Best Practices in Information Security
Best Practices in Information Security
Best Practices in Information Security
1.1 Definitions
In these rules, maintenance and administration refer to
administering user IDs, user accounts and access rights for information systems, and
monitoring the operation and use of information systems and compiling statistics on
them.
a single data processing device or facility, or a system composed of such devices that
are owned by the University or are connected to the University network
A University unit refers to a faculty, department, division or other functional unit of the
University.
The responsible owner of a specific information system within the University refers to
the unit for which the information system has been acquired, and which designates the
persons entitled to use the information system. The owner of information materials may
also be the author of the materials, as defined in the Copyright Act.
Accountability
Definition: Accountability is an essential of an Information Security Plan. The
phrase means that every individual who works with an information System should
have specific responsibilities for information assurance. The task for which an
individual is responsible are part of the overall information security plan and can
be readily measurable by a person who has managerial responsibility for
information assurance. One example would be a policy statement that all
employees must avoid installing outside software on a company-owned
information infrastructure.The Person in charge of information should perform
periodic checks to be certain that the policy being followed. Individual must be
aware of what is expected of them and guide continual improvementEvery
information asset should be owned by an individual in the organization who
primarily responsible each one.
Its Relevance : the duties and responsibilities of all employees, as they relate to
information assurance, need to be specified in detail.Otherwise the attempt of
stablishing and maintaining information security is haphazard and virtually absent.
Users should remember that the biggest threat Category against an information
system comes from insiders.