Security Policies and Implementation Issues
Information Security Policy Management
Think about answers to the following questions and then click each question to reveal its answer. Next, click the ACTIVITY button to attempt a simple activity on information security controls in an ISS policy framework.
- What is ISS?
- What is the difference between ISS and IA?
- What are ISS policies?
The following list shows you guidelines for developing policies to secure personally identifiable information (PII) data. Position the mouse pointer over each keyword to learn about these guidelines. Next, click the ACTIVITY button to attempt a simple activity.
Click each role to learn more.
- Chief information security officer
- IA auditor
- Security manager
- Risk manager
- Compliance officer
Let's review some laws related to information security. Position the mouse pointer over each law to learn more. Then, click the ACTIVITY button to answer a question on information security regulations.
- The Digital Millennium Copyright Act (DMCA)
- The Gramm-Leach-Bliley Act (GLBA)
- The Sarbanes-Oxley (SOX) Act
- The Federal Information Security Management Act (FISMA)
Click the following reasons that highlight the importance of using and enforcing security policies.
- To protect systems from insider threats
- To protect information at rest and in transit
- To control changes to the IT infrastructure
In this section, you will have an opportunity to practice the concepts and processes that you have explored in this lesson.
The Hands-On Lab provides you with an engaging learning experience that is diagnostic and flexible. Following the instructions provided in the Lab Manual, you will be able to practice the steps IT Security Specialists perform on a daily basis and develop the skills required for effective execution and management of IT Security operations.
In this section, you will have an opportunity to apply what you’ve learned in this lesson in the context of analyzing a business situation. Although simplified, a problem scenario provided here depicts the challenges often faced by professionals in the workplace.
In this interactive case study, you will explore a business situation, review critical information related to the problem discussed in the case, decide on the course of action, and receive a decision analysis summary that discusses the implications of your decision. Once you analyze the impact of your decision, explore alternative solutions to learn about other potential ways to address the issue in the case. Complete your work on the case by submitting the graded assignment that will reflect on your process of analyzing the business situation and defining an appropriate course of action.
After you have gone through the challenge, navigate to Contributing Factors from the panel at the top of your screen.
You need to make your own budget, project timeline, and toll gate decisions. Create an academic paper describing the policies, standards, and controls that would make our organization DoD compliant.
Research the Internet
Read
Select the icon from the top to receive additional
information related to the situation
Tasks
- Have a discussion with the chief security officer.
- Research the Internet to know more about DoD requirements.
- Check the list of computing equipment at TzarTech.
- Select a team leader for your project group.
- Develop a list of compliance laws required for DoD contracts.
- List controls placed on the computing equipment.
- List standards that would be required for all equipment.
- Create DoD-compliant policies for the computing equipment.
- Develop a deployment plan for the implementation of these polices, standards, and controls.
- In the final delivery document, list all DoD frameworks that your team finds.
- Submit the assignment to your instructor.