Information Systems

VII: see attached. | Information Systems

see attached. Finalproject.docx For the final project, you will write a paper that is a minimum of four pages in length that creates and outlines an IT securit

May 10, 2025 3 views

Check out this sample solution our expert writers created for a client with a "write assignment" task.

see attached. Finalproject.docx For the final project, you will write a paper that is a minimum of four pages in length that creates and outlines an IT security policy for a medical facility. Your security policy must contain the following sections: · Information Security Policy Overview, · Application Development Security, · Data Backup and Storage, · Physical Security, · Network Device Installation and Configuration, · Data Handling, · Remote Access, · Email, · Internet and Web Access, · Device Security, and · Process for communicating the policy to stakeholders. Your paper should include a title page and a reference page. Be sure to follow proper APA citations. At a minimum, use your textbook as a resource for this assignment and include it on your reference page. Course Textbook(s) Santos, O. (2019). Developing cybersecurity programs and policies (3rd ed.). Pearson. https://online.vitalsource.com/#/books/9780134858548 UnitVII.pdf SEC 4303, IS Security Policy Analysis 1 Course Learning Outcomes for Unit VII Upon completion of this unit, students should be able to: 4. Analyze a security policy for its completeness. 4.1 Assess security requirements for physical environments. 4.2 Determine the responsibility for physically securing a facility. 4.3 Determine recommendations for securing a facility. Reading Assignment Chapter 7: Physical and Environmental Security Unit Lesson Physical security is an important aspect of any organization. An organization can consider the location site, surroundings, potential for disasters, and infrastructure as part of the composition of the facility. Therefore, it is important to ensure organizations have sufficient policies established to protect the systems, facilities, and networks from physical tampering. ISO/IEC 27002:2013 provides guidelines for organizational information security standards and information security management practices including the selection, implementation, and management of controls taking into consideration the organization's information security risk environments (International Organization for Standardization [ISO], n.d.). These standards focus on the implementation processes, accepted controls, and creation guidelines. Physical and environmental safeguards are sometimes overlooked when we refer to security but are critical in protecting information technology elements. Santos (2019) explains how the environmental security refers to the workplace environment, which includes the design and construction of the facilities, how and where people move, where equipment is stored, how the equipment is secured, and protection from natural and man-made disasters. Organizations need to observe the different areas that pose vulnerabilities to their physical structure. Think about the building perimeter for a small credit union. This type of institution may not have a full-time security guard, so the institution needs to observe the teller lanes, back-door entries, front-door access, and surrounding streets. A bank robber could identify these factors before performing an act of robbery. Organizations can protect assets with physical parameters, technical devices, and established procedures. Physical controls refer to the presence of physical deterrents to ensure the security of the perimeter or environment (buildings’ structures and server rooms) containing information and information systems. These controls are meant to stop unauthorized personnel from gaining access to buildings (fire escapes, back doors); the use of locks on offices, server rooms, and other sensitive areas challenge those who are not supposed to have access to restricted areas. Technical security relies on security measures that employ technology in some way. Usually, they are related to computers and software techniques, but they can equally apply to technical systems or locks such as biometric techniques and authorized electronic card access. UNIT VII STUDY GUIDE Understanding the Physical Security SEC 4303, IS Security Policy Analysis 2 UNIT x STUDY GUIDE Title Layer Defense Model Layered defense strategies can help protect organizations and prevent unauthorized access. This concept can also hold true when referring to physical security. If an intruder feels the process is rather difficult to enter a location, then he or she may decide to move to another organization or extend the reconnaissance to identify the access areas. Think about the security controls you have in place at your residence. Most residences have locks on the doors and windows and maybe pets to help deter potential dangers. We can also enhance the security by adding cameras and alarm systems along with decals and signage stating the home is protected by a particular vendor. This certainly places some fear in the criminal's mind, so security becomes a psychological aspect for both the resident and criminal. Obviously, this is positive for the resident and negative for the criminal. As with any organization, the physical aspect is usually the first entry point because it can be as simple as driving to the location. An organization’s location certainly dictates the level of security along with the sensitivity of the data in the systems. You see many commercial buildings providing statistics on the crime rates in the area when the facility is for sale. This information is needed because the monthly expenses can increase depending on the level of security needed. Location-based threats that need to be evaluated include political stability, susceptibility to terrorism, the crime rate, adjacent buildings, roadways, flight paths, utility stability, and vulnerability to natural disasters (Santos, 2019). The protective strategies we can use are lights, gates, locks, card readers, security guards, alarms, and cameras to detect and deter criminals. An obvious deterrent would be security guards because they are very visible and can walk the facility. Organizations determine the types of facility guards needed; this might include professional physical security staff or other personnel such as administrative staff or information system users (NIST, n.d.). A seasoned criminal can easily observe these security personnel, so it demonstrates the importance of physical security for the organization. It is also good to test new strategies throughout the year so the security parameters are constantly changing, causing the criminal not to be able to plan for an intrusion. The entry or main door is the focal point of most organizations. As for the facility entry, we can have employee locks, ID cards, kiosks, and security guards. We also have personnel there to address questions from visitors signing in for a visitor badge. This is usually the area where criminals use piggybacking because of the traffic and activity, especially when work begins for the day. Piggybacking is the process of walking behind a current employee when entering a building and using their access card or existence as a means to enter the building. A helpful employee may hold the door open for a criminal thinking this individual is an employee of the organization. This happens more at larger organizations because most employees at larger facilities do not know every employee of the organization. Therefore, it is extremely important that the front desk personnel enforce the physical security policies for the employees of the organization. An employee needs to know what actions to take if someone follows behind him or her without swiping a badge. The organization also needs another set of eyes on the entry point to ensure piggybacking does not occur. If we review earlier units regarding human resources, then we can see why background checks are so important. We need to hire personnel with strong ethics and integrity to ensure they are following policies and protecting the organization. If an employee fails to shut a back door or lets a friend with questionable intentions enter the facility, it can be extremely dangerous for the organization. The friend may not want to access the network internally to collect information but may want simply to steal equipment. We have also seen a dramatic increase in shootings, so physical security policies need to be followed by every employee. Security cameras can prevent unauthorized access. (Neurolink, 2017) Security guards act as deterrents to crime (McGuire, 2015) SEC 4303, IS Security Policy Analysis 3 UNIT x STUDY GUIDE Title The Federal Identity, Credential, and Access Management program provides implementation guidance for identity, credential, and access management capabilities for physical access control systems (NIST, 2018). One issue that is not always covered under physical security is facility power. If the power goes out, this can be damaging to systems, data, and products. Systems need to be protected from power loss, degradation, and much power or voltage spikes (Santos, 2019). Power is taken for granted unless you have a major storm where everything is down for hours or days, depending on the severity. We have recently seen this with hurricanes, so business continuity plans are essential. Let’s take the case where an organization loses power for three hours. What type of criminal activity can be performed during this time? Remember, criminals cannot anticipate this type of power loss unless they have something to do with the disruption. However, the existing employees may take advantage of the power loss for instances of theft or document removal. This can certainly happen when camera systems are down and everyone is preoccupied with the event. Unfortunately, many organizations do not have policies written to protect the facility during a power loss. Organizations may store millions of records that can contain sensitive information. Therefore, if an organization plans to dispose of any of the information or older servers with information, they should follow stringent data destruction procedures. Additionally, the type of market may also dictate the level of data removal strategies that need to be applied. Efficient and effective management of information that is created, processed, and stored by an information technology (IT) system throughout its life, from inception through disposition, is a primary concern of an information system owner and the custodian of the data (Kissel, Scholl, Skolochenko, & Li, 2006). Santos (2019) stated the objective of physical destruction is to render the device or the media as unreadable and unusable. Devices and media can be crushed, shredded, or, in the case of hard drives, drilled in several locations perpendicular to the platters—penetrating clear through from top to bottom. Summary In summary, organizations need to review the potential dangers when it comes to physical security. Although an organization may have front desk personnel and security systems in place, there are still plenty of ways criminals can gain access to the site. We also have to consider the vendors and suppliers that regularly visit the sites. An established policy will help enforce the procedures and provide better overall results. It is also important to have accountability for each department and employee when it comes to physical security. Finally, small organizations have limited budgets, so they have to explore all solutions when it comes to security. They may not be able to hire a fulltime security guard, but they can install security cameras. It is not as effective, but it can be a deterrent. References International Organization for Standardization. (n.d.). ISO/IEC 27002:2013. https://www.iso.org/standard/54533.html Kissel, R., Scholl, M. Skolochenko, S., & Li, X. (2006). Guidelines for media sanitization: Recommendations of the National Institute of Standards and Technology (NIST Special Publication 800-88). https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=50819 McGuire, R. (2015). Police, security, safety, protection, crime, guard [Photograph]. Pixabay https://pixabay.com/en/police-security-safety-protection-869216/ National Institute of Standards and Technology. (n.d.). NIST Special Publication 500-53 (Rev. 4). https://nvd.nist.gov/800-53/Rev4/control/PE-3 Neurolink. (2017). Camera, monitoring, protection, security camera [Photograph]. Pixabay https://pixabay.com/en/camera-monitoring-protection-2456434/ Santos, O. (2019). Developing cybersecurity programs and policies (3rd ed.). Pearson . Course Learning Outcomes for Unit VII Reading Assignment Unit Lesson

Need a similar assignment?

Our expert writers can help you with your specific requirements. Get started today.

Order Your Custom Solution

Get a Price Estimate

Price Estimate

Deadline.

Number of Pages.

Price: $12

Order Now

Why Students Choose Us

  • 150+ subject experts with advanced degrees
  • 100% original work with plagiarism reports
  • Secure confidentiality and data protection
  • 24/7 customer support and progress updates
  • Unlimited revisions until you're satisfied