SlideShare a Scribd company logo
Cyber security Policy development and
implementation
 The development of an information security policy
involves more than mere policy formulation and
implementation.
 Unless organizations explicitly recognize the various
steps required in the development of a security policy,
they run the risk of developing a policy that is:
 poorly thought out
 incomplete
 redundant and irrelevant
 will not be fully supported by the users.
Information security policy
 The analysis indicate that the major threat to
organizations’ information security is caused by
careless insider employees who intentionally or
unintentionally misuse the information assents
 So:
 What processes organizations should follow in the
developing an effective information security policy?
 This class defines a model for the
 Formulation
 Implementation
 Enforcement
of an information security policy in an organization
Major threats
 The insider employees who intentionally or
unintentionally misuse the information assents are
among the top ranked threats in organizations
 Most e-crimes:
 Unauthorized access to corporate info 63 %
 Unintentional exposure of private or sensitive data 57%
 Virus, worms or other malicious code 37%
 Theft or intellectual property 32%
Insider employees
 The lack of guidance as to how to develop security
policy contents (commercial policies)
 The processes of developing and implementing an
information security policy
Therefore, policy statements developed may not directly
attributed to the risks they are designed to nullify.
Challenges in developing policy
 There is a gap in the current security policy
development methods.
 The literature doesn’t offer comprehensive
methodology or mechanisms that show in detail the
process of developing an information security policy
Challenges in developing policy
 Category label Number of
 tags
 Cumulative
 tags
 1. Information security policy construction 85 85
 2. Management support 78 163
 3.Information security policy compliance and
Table 1: List of categories
identified
 There are several steps in risk assessment:
 The assets that the organization needs to protect must be
identified
 A list of all threats that can cause harm to the
organizations’ assets is identified
 The likelihood of of threats that can cause exercising
system vulnerability is determined
 The threats and vulnerabilities which cause a security
failure and the associated impacts are assessed in terms of
organization’s loss of integrity, availability and
confidentiality
 The controls that must be implemented in order to
mitigate the risks are identified
Risk assessment
 Activities of constructing a security policy:
 Directives from executive management with high level security policy
 These policies are transformed to organizational standards and
guidelines
Organizational standards are detailed statements of what should be
done, not how to do it.
 The detailed information security policies are supported by lower
level security policies also called procedures.
 Procedures provide the step-by-step detailed instructions of how to
carryout requirements of an information security policy.
Information Security Policy
Construction
 Implementation is the most difficult part of this process.
 The The introduction of a new information security
policy brings changes in the way employees behave in
handling organizational information.
 The whole idea in implementation is to gain support
from the organization’s community to accept changes.
 By educating and training
 Awareness
 Raise awareness of the responsibilities
 Emphasize recent actions against employees for security policy
violations
Information Security Policy
Implementation
 A number of theories have been developed underlying
employees’ behavioral intention towards the compliance
of information security policies.
 General Deterrence Theory (GDT)
 It predicts that the increase in the severity of punishment on those
who violate the rules of the organization reduce some criminal acts
 Theory of Planned Behavior (TPB)
 It explains the intention of an individual to perform a given behavior
(social pressures)
Information Security Policy
compliance and enforcement
 The need to periodically or non-periodically review and
update the security policy is indispensable to the
organization.
 The information security policy should be evaluated and
reviewed on regular basis to make sure that the latest
threats, new regulations and government policies are
kept up to date.
 An automated system of review scheduling which
timely alerts when a major change to the existing
security practices have occurred is advised
Information security policy
monitoring, review and assessment
 The first step in composing a security policy is to get
the top management’s opinions on how they
understand security in the organization.
 Without executive support, policies are just words. To
have meaning, they must be given the right priority and
be enforced.
 Management plays key role in approving the policy and
making sure that there is enough budget to cover all
resources required.
Management support
 Employee support consists of end-users who carry out
different activities in an organization.
 The end-user community needs to be part of the
development effort to ensure that the multidisciplinary
nature of the organization is incorporated in the
information security policy development process.
 The practice the information security policy
requirements
Employee support
 International standards such as ISO 27002 are good
starting point to implement the information security
policy which therefore improves an organization’s
information security.
 The idea of using international standards as a baseline
framework because they increase trust with the
organization’s stakeholders.
 An international security standard that has been
approved by security experts can definitely provide the
basis requirements to start developing an information
security policy.
International security standards
 The main reason to develop information security policy
is to mitigate the various security risks that
organizations face
 Organizations must first identify and understand all
regulatory requirements that dictate the creation of
such policies before writing the information security
policy.
 It is necessary that organizations obtain legal advice to
ensure that their policies are legally binding and the
employees violating such policies will be legally liable of
their behavior.
Regulations requirements
 The development of an effective security policy requires
a combination of different skills emanating from
different stakeholders experiences recommend the
involvement of
 ICT Specialists and security specialists in the policy
development process because they have technical
knowledge of the systems that the information
security policy intends to protect as well as the
security of these systems.
 The human resource department should review and/or
approve the security policy based on how the policy
relates to organization’s existing policies.
Information security policy
stakeholders
 What processes organizations need to follow in
developing and implementing an effective information
policy?
 The proposed model provides the different dimensions
that a specific organization needs to take into account
during the information security policy development and
implementation process.
 It ensures both comprehensive and sustainable
information security policies.
Conclusion

More Related Content

Similar to unit 3 security plans and policies.pptx

Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
kimangeloullero
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
IT-Toolkits.org
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
IT-Toolkits.org
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
Divya Tiwari
 
develop security policy
develop security policydevelop security policy
develop security policy
Info-Tech Research Group
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Angie Miller
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
Shauna_Cox
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
amit657720
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
mccormicknadine86
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
Md. Sajjat Hossain
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
Information Technology
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
makdul
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
IT-Toolkits.org
 

Similar to unit 3 security plans and policies.pptx (20)

Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
develop security policy
develop security policydevelop security policy
develop security policy
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 

unit 3 security plans and policies.pptx

  • 1. Cyber security Policy development and implementation
  • 2.  The development of an information security policy involves more than mere policy formulation and implementation.  Unless organizations explicitly recognize the various steps required in the development of a security policy, they run the risk of developing a policy that is:  poorly thought out  incomplete  redundant and irrelevant  will not be fully supported by the users. Information security policy
  • 3.  The analysis indicate that the major threat to organizations’ information security is caused by careless insider employees who intentionally or unintentionally misuse the information assents  So:  What processes organizations should follow in the developing an effective information security policy?  This class defines a model for the  Formulation  Implementation  Enforcement of an information security policy in an organization Major threats
  • 4.  The insider employees who intentionally or unintentionally misuse the information assents are among the top ranked threats in organizations  Most e-crimes:  Unauthorized access to corporate info 63 %  Unintentional exposure of private or sensitive data 57%  Virus, worms or other malicious code 37%  Theft or intellectual property 32% Insider employees
  • 5.  The lack of guidance as to how to develop security policy contents (commercial policies)  The processes of developing and implementing an information security policy Therefore, policy statements developed may not directly attributed to the risks they are designed to nullify. Challenges in developing policy
  • 6.  There is a gap in the current security policy development methods.  The literature doesn’t offer comprehensive methodology or mechanisms that show in detail the process of developing an information security policy Challenges in developing policy
  • 7.  Category label Number of  tags  Cumulative  tags  1. Information security policy construction 85 85  2. Management support 78 163  3.Information security policy compliance and Table 1: List of categories identified
  • 8.  There are several steps in risk assessment:  The assets that the organization needs to protect must be identified  A list of all threats that can cause harm to the organizations’ assets is identified  The likelihood of of threats that can cause exercising system vulnerability is determined  The threats and vulnerabilities which cause a security failure and the associated impacts are assessed in terms of organization’s loss of integrity, availability and confidentiality  The controls that must be implemented in order to mitigate the risks are identified Risk assessment
  • 9.  Activities of constructing a security policy:  Directives from executive management with high level security policy  These policies are transformed to organizational standards and guidelines Organizational standards are detailed statements of what should be done, not how to do it.  The detailed information security policies are supported by lower level security policies also called procedures.  Procedures provide the step-by-step detailed instructions of how to carryout requirements of an information security policy. Information Security Policy Construction
  • 10.  Implementation is the most difficult part of this process.  The The introduction of a new information security policy brings changes in the way employees behave in handling organizational information.  The whole idea in implementation is to gain support from the organization’s community to accept changes.  By educating and training  Awareness  Raise awareness of the responsibilities  Emphasize recent actions against employees for security policy violations Information Security Policy Implementation
  • 11.  A number of theories have been developed underlying employees’ behavioral intention towards the compliance of information security policies.  General Deterrence Theory (GDT)  It predicts that the increase in the severity of punishment on those who violate the rules of the organization reduce some criminal acts  Theory of Planned Behavior (TPB)  It explains the intention of an individual to perform a given behavior (social pressures) Information Security Policy compliance and enforcement
  • 12.  The need to periodically or non-periodically review and update the security policy is indispensable to the organization.  The information security policy should be evaluated and reviewed on regular basis to make sure that the latest threats, new regulations and government policies are kept up to date.  An automated system of review scheduling which timely alerts when a major change to the existing security practices have occurred is advised Information security policy monitoring, review and assessment
  • 13.  The first step in composing a security policy is to get the top management’s opinions on how they understand security in the organization.  Without executive support, policies are just words. To have meaning, they must be given the right priority and be enforced.  Management plays key role in approving the policy and making sure that there is enough budget to cover all resources required. Management support
  • 14.  Employee support consists of end-users who carry out different activities in an organization.  The end-user community needs to be part of the development effort to ensure that the multidisciplinary nature of the organization is incorporated in the information security policy development process.  The practice the information security policy requirements Employee support
  • 15.  International standards such as ISO 27002 are good starting point to implement the information security policy which therefore improves an organization’s information security.  The idea of using international standards as a baseline framework because they increase trust with the organization’s stakeholders.  An international security standard that has been approved by security experts can definitely provide the basis requirements to start developing an information security policy. International security standards
  • 16.  The main reason to develop information security policy is to mitigate the various security risks that organizations face  Organizations must first identify and understand all regulatory requirements that dictate the creation of such policies before writing the information security policy.  It is necessary that organizations obtain legal advice to ensure that their policies are legally binding and the employees violating such policies will be legally liable of their behavior. Regulations requirements
  • 17.  The development of an effective security policy requires a combination of different skills emanating from different stakeholders experiences recommend the involvement of  ICT Specialists and security specialists in the policy development process because they have technical knowledge of the systems that the information security policy intends to protect as well as the security of these systems.  The human resource department should review and/or approve the security policy based on how the policy relates to organization’s existing policies. Information security policy stakeholders
  • 18.  What processes organizations need to follow in developing and implementing an effective information policy?  The proposed model provides the different dimensions that a specific organization needs to take into account during the information security policy development and implementation process.  It ensures both comprehensive and sustainable information security policies. Conclusion