly prohibited from using company computers to make illegal copies of licensed or copyrighted software. Copyrighted software must only be used in accordance with its license or purchase agreement. </li></ul></ul>
  13. 13. COMPUTER SECURITY POLICY <ul><ul><li>4. Harassment – Company computer systems are not to be used to harass anyone. This includes the use of insulting, sexist, racist, obscene or suggestive electronic mail, tampering with others’ files invasive access to others’ equipment. Etc. </li></ul></ul><ul><ul><li>5. Destruction of Records – Instruct employees how to dispose of old manuals, floppy disks. Shredding and thoroughly erasing floppy disks, removing any information that could be used by an outsider to penetrate a company’s computer system. Recycle ink and toner cartridges. </li></ul></ul><ul><ul><li>6. Networks – Disallow use of the company-owned network (or other network accessible by company computers) for any activity other than company business. This includes surfing the Internet, online discussions in newsgroups and bulletin board services, attempting to access other computer systems without authorization, posting commercial messages, and transmitting viruses, worms, or other invasive software. </li></ul></ul>
  14. 14. COMPUTER SECURITY POLICY <ul><ul><li>7. Enforcement – Investigate all alleged abuses of computer resources. Each employee must be responsible for their own actions. A company has the obligation to ensure that its computer resources are used properly and within the guidelines established by the company. The company should have access to all electronic files of its employees. Limiting the access of guilty employees is appropriate. Refer flagrant abuses to senior managers or law enforcement authorities. In extreme cases of flagrant abuse or disregard of computer security guidelines, may result in termination of employment </li></ul></ul><ul><ul><li>8. Workplace Monitoring – A company must reserve the right to monitor the computer system for signs of illegal or unauthorized activity. (Alexander, 1995b, p. 59) </li></ul></ul>
  15. 15. COMPUTER SECURITY POLICY <ul><li>CONCLUSION </li></ul><ul><li>- Computer security professionals must be highly trained, continuously updating their education, and constantly vigilant in order to protect their company from intruders who would cause them harm. </li></ul><ul><li>- Computer security professionals must have integrity and be trustworthy. </li></ul><ul><li>- Computer security professionals are becoming increasingly valuable and powerful as we become a global community and market place. </li></ul>
  16. 16. COMPUTER SECURITY POLICY <ul><li>References </li></ul><ul><ul><li>Alexander, M. (1995b). Make It a Policy to Protect Yourself. Datamation , 41 (22), 59. Retrieved May 19, 2008, from </li></ul></ul><ul><ul><li>Herdman, R. K., & Neary, R. D. (1987a). Planning Your Microcomputer Security Strategy. Financial Executive , 3 (4), 9. Retrieved May 19, 2008, from </li></ul></ul><ul><ul><li>How Much Computer Security. (1992). Across the board , 29 (2), 12. Retrieved May 19, 2008, from </li></ul></ul><ul><ul><li>Scientists on Cybersecurity. (2002a). Security Management , 46 (4), 38. Retrieved May 19, 2008, from </li></ul></ul><ul><ul><li>Thackeray, G. (1988a). Computer Security: The Manace is From Inside. The Office , 108 (4), 45. Retrieved May 19, 2008, from </li></ul></ul>
  17. 17. COMPUTER SECURITY POLICY <ul><li>Ridha Ben Hammouda </li></ul><ul><li>EVEREST UNIVERSITY-South Orlando Campus </li></ul><ul><li>©2008 </li></ul>