Information Security Case Study

732 Words2 Pages

In an organization availability, confidentiality and integrity are the key components, which is suppose to guide information security policies that are established. Policies set will need to “operate in conjunction with the organizations established security policy” (Whitman & Mattord, 2012). This case study will detail the legal environment at an organization, such as laws, policies and regulations. This paper will also highlight how these factors impact the availability, confidentiality, and the integrity of the information and systems.
Policies are the guidelines and rules that make an organization run efficiently and successfully. They are defined as a set of procedures and guidelines that address systematic issues and how technological …show more content…

The purposes of these security policies include protecting employees, clients and data; setting guidelines and rules for users; roles and limitations of human re; administrators and security personnel responsibilities and defining the consequences for breaking the policies set. According to Canavan and Diver (2007), organizational policies can also define the company consensus baseline stance on security to minimize risk and track the compliance level with regulations and …show more content…

• Implementing and maintaining user log in credentials and passwords.
• Creating a business continuity plan and disaster recovery plan that is in compliance with the latest government laws and regulations.
• Setting the network infrastructure policies and workstation policies to ensure the integrity of the network.
Another aspect that organization must abide by is regulations. Regulations are orders that document what may or may not be done in an organization (US Department of Interior, Indians affairs, 2011). When regulations are implemented in a company, it enforces the security control of accessing certain information. An example of an implemented regulation is FERPA; which is a federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education (US department of education, 2015). A brief description of this regulation ensures the confidentiality, integrity, and availability of student information must be protected and maintained against unanticipated

Open Document