Required By US Federal Laws IT Compliancy Audit Mandated
11-8-2017
Unit 5 Discussion 2
Response by: Miss. Bayo Elizabeth
Cary, AA, BA, MLIS
Directions: Identification of Office
Security Violations:
"Today's
state-of-the-art network security appliances do a great job of keeping the
cyber monsters from invading your business. But what do you do when the monster
is actually inside the security perimeter? Unfortunately, all of the crosses,
garlic, wooden stakes, and silver bullets in the world have little effect on
today's most nefarious cyber creatures" (Manky, 2010).
Review
the Office
Security Violations media and identify at least 10
security violations. For each violation, describe a remediation strategy. As
the auditor, develop an e-mail for the director of this facility and include
the violations as well as the remediation strategies along with a date for a
second audit.
Reference
Manky, D. (2010). Top 10 vulnerabilities inside the network.
Network World. Retrieved from http://www.networkworld.com/article/2193965/tech-primers/top-10-vulnerabilities-inside-the-network.html
Email: Security Violations and Independent Audit:
By: Miss.
Bayo Elizabeth Cary, AA, BA, MLIS
To: Staff/Listserv
From: CEO, Director, and President: Miss. Bayo Elizabeth Cary, AA, BA,
MLIS
Date: November 8, 2017
Subject: Initial IT Security Audit
. . .Companies have ethical obligations to improve
information security arising out of a duty to avoid knowingly causing harm to
others and, potentially, a duty to exercise unique capabilities for the greater
social good and to buttress stable functioning of social institutions. (Matwyshyn,
2009, p. 579)
To Whom It May
Concern:
Introduction: Results of My Initial IT
Security Audit:
Thank you, for inviting me to your
professional offices, for a formal walk-through, and initial IT security audit.
The “threat analysis, is the first actions required, to setting up, a clear,
and well-defined, line of defense, to protect IT information (Smith, 2005, p.
13). Below, I have provided a list, of what I have identified, as the most
obvious security violations, that require your attention. It must be a
priority, of your company, to repair, and to fix, any-and-all IT: security and
management risks, that have left you, out of current compliance. Below, is the
guidance and suggestions, that I can provide, regard bringing, your company
back into, the legally required compliance, to protect, the: data stored:
List of Inter-Office IT Security Violations:
As Per Initial Audit #1-14 Examples:
(Allour, et., al., Security Violations, n.d.)
1. Unauthorized Access at Entrance/Exit:
Entrance
and exit can be controlled, with: CCTV cameras, office guards, and a
complicated security entrance. Key entrances, and key pad entrances, are easy
to violate-the information, is often duplicated, and shared. There are newer,
high security entrance pads, that require a thumb print, or iris verification.
The admissibility of evidence, from a CCTV recording, is dependent upon, the
general evidence admissibility rules, that are applicable, to any evidence,
submitted to court, in-order-to support-or to refute, any given legal argument
(Murphy, 1999, p. 385).
2. Visible Sensitive Private Documents, Paperwork:
Paperwork, must be kept confidential,
and private at-all-times. File cabinets, need to be locked. Desk drawers need
to have locks. At no time-ever, should office employees, be permitted, to take
their computers, or files home with them-to work, outside of the office (George,
2009, p. 39). All company work: communications, hard copy files, and computer
data files, are legally bound, to remain-at the company’s offices, and in the
inter-office setting.
3. Confidential Inter-Office Information on
Whiteboard:
Confidential information, should never
be written, on the office Whiteboard. The office Whiteboard, is for “public”
information-i.e.: a reminder not to smoke, anywhere in, or around the building.
Inter-office emails, memos, and other communications, must be kept, private,
and confidential, and can be discussed, during conference times, or-replied to
online, and only on the company computers (George, 2009, p. 39).
4. Paper that Requires Shredding:
Paper, that is waiting to be
shredded, must be kept, in a closed, and locked container. It is against
company policy, to hire-out, for a third party, to handle any confidential
documents disposal. Disposal of confidential documents, can only happen, in the
copy room, and not anywhere else in the office space.
5. Shredded Paper Left in Waste Basket:
Shredded documents, cannot be left in a
garbage can, or other unsecured, or open container. Shredded documents, still
contain confidential information, and are not fully disposed of, after
shredding. Shredded documents, need to be fully disposed of, and taken to the
basement, and burned in the broiler, in the boiler room.
6. Papers Left in the Copy Room:
At no time, should any lose papers, be
left in the copy room. If you have taken the time, to make copies, then, remove
those papers with your person, when you exit the copy room-unless, you need to
add paper, to the sealed container, for confidential documents, that will be
shredded.
7. Computer Manuals the Are Left Available:
Computer, server,
and other operational manuals, are to be treated, as a security risks, if left
available on tables, or desks-unattended. Operations manuals, that provide
information, regarding how to access data, or how to access electronic
appliances, that store, company information, are to be stored-under lock, and
key, in the company library, and under the constant watch, of our research librarian.
8. Server Room/Conference Door Left Ajar:
Doors, must be kept closed, and
locked-at-all-times. If there is a meeting, in session, then, the attendants,
must close the door. Each individual attending, should enter the meeting room,
one person at a time. The inter-office security systems, will not permit
multiple entrances, based on one thumbprint, or one iris scan.
9. Company and Office Operations Books Left in
Break room:
The breakroom, is for eating only.
The break room, is not for: “water cooler,” professional conversations, or for
reading confidential inter-office communications, or other materials, borrowed,
from the company library. It is important, that company finances, are not
wasted, replacing: journals, books, or other manuals, and confidential
materials, that have been: damaged-in, or stolen-from the break room.
10. Out-of-date Fire Extinguisher:
An out-of-date, fire extinguisher, is a
US fire code violation. The number, on the tag, of the old fire extinguisher,
must be called. The fire extinguisher, is certified, and is registered, and
must be kept, up-to-date, based on the US fire codes-or, it might not work, in
the state, of an emergency. The US fire department, authorizes unannounced,
fire safety checks, and inspections. From 2000-2007, the United States
experienced an exponential increase, in terror attacks, that were acts of arson
(Alexander, 2008, p. 104).
11. Front Door and back Door Security Officer
Missing:
There are a number, of different
barriers, that can be appropriately applied, to protect the IT information,
stored. The safety, that both: front and back door, security officers provide,
ensures, that a physical body, has the opportunity, to confront those, who
would attempt to violate the security measures, of the company premises.
12. Unrestricted Access to Elevator:
Elevator access, needs to be restricted.
Elevator access, to any floor, above the 1st floor, can be
restricted, with a thumbprint, or iris specific key-just like the: front and
back door, all the hallways, the break room, the server room door, the library,
and any of the conference rooms. It is not enough, to restrict entrance, at the
front and back doors. IT information, is valuable, and, must be protected, with
more than a basic: lock, and key-that can be easily reproduced, or, a key pad
entrance-that can be shared.
13. Cubicle Office Design:
The
cubicle office lay-out desk plan, does not allow for enough privacy.
Conversations, can be easily heard, and repeated, and the desk itself, and the
computer sitting on it, are not safe enough either. People walking by, can lean
into a cubicle, and steal paper work, or log into, someone else’s computer-the
password protection, will never be enough, to keep computer data safe (Smith,
2005, p. 15).
14. Doors Missing on Office Hallways:
Anywhere that there is a doorway, there needs
to be a secured door. The more difficult it is, to make it in, and then back
out of the building-the safer the IT information, inside will be. CCTV cameras,
and the office front and back door guards, are online the 1st
defense, in keeping the data, and information stored at the company’s
offices-safer: “multiple barriers” (Brooke, 2001, p. 75).
Date and Time Intended for Second Audit:
TO: Office Staff/Listserv
FROM: CEO, Director, and President: Miss. Bayo Elizabeth Cary, AA, BA,
MLIS
DATE: December 8, 2017
SUBJECT: Second Audit: Security Walk-Through: Compliance Check.
Closing Message: Regarding the Follow-Up Appointment, for Compliance
Check:
It is imperative, that, where security
weakness have been identified, that corrections are made, as prelegal
compliancy requirements, for US standards. I will return, in exactly 1
month’s-time, if, at any-given point in time, between now, and my return visit,
the office requires additional information, regarding US IT compliancy
requirements: “The US Federal Information Security Management ACT, and the 17
areas of mandated controls,” please do not hesitate, to contact me (Dreger, 2009,
p. 34).
References
Alexander, Dean.
(2008). Contemporary and Future Terror Arson Threats. Security. Vol. 45, No. 3.
p. 104. Retrieved from www.securitymag.com
Allour, Kathleen, Braithwaite,
Graame, Meyer, Danielle, Kaardal, Taylor, Matt, Thompson, Andrea& Roudenko,
Fira. (n.d.). Office Security Violations. Capella University Online. Retrieved from
https://media.capella.edu/CourseMedia/IAS5002/OfficeSecurityViolations/transcript.asp
Brooke, Paul. (2001). Building
and in-Depth Defense. Network Computing: Workshop Security. Vol. 12. No. 14. p.
75-77. Retrieved from www.networkcomputing.com
Dreger, Richard. (2009).
5 Key Steps to Cyber Security: Technologies like DLP, crypto, and strong access
controls help lock down info. Information Week. Vol. 1251. p. 34. Retrieved
from www.cybersecurityweek.com
George, Randy. (2009).
An Ounce of Loss Prevention: Our survey shows the regulatory climate is heating
up sales of DLP suites. Information Week: Analytics Data Loss Prevention. Vol.
1235. p. 39-40. Retrieved from www.informationweek.com
Matwyshyn, Andrea M. (2010).
CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices.
Journal of Business Ethics. Vol. 88. p. 579-594. DOI
10.1007/s10551-009-0312-9
Murphy, Thomas.
(1999). The Admissibility of CCTV Evidence in Criminal Proceedings. International
Review of Law Computers and Technology. Vol. 13, No. 3. p. 383-404. Taylor and
Francis, Ltd. ISSN: 1369-0869
Smith, Randy Franklin.
(2005). Core Concepts: Defense in Depth. Windows It Security. Vol. 5, No. 11.
p. 13-15. Retrieved from www.windowsitpro.com/windowssecurity
Comments
Post a Comment