EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS
|
|
|
- Maurice Bennett
- 10 years ago
- Views:
Transcription
1 SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp , October 2014 Online ISSN: ; Print ISSN: EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS Muhammad Asif Khan College of Computer Science and Engineering, Taibah University Madina al Munawwara, Saudi Arabia ABSTRACT Information Systems (IS) organizations are experiencing a mounting pressure to contribute organizational success and to secure information asset, therefore, protection of information assets has become a paramount concern in IS organizations. IS organizations are more active in implementing technology and know the significance of IS audit and security controls in order to eliminate the risks for their IS asset and infrastructure. The aim of this paper is to analyze and demonstrate the effectiveness of network security controls in IS organizations that are implemented to ensure security and integrity of information assets. Also, the study evaluates the level of implementation of the detective and preventative security controls in organizations. In the present study we have collected data through survey from different organizations in Saudi Arabia. The purpose is to compare between the approaches for IS audit being used by these organizations and the industry standards of IS audit and controls set by organizations. Keywords: Information systems organizations, security controls, audit and controls, information systems security controls. INTRODUCTION Organizations are becoming more dependent on information systems to provide fast, better and reliable services to their customers and to facilitate decision making and business strategy within the organizations. This trend is increased in the businesses with the advent of internet and electronic business and has grown IS security issue as a prime concern for organizations. Our business institutions are worldwide connected and rely on automated control systems (Warkentin and Willison, 2009). IS security is a process that protects information and maintains its integrity; however, it has not been a serious concern for the top management comparing to other IS issues (Brancheau et al., 1996). Most of the organizations do not provide IT security training to their employees and less than 50% of 459 CIOs and IT directors have said that they had IT security knowledge and training programs for their employees (Verton, 2002). For effective corporate governance a proper system of internal controls is essential and it is important to make sure the integrity of financial systems of organization remains intact without compromising and internal control is in place. In organizations, there are external and internal security functions. External security functions consist of employees, administrative and physical while software and hardware are employed as internal security functions. Corresponding author [email protected] It is reported that personnel in organizations cause key problem in information security (Puhakainen, 2006). Employees do not implement security controls seriously and poor compliance of security policies cause security breaches (Santon et al., 2005; Myyry et al., 2009). Deterrent measures attempt to deter people from using IS assets illegally. The deterrent measures can be policy statements or guidelines of using IS assets of an organization. Deterrent measures have been useful in keeping away people from unauthorized use of IS assets but a new theoretical model based on neutralization theory has been introduced (Siponen and Vance, 2010) that highlights neutralization as an important factor in order to implement and develop organizational security policies. Preventive measures become effective when people do not pay attention to the deterrent measures and these measures are implemented by controls. Various security software are implemented in organizations to prevent unauthorized access to the IS assets. The security software provides different levels of access controls to IS assets (Weber, 1998). At basic level security software set in operating systems can enforce access to user account or any specific files. Security software in a middle level is set in database systems in order to access control of any particular records in a database. However, security software at an advanced level provides access control through high transaction means integrating audit and extensive security breach reports.
2 3126 Canadian Journal of Pure and Applied Sciences In organizations IS assets such as hardware, software, people and data are at risk of abuse by hackers through searching and exploiting vulnerabilities (Sun and Srivastava, 2006). Usually information is at risk during transmission over internet or information being stored in database of organization or information being stored in customers computer. In financial institutions IS plays a strategic and significant role as compare to different business organizations. Therefore, financial institutions devote extra resources in IS in order to obtain more benefits than other organizations. Many companies face information security problems because senior management does not have a commitment and responsibility towards information security. Usually at management level absence of support from management is not considered in security rather information security is deemed a technical problem. Information security managers always find difficulties in implementing information security plans that take into account all security dimensions including human dimension, awareness dimension, policy dimension, measuring and monitoring dimension etc (Solms, 2001). An effectiveness of information security depends on some organizational factors such as type of business, management interest and size of organization. To develop an effectiveness of information security, detective and preventive measures are taken into account. Organizations implement preventive security software that is assessed in terms of their sophistication. There is no independent body that could conduct a systematic testing for the effectiveness of information security controls and usually the results of effectiveness testing carried out by vendors are never published. In a study Khan and Turki (2008) effectiveness of IS audit and control has been presented and an analysis of the effectiveness and efficiency of IS audit in reducing risks, vulnerabilities and security issues that are found within IS organizations is presented. MATERIALS AND METHODS In the present study we used a research survey instrument to collect data from various small to large organizations. We mailed out the survey instrument to 93 IS managers associated with small to large professional organizations. We followed up the survey by sending s and phone calls whenever necessary. Out of 93 IS managers, 41 complete surveys were received and have been used for this study. In the survey instrument we grouped questions in four categories in order to measure the IS security effectiveness in the organizations i.e. implementation of detective security controls, implementation of preventative security controls, management interest and open ended questions for respondents. We delivered the pilot questionnaires to few organizations in order to get the feedback. Based on the feedback we altered some questions, their wording and order before finalizing the survey instrument for the study. To assess the implementation of detective security controls i.e. firewalls, intrusion detection system (IDS), encryption, check sums, logs/audit trails, capacity management, performance monitoring and anti-virus procedures, we formed questions to finding out any breach or abuse of IS security and the severity of actions taken by the organization: no abuse no action - 0, little abuse warning 1, serious abuse strict action 2, destructive abuse prosecution 3. The detective efforts were measured using total man-hours expended on IS security purposes per week (Straub and Welke, 1998). To evaluate the preventative security controls i.e. policies and procedures, honey pots, configuration management, incident handling, review of audit trails/logs, encryption and performance monitoring, we formulated questions to finding out the software for security used in the organization: software for security built in operating systems 1, software for security built in databases 2, software for security (special) 3. The preventative efforts were measured using the level of sophistication of security software used in the organization. We determined the size of an organization using the number of employees in the organization. We collected the nominal and ordinal data for this study. We used questions to find out involvement of top management in decisions with regard to security and security related activities. The questions have been helpful to know management s proactive support for security functions within organizations. We asked these questions on Likert s scale i.e. from Strongly Agree - 5, Agree - 4, Neutral - 3, Disagree - 2 and Strongly Disagree - 1. Perceptual responses from the respondents to six questions were used to measure the IS security effectiveness. The six questions were based on: preventative effect, detective effect, effect in hardware protection, effect in software protection, effect in data protection and effect in computer services protection. All questions were anchored on a Likert s scale i.e. from Maximum (5), High (4), Medium (3), Low (2) and Minimum (1). Table I depicts the statistics of the organizations participated in the study:
3 Khan 3127 Table 1. Statistics of participatory organizations. Organization Type Number of Organizations % of Response Received Banks, Financial Institutions Manufacturing Others Since we have small size of sample nominal and ordinal data, we have used partial least square (PLS) method because this method does not require homogeneity and normality on data (Hair et al., 1998). RESULTS AND DISCUSSION The questions in our survey instrument were based on different ensembles and the table 2 depicts the data Based on our survey instrument it was determined that albeit many organizations recognize the importance of IS security effectiveness, but many of them had not properly placed IS security controls within the organizations. As we discussed above the effectiveness of network security controls was measured on Likert s scale, the table 3 depicts the IS effectiveness in organizations. Reliability of the questions were tested by looking into the loadings of questions provided by PLS. Adequate reliability was proposed by Hair et al. (1998) as 0.5. On Cronbach s alpha, evidence of composite reliability could also be obtained. Nunnaly (1978) proposed the reliability of a construct should be at least 0.7. As an indication of adequate variance extracted 0.5 is a good indicator (Fornell, 1982). Table 4 depicts the results. In this study we have used data collected from different types of organizations ranging from small to large conglomerates in Saudi Arabia where organizational culture, organizational maturity and employees behavior are generally varied. We suggest that this type of study should be carried out with different set of organizations and additional deterrent and preventive controls in order to generalize the results. This study has assessed various security controls and their effectiveness in different organizations. We have observed that small organizations do not have adequate security controls as compare to large organizations, and it is suggested to organizations to improve IS security effectiveness in future in order to prevent from a great damage. As organizations are increasingly depending on IS and becoming more networked, further awareness of security controls is essential especially to the top management in order to have security measures in place. A better IS security effectiveness is contributed by greater deterrent and preventive efforts. Many managers in organizations are either reluctant or unwilling to employ deterrent and preventive efforts to reduce risks in their organizations. The reason is they are unaware of the benefits of detective and deterrent measures and effects of preventive counter-measures. Since the penalty for IS abusers is not that high as compare to other crimes, organizations should take further steps to increase efforts for deterrent and preventive measures. The awareness of Table 2. Ensembles and organizations data. Ensemble No. of Organizations % of Organizations Deterrent efforts (per day) Less than 1 hour More than 1 but less than 3 hours More than 3 but less than 9 hours More than 9 hours Deterrent Action No action Warning Suspension of services/ duties Litigation/Prosecution Preventive Action Security software Operating systems Database management systems
4 3128 Canadian Journal of Pure and Applied Sciences Table 3. Effectiveness of security controls in IS organizations. Security Control No. of % of Mean Significance Mean Security Control Organizations Organizations of Security Control Effectiveness Policies & Procedures Firewalls Intrusion Detection System Honeypots Encryption Checksums Audit Trails Configuration Management Incident Handling Problem Escalation Capacity Management Performance Monitoring Anti Virus Procedures IS security effectiveness among top management is insufficient and it is suggested that some form of education may be useful in IS security context. Management should be emphasized different aspects of preventive efforts and the legitimate and illegitimate use of IS assets. It is important that IS auditors should have good experience in order to conduct audit on regular basis. Management should also be aware of security software to protect IS assets. It is observed that small organizations do not invest in deterrent efforts as they believe and trust in employees while large organization invest more in deterrent efforts. It is advised to small organizations that they reassess their deterrent efforts to ensure there is assets are secure. Financial institutions tend to invest more for deterrent and preventive efforts due to large potential losses that may happen from IS security breach. The organizations which are related to other than financial business have lower IS security effectiveness as they are low deterrent efforts. These organizations must raise deterrent efforts to enhance IS security effectiveness as the businesses are increasingly adopting electronic networks in future. REFERENCES Brancheau, C., Janz, D. and Wetherbe, C Key Issues in Information Systems Management: SIM Delphi results MIS Quarterly. 20(2): Fornell, C A Second Generation of Multivariate Analysis. Methods, 1. New York, USA. Hair, F., Anderson, E., Tatham, L. and Black, C Multivariate Data Analysis with Readings. Englewood Cliffs, Prentice Hall, NJ, USA. Khan, MA. and Turki, S Evaluation of Software Development Controls in Information Systems Organizations. Canadian Journal of Pure and Applied Sciences. 2(2): Myyry, L., Siponen M., Pahnila,S.,Vartiainen, T. and Vance, A What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems. 18: Nunnally, C Psychometric theory. (2 nd edi.). McGraw-Hill, New York, USA. Puhakainen, P A Design Theory for Information Security Awareness. University of Oulu, Oulu, Finland. Siponen, M. and Vance, A Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations. MIS Quarterly. 34(3): Solms, B Corporate Governance and Information Security. Computers and Security. 20: Stanton, J., Stam, K., Mastrangelo, P. and Jolton, J Analysis of End User Security Behaviors. Computers and Security. 24(2): Straub, W. and Welke, J Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly. 22(4): Sun, l. and Srivastava, R An Information Systems Security Risk Assessment Model under Dempster-Shafer Theory of Belief Functions. Journal of Management Information Systems. 22(4): Verton, D Disaster Recovery Plan Still Lags. Computer World. 36(14):10.
5 Warkentin, M. and Willison, R Behavioral and policy issues in information systems security: the insider threat. European Journal of Information Systems. 18: Weber, R EDP auditing: Conceptual foundations and practice. McGraw Hills, NY, New York, USA. Khan 3129 Received: June 5, 2014; Accepted: Sept 6, 2014
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
An Empirical Study on the Effects of Software Characteristics on Corporate Performance
, pp.61-66 http://dx.doi.org/10.14257/astl.2014.48.12 An Empirical Study on the Effects of Software Characteristics on Corporate Moon-Jong Choi 1, Won-Seok Kang 1 and Geun-A Kim 2 1 DGIST, 333 Techno Jungang
EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT
EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT Matthew J. Wills, Dakota State University Omar F. El-Gayar, Dakota State University Dorine Bennett, Dakota State
Vendor Risk Assessment Questionnaire
Vendor Risk Assessment Questionnaire VENDOR INFORMATION: Vendor Name: Vendor Address: Vendor Contact Name: Vendor Contact Phone No: Vendor Contact Email: DATA SENSITIVITY What is the nature of data that
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES
UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES Cynthia M. Jones, Nova Southeastern University, [email protected] Richard V. McCarthy,
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire
Vendor Management Challenges and Solutions for HIPAA Compliance Jim Sandford Vice President, Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control
Employee Compliance with Information Systems Security Policy in Retail Industry. Case: Store Level Employees
University of Massachusetts Boston ScholarWorks at UMass Boston Honors Thesis Program in the College of Management College of Management 5-1-2012 Employee Compliance with Information Systems Security Policy
HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations
HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
How To Protect Your Credit Card Information From Being Stolen
Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1
THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1 Juhee Kwon Center for Digital Strategies Tuck School of Business Dartmouth College Hanover, NH 03755 [email protected]
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
87. Which Factors Explain Employees Adherence to Information Security Policies? An Empirical Study
87. Which Factors Explain Employees Adherence to Information Security Policies? An Empirical Study Seppo Pahnila University of Oulu, Finland [email protected] Adam Mahmood University of Texas,USA [email protected]
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Managing Information Resources and IT Security
Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Chapter 4 Information Security Program Development
Chapter 4 Information Security Program Development Introduction Formal adherence to detailed security standards for electronic information processing systems is necessary for industry and government survival.
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
Hardware and Software Security
Today, with the big advancement of technology and the need to share data globally at all time. Security has become one of the most important topics when we talk about data sharing. This means that the
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Chapter 7 Information System Security and Control
Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect
Overcoming PCI Compliance Challenges
Overcoming PCI Compliance Challenges Randy Rosenbaum - Security Services Exec. Alert Logic, CPISM Brian Anderson - Product Manager, Security Services, SunGard AS www.sungardas.com Goal: Understand the
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
Is the PCI Data Security Standard Enough?
Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Threat Management: Incident Handling. Incident Response Plan
In order to meet the requirements of VCCS Security Standards 13.1 Reporting Information Security Events, and 13.2 Management of Information Security Incidents, SVCC drafted an (IRP). Incident handling
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW
PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW David Kittle Chief Information Officer Chris Ditmarsch Network & Security Administrator Smoker Friendly International / The Cigarette Store Corp
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Payment Card Industry Data Security Standards.
Payment Card Industry Data Security Standards. Your guide to protecting cardholder data Helping you manage the risk. Credit Card fraud and data compromises are an increasingly serious problem, costing
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Dae-HyunJung 1, Lee-Sang Jung 2. {San 30, Jangjeon-dong, Geumjeonggu, Busan ; 179, Sinseonno, Namgu, Busan8} [email protected]
, pp.16-20 http://dx.doi.org/10.14257/astl.2013.34.05 The organization and individual characteristics of having an effect on the internet abuse action: The moderating variable research of the perceived
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Standard CIP 007 3 Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing
Modifying Business Continuity Plan (BCP) towards an effective automobile Business Continuity Management (BCM); a quantitative approach
Modifying Business Continuity Plan (BCP) towards an effective automobile Business Continuity Management (BCM); a quantitative approach Abednico Lopang Montshiwa* 1 and Akio Nagahira* 2 Graduate School
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) PURPOSE: The purpose of this procedure is to establish the roles, responsibilities, and communication procedures for the Computer Security Incident
Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling
Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling Andre F.G. Castro, Raquel F.Ch. Meneses and Maria R.A. Moreira Faculty of Economics, Universidade do Porto R.Dr.
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
RISK ASSESSMENT On IT Infrastructure Mr Pradhan P L & Prof P K Meher
RISK ASSESSMENT On IT Infrastructure Mr Pradhan P L & Prof P K Meher Objective: To develop risk assessment method to safeguard or protect of Information System assets of an organization. Element that identify
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
9 TH INTERNATIONAL ASECU CONFERENCE ON SYSTEMIC ECONOMIC CRISIS: CURRENT ISSUES AND PERSPECTIVES
Matilda Alexandrova Liliana Ivanova University of National and World Economy,Sofia, Bulgaria CRITICAL SUCCESS FACTORS OF PROJECT MANAGEMENT: EMPIRICAL EVIDENCE FROM PROJECTS SUPPORTED BY EU PROGRAMMES
