Question

If an organization is going to have a chance at a successful security program they need...

If an organization is going to have a chance at a successful security program they need to develop policies that provide direction for all security efforts and guide the conduct of the users. These policies need to be well written to provide the organization with solid guidance to support their security objectives.

  • Identify and briefly describe the three types of security policies. Your response should include a discussion of where each should be used.
  • Where should policy writers look to find supporting material when developing the policies for their organization?

Policies function like laws in an organization because they dictate acceptable and unacceptable behavior there, as well as the penalties for failure to comply. Like laws, policies define what is right and wrong, the penalties for violating policy, and the appeal process. Standards, on the other hand, are more detailed statements of what must be done to comply with policy. They have the same requirements for compliance as policies. Standards may be informal or part of an organizational culture, as in de facto standards. Or, standards may be published, scrutinized, and ratified by a group, as in formal or de jure standards. Practices, procedures, and guidelines effectively explain how to comply with policy. Figure 4-2 shows the relationships among policies, standards, guidelines, procedures, and practices. This relationship is further examined in the nearby Offline feature.

The meaning of the term security policy depends on the context in which it is used. Governmental agencies view security policy in terms of national security and national policies to deal with foreign states. A security policy can also communicate a credit card agency's method for processing credit card numbers. In general, a security policy is a set of rules that protects an organization's assets. An information security policy provides rules for protection of the organization's information assets.

Management must define three types of security policy, according to Special Publication (SP) 800-14 of the National Institute of Standards and Technology (NIST):

1.Enterprise information security policies

2.Issue-specific security policies

3.Systems-specific security policies

Figure 4-2 Policies, standards, guidelines, and procedures

Several published information security frameworks by government organizations, private organizations, and professional societies supply information on best practices for their members

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The three types of security policies are:
1.Enterprise Information Security Policies (EISP),
2.Issue-Specific Security Policies, and
3.Systems-Specific Security Policies
.

A brief description of each type of security policies:

1) Enterprise Information Security Policies (EISP), is also referred to as general security policy. These are documents from the executive level to shape the security philosophy in their respective company's IT environment. These documents serve as guidelines for the development, implementation, and management of the security program across the organization.

These policies establish the requirements and assign responsibilities to the various areas of security, simultaneously keeping in mind the definition of scope, constraints, purpose, and applicability of the program. It also handles the legal compliance aspect. It is drafted by and starts from the Chief Information Security Officer (CISO) of the organization guiding the entire Enterprise Security Program.

These policies support the mission, vision, and directions of an organization. These policies basically, provide rules or laws for the protection of an organization's information assets. The policy sets the direction, scope, and tone for all security efforts. The policy is modified only if there is a change in the strategic direction of the organization.

2) Issue-specific policies (ISSP), these policies are designed to administer and manage the end users' usage of resources, services, assets, and/or activities used to support the organizations business goals and objectives. These policies are applied on all employees who are always on the organization’s resources like laptops, desktops, networks, other devices, accounts, services, and usages like, applications, e-mail, Internet, mobile phones, BYODs (Bring Your Own Devices) such as the company-owned computers, laptops, mobile phones, and network at home, and usage of any cloud and portable storage, and network devices.

These policies address specific technologies requiring frequent updates and containing statements on the organization’s position on specific issues. These policies address and evaluate on concerns: who has access to the Internet, usage of personal pieces of equipment on company networks, usage of photocopy and printer equipments, and prohibitions or violations against hacking.

3) System-Specific Security Policies, SysSP, is unique when compared to EISP and ISSP. It is a set of policies functioning as instructions or procedures used when configuring systems. E.g., A company's management provides documents to guide the configuration of technology intended devices, resources, electronic appliances, etc to support information security in the company.

These policies detail on how to set up and maintain individual systems. It differs from other policy types and its various components. Companies would have implemented system-specific policies for firewalls, VPN, proxy, software, and other technologies so users, administrators, support personnel, and other related employees in the company use it as a guide. It is like a manual of procedures illustrating on how systems should be configured or maintained.

A discussion of where each should be used:

Information Security Policies or Enterprise Information Security Policies are used mostly in organizations, corporate companies, enterprise environments in general, both public and private sector companies, governemnt agency, related companies, and offices. In general, information security policies can be and are used anywhere and everywhere, where information at rest and in transit are to be safegaurded for securing them from any confidentiality, integrity and availability issues.

Issue Specific Policies (ISSP) are independent and are used covering specific issues like a specific department or division and its asset and are meant for specific technolohgies.

System-Specific Security Policies, SysSP, are used mostly in corporate companies or simply in enterprise environments.

These policies are very targeted documents, related to only specific systems they are designed to be addressed. Hence, each system at workplaces needs its own Systems-specific Security Policies to define and outline how it functions, how to be configured, and how it is managed.

In order for the policy writers to find supporting material when developing the policies for their organization, they should look in several published information security frameworks by government organizations, private organizations, and professional societies that supply information on best practices for their members.

Policy writers can also refer to the documents published by the National Institute of Standards and Technology (NIST). They can refer to the 'standards' such as the 'de facto standards' which are more detailed statements of what must be done to comply, comprising of policies with same requirements for compliance as policies. They can also refer to the published and scrutinized standards, and which is then ratified by a group in formal or 'de jure standards'.

The policy writers could also look in and refer to the practices, procedures, and guidelines explaining on how to comply with policies.

It is evident, the policy writers should specifically look in the three types of security policies namely, Enterprise information security policies (EISP), Issue specific policies (ISSP), and System-Specific Security Policy, SysSP.

Add a comment
Know the answer?
Add Answer to:
If an organization is going to have a chance at a successful security program they need...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on...

    Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs. These differences stem from different cyber security risks. They also present organizations with different choices to define and make in their security policies. 1. What are some best practices organizations can observe when creating and maintaining domain policies? 2. LAN security policies often center on issues concerning connectivity; this includes determining how devices adhere to the network. What...

  • 1. Describe ethics, which are based on cultural mores and express the fixed moral attitudes or...

    1. Describe ethics, which are based on cultural mores and express the fixed moral attitudes or customs of a particular group. Some ethics are recognized as universal among cultures. 2. Explain how within an organization, information security professionals help maintain security via the establishment and enforcement of policies. 3. Explain how policies function as laws and must be crafted with the same care to ensure that they are complete, appropriate, and fairly applied to everyone in the workplace. 4. Describe...

  • Please choose 5 questions from 20 and answer them. 1. How can a security framework assist...

    Please choose 5 questions from 20 and answer them. 1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administrator find information on established security frameworks? 3. What is the ISO 27000 series of standards? Which individual standards make up the series? 4. What are the issues associated with adopting a formal framework or model? 5....

  • DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program...

    DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program - Email Surveillance Audit Program – What is the structure and contents including various audit steps. Find 1-2 steps in the audit program where the audit software can be used. How can audit software be used to gather evidence?. (the Audit program (Email Surveillance Audit Program details is attached). DQ3. Review the contents of the Audit Manual of Office of University Audits at University...

  • 1. As a Network and Security Administrator, you are asked to monitor employee activity during the...

    1. As a Network and Security Administrator, you are asked to monitor employee activity during the day. Your AUP policy does not permit the use of outside devices. You noticed a rogue device on your network. What procedures do you follow to eliminate and prevent future usage of this device on your network? What happens to the owner of the device, who is NOT employed at your company? 2. You as a small business owner have chosen NOT to comply...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Chapter 2 Quality Assurance and Legal issues in Healthcare Chapter Review Questions 1. This organization establishes...

    Chapter 2 Quality Assurance and Legal issues in Healthcare Chapter Review Questions 1. This organization establishes standards for the operation of hospitals and other health care facilities and services a. American Hospital Association b. College of American Pathology c. National Accrediting Agency d. The Joint Commission 9. A phlebotomist hired by a hospital as a temporary employee commits a negligent act for which the hospital is liable. This is an empleo a t and battery respondent superior b. res ipsa...

  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • HIPaa requires the healthcare organization to have a business continuity plan to protect its patient's information...

    HIPaa requires the healthcare organization to have a business continuity plan to protect its patient's information true or false 2 which practice is not considered unethical under RFC 1087 issue by the Internet architecture board 3 your company handled sensitive customber information. as the executive the company you want to ensure that your company policies, procedures and system are satisfiing the requirement regarding customer private data. what report type assessment should you request. SOC 1 SOC2 SOC3 GLBA which type...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT