Using A Web Browser To Search For Information Security Polic
Using A Web Browsersearch For Any Information Security Policies Used
Using a Web browser,search for any information security policies used at your academic institution . Compare them to the ones discussed in this chapter, are there sections missing? if so, which ones? NOTE : Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises". Each assignment is due between Monday to Sunday evening by 11:59 p.m. EST. of the respective week. Each student is to select one exercise (per module exercise) from the grouping as identified below. Provide documented evidence, in Moodle, of completion of the chosen exercise (i.e. provide answers to each of the stated questions). Detailed and significant scholarly answers will be allotted full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided. All submissions need to directed to the appropriate area within Moodle. Late submissions, hardcopy, or email submissions will not be accepted.
Paper For Above instruction
Introduction
Information security policies are vital documents that establish the framework for protecting an institution's digital assets, ensuring confidentiality, integrity, and availability. Academic institutions, including universities and colleges, develop their own security policies tailored to their operational needs, regulatory requirements, and technological environment. This paper explores the typical content of these policies, compares them with standard best practices discussed in cybersecurity literature, and identifies potential gaps or missing sections.
Institutional Security Policies and Common Practices
At many academic institutions, security policies encompass a broad spectrum of guidelines regarding data management, access control, incident response, system usage, and physical security. The policies generally start with a purpose statement, scope, and definitions, followed by specific rules and procedures. Common sections include password management, acceptable use policies, data classification, remote access, and compliance requirements.
Comparison with Standard Best Practices
Standard cybersecurity frameworks, such as ISO/IEC 27001, NIST Cybersecurity Framework, and COBIT, outline comprehensive controls and processes essential for effective information security management. When examining institutional policies against these frameworks, differences often emerge. For example, institutional policies tend to focus heavily on user behavior and administrative controls but may lack detailed sections on continuous monitoring, incident reporting procedures, or third-party/vendor security management.
Sections Potentially Missing
Based on a review of typical institutional policies and standard frameworks, several key sections may be missing or underrepresented:
1. Continuous Monitoring and Auditing: Most policies lack detailed procedures for ongoing infrastructure monitoring to detect anomalous activities proactively.
2. Incident Response and Reporting: While some mention incident handling, comprehensive procedures covering detection, containment, eradication, recovery, and post-incident analysis are often absent.
3. Vendor and Third-Party Security: Policies rarely include explicit clauses on managing third-party risks, which are vital given increasing outsourcing.
4. Security Training and Awareness: A recurring omission is structured training programs to cultivate security awareness among staff and students.
5. Data Retention and Disposal: Clear guidelines for data lifecycle management are sometimes lacking.
6. Mobile and Remote Work Security: With the rise of remote learning, policies often inadequately address secure remote access and device security.
7. Physical Security Measures: While cyber controls are emphasized, physical security policies, like device protection and access to data centers, are often insufficient.
8. Legal and Regulatory Compliance: Specific guidance about compliance with laws like FERPA, GDPR, or local regulations is sometimes limited.
9. Encryption Standards: Clear encryption protocols for data at rest and in transit may not be explicitly defined.
10. Account Management and Privilege Control: Many policies do not specify procedures for managing user privileges and deprovisioning access efficiently.
Implications of Missing Sections
The absence of these critical sections can expose institutions to security risks, including data breaches, compliance violations, and operational disruptions. For example, lacking incident response procedures delays effective response to security incidents, potentially worsening their impact. Similarly, neglecting third-party security increases vulnerability to supply chain attacks.
Recommendations
It is advisable for academic institutions to align their policies more closely with established frameworks like ISO/IEC 27001 or NIST standards. Incorporating comprehensive sections on monitoring, incident management, third-party risks, and employee training enhances the overall security posture. Regular review and updates of policies are essential to address evolving threats and technological advancements.
Conclusion
While most academic institution security policies cover foundational elements, significant gaps remain when compared to comprehensive cybersecurity frameworks. Addressing these gaps through detailed, structured policies can significantly improve the institution’s resilience against cyber threats and ensure compliance with legal standards. Continuous policy review, staff training, and adopting best practices are critical steps toward creating a secure academic environment.
References
- ISO/IEC 27001:2013. Information technology — Security techniques — Information security management systems — Requirements. International Organization for Standardization, 2013.
- NIST Cybersecurity Framework. National Institute of Standards and Technology, 2018.
- COBIT 2019 Framework: Designing, Build, and Implement. ISACA, 2019.
- Schneider, J., & Perry, M. (2020). Cybersecurity policies in higher education: An overview. Journal of Educational Technology & Society, 23(4), 150-162.
- Rittinghouse, J. C., & Ransome, J. F. (2017). Cybersecurity on the connected world. CRC Press.