Describe about the Understanding Security Risks, IT Security Control Measurements and Management of Organizational Security of online local vet Clinic?
The organization under consideration is a small online local vet clinic. They carry put their business locally but due to the service they provide, now they are getting patients from the nearby towns also. It has four doctors, four nurses and 2 other persons for all administration and financial work. Currently they use only two computers. One for keeping all employee, order, customer details, accounting, payroll etc. and another is with Internet connectivity. Through this computer, they communicate with national veterinary organization and the suppliers of medicines etc. Thus all data about these communications, medicine supplies etc. are stored in the second computer.
They also has an online website and a web server for it. In this third system, the web data are stored and processed. The online site is used for online booking by customers, updating events etc., communicating with visitors and customers etc. In a single room, these three systems are kept. There is no restriction on entry to the room. Also there is no explicit recovery system or infrastructure there. A LAN is used to connect these three systems.
The organization has suffered from information security attacks in last few months. No data has been lost or damaged, but significant time has been wasted and their business process has been suffered severely. Due to the incident and lack of security infrastructure in the organization, national veterinary organization and the medicine supplier also has raised serious concerns.
Before expansion of the business, now the veterinary clinic want to focus on building a stronger information security infrastructure for the organization. For that purpose they have appointed an IT security Manager recently. The |IT security manager is supposed to inspect the current scenario of the organization with respect to information security. Identifying and implementing proper risk management, evaluation of the risks, identifying the required data protection processes and regulations that are applicable to the organization, analysis of the physical security infrastructure, designing and implementing a security policy for the organization, evaluating different security tools based on the policy and also conducting a security audit for the organization as an IT security manager.
In this section the information security risks of the organization will be identified and valuated.
The information technology resources and assets of the organization are the operational and transactional data of the organization. It includes different types of data and information. For example, there are customers’ information like the owner name of the pets, their contact details, credit card information etc., employee details like name, address, other contact details, certification details, payroll details of the employees, accounting and payment details, supplier details, different medical histories of the patients, communication details from national veterinary organization, customer and suppliers, the computers, web server etc.
There are several IT security risks in the information technology infrastructure of the organization. The risks are listed below,
Currently the organization lacks stronger organizational security procedures. It can be said that there is no such effective procedure now. Still there are some common and best practices followed by the staffs and the management. Those are,
Thus there are high chances of insider security risks.
In this section, there will be descriptions of the possible information security control measurements in the organization.
Currently, there is no such stronger information security control and measurement implemented in the organization. But after the recent information security attacks. The organization had installed some desktop antivirus applications in the computers and web server. But those are not updated timely and the virus database files have become outdated. The computers are not even scanned regularly for viruses.
There is no other security risks assessment procedure so far in the organization.
Currently the organization has not implemented any data protection acts or regulations. They just stores and processes third party data on their system without any consent from the owner of those data and any data privacy policy.
And there poor information security infrastructure does not conform to any data protection act currently. So, the organization is under the risks of breaching data protection requirement. According to data protection act, the organization is responsible for protecting customer, suppliers and employees data. If they fails to do so, and the data stored in their system, of while being used by them, becomes vulnerable and exposed to the information security risks or theft then the organization will be responsible.
Due to the poor IT infrastructure. The organization has already breached this act. Due to the lack of information security controls, the organization has faced some of the information security attacks and as a result all data stored in their system has been exposed to the risks.
There are several physical security issues in the organization with respect to the information security risks. The consideration of the physical security issues are listed below.
In this section the possible security policies for the organization will be discussed along with the other requirements to implement the security policy, evaluation of the suitable implementation of the security tools etc. that will be needed to implement the security policy.
The security plan should ensure at least the basic security principle confidentiality, integrity and availability of information to the legitimate users (Andress, 2014 ). After analysis of the current scenario of the organization and the information security infrastructure, the proposed security policy and implementation for the organization should consider the following factors.
To enforce the security policies described in the previous part, following tools are needed to implement those in the organization
Conducting an information security audit will consider the following factors,
Etc.
There are several issues in each of these factors. The audit checks and proposes controls to manage the human behaviors in the organization to optimize the information security of the organization. In the current organization. In the audit, it will focus on how the human resources of the organization are following the information security best practice guidelines, for example, restrictions of use of computers, data, network, |Internet etc. Because implementation of proper information security controls depends on this human resource factors. If they are not following the guidelines then there are higher chances of insider attacks and the use of all information security tools and infrastructure will have very little use. For an example, the employees have installed antivirus in the computers, but do not updates it. Thus there is no effectively of using an outdated antivirus. (Tipton & Nozaki, 2012)
References
Andress, J., 2014 . The Basics of Information Security. s.l.:Syngress.
Fay, J., 2010. Contemporary Security Management. s.l.:Elsevier.
McCrie, R., 2011. Security Operations Management. 2nd ed. s.l.:Butterworth-Heinemann.
Partida, A. & Andina, D., 2010. IT Security Management. s.l.:Springer .
Sennewald, C. A., 2011. Effective Security Management. s.l.:Elsevier.
Snedaker, S. & McCrie, R., 2011. The Best Damn IT Security Management Book Period. s.l.:Syngress.
Taylor, A., 2013. Information Security Management Principles. 2nd ed. s.l.:BCS Learning & Development Limited.
Tipton, H. F. & Nozaki, M. K., 2012. Information Security Management Handbook. 6th ed. s.l.:CRC Press.
Vacca, J. R., 2010. Managing Information Security. s.l.:Syngress.
Whitman, M. & Mattord, H., 2013. Management of Information Security. s.l.:Cengage Learning.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download