0% found this document useful (0 votes)
57 views24 pages

Group 6 MSCSCM626

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 24

SUPPLY CHAIN INFORMATION

AND DECISION SUPPORT


SYSTEMS: MSCSCM626
GROUP PRESENTATION
GROUP 6 MEMBERS

KUSAKARA PEDZISAI C22150892K

MOYO PATRICIA C22151330E

SABUNGU LAZARUS. T C22151616M

MASHIRI TAWANDA C22150734X

MANGWIRO WELLINGTON C22151432Y


QUESTION 6

Sustainable data security is everyone’s


responsibility. Outline and justify what you
consider to be necessary components of an
organisation’s data security policy.
Introduction
Supply chain entities have become more dependent on electronic
communication and less on massive file rooms with mountains of
paper which is far much easier to access than before, hence the
need for data storage is more important than ever. This have called
for the need for safe and reliable data preservation through data
security policies. A data security policy is a set of rules and
procedures that keeps an organization's data secure (Peltier, 2016).
All data users throughout an organization must abide by this policy.
A data security policy must incorporate important components
with regard to access, storage, and usage hence the crux of this
presentation.
Definition of key terms
Sustainable data security
Chanda and Kelly (2022) define sustainable data security as investing time,
attention and capital in a way that mitigates risk, minimizes cost an maximizes
effectiveness both now and in the long term. Data security is sustainable when
security resources are implemented in a way that does not degrade the level
of security or deplete over a period of time due to anything that affects the
security of a system, (Chanda, 2021). The presenters understand sustainable
data security as a concept which involves protecting the integrity,
confidentiality, availability, and strengthening of information in the present
and future.
Purpose

The first essential component of an information


security policy is a defined purpose. Broadly, the
purpose of an organisation’s data security policy is to
protect its essential digital information. An
organisation needs to define its data security policy's
goals in a more focused and actionable way.
The purpose of a data security policy might be any
one or a combination of the following objectives:-
 To clarify an organisation’s approach to information security

 Detecting data security breaches caused by misuse of data, networks, computer


systems, or applications or by improper third-party use,

 Preventing the compromise of organization's sensitive information

 Responding to information security breaches swiftly and effectively

 Upholding organisation’s brand reputation in data security,

 Complying with legal, regulatory, and ethical requirements,

 Respecting customer rights to the privacy of their personal data

 Bolstering an organisation’s ability to respond to consumer inquiries about data


protection, security requirements, and an organisation’s compliance in these
areas
Purpose cont’d

 The essence of defining a clear purpose for a


company's information security policy enables the
organisation to tailor its security measures to provide
enhanced data protection.
Failure to articulate a clear, concrete purpose for
information security policy runs the risk that security
measures will be unfocused and ineffective.
Audience and scope

The next essential element of an information security policy is its


audience and scope.
A data policy must specify which users it will apply to and which it
will not apply to. For instance, a business might decide that it will
not include third-party vendors in its information security policy.
The more an organisation broaden the scope of its data policy, the
more its customers understand the difference between the
organisation’s internal employees and its third- and fourth-party
vendors.
In this sence, including third- and fourth-party vendors under the
broad umbrella of the company's data security policy, allows an
organisation to keep a tighter hold on client data and maintain
customer trust.
Audience and scope cont’d

Another aspect of scope to consider is what


infrastructure the policy will govern. It is important
that the policy covers all facilities, programs, data,
systems, and other technological infrastructure
within an organization, (Bishop , 2013).
To this end, this wider scope of coverage helps the
policy to reduce data security risks.
Information security objectives

The data security need to consider an organisation’s


information security objectives.
The IT industry generally recognizes three main principles
which are:-
 Confidentiality
 Integrity and
 Availability.
Information security objectives cont’d

 Confidentiality: A data security policy should keep sensitive


information assets confidential, and only authorized users
should have access to protected information. This can be
achieved by using strong passwords.
 Integrity: A data security policy should preserve data in an
accurate, complete, and fully intact form, and the data
should be operational within the organisation’s IT
infrastructure.
 Availability: The policy should also ensure that IT systems
are available to authorized users when necessary. The data
should be available continuously and reliably.
Authority and access control

An information security policy should indicate which


members of an organization have the authority to limit
access to data.
These people should be trustworthy employees with
enough data security insights to make correct decisions
about what information is shareable and what is not.
The extent of permissible data sharing may not be entirely
the organisation’s decision to make. For instance, at Coca
Cola only three individuals have access to the formula of
the company’s beverages.
Authority and access control cont’d

An organization's hierarchy plays a key role in access


control whilst lower-level employees mostly do not
have the insights or authority to grant access to
others, so they should generally avoid sharing the
data they have access to.
Higher-level managers and executives with more
comprehensive insights into the company's overall
function have usually earned the right to grant access
to information as they see fit.
Authority and access control cont’d
An organisation must sufficiently have controls to allow
authorized access and deny unauthorized access. Classic
examples of such measures such as:
 Personal Identification Numbers (PIN)
 Strong password requirements
 Biometric measures such as fingerprint access devices
 Frequent password updates
 ID cards
 Access tokens
 Swipe cards
Authority and access control cont’d

To this end, having authorisation and access control protect an


organisation from unauthorised use of data especially by laid
off employees.
Data classification

Classification of data is an essential element of an organisation’s


data security policy.
Most organisations classify data by security level. "Public,"
"Confidential," "Secret," and "Top Secret." are typical classes
that may be assigned.
Other organisations use hierarchies such as Level 1, Level 2,
Level 3, Level 4.
To this end, under these classification systems every level of
non-public data would require some form of protection, with
higher tiers or top secret requiring more stringent security.
Data classification

Data classification is of paramount importance since it


provides the basis for laying out the measures
necessary to protect the data to the required level.
Data support and operations

Data support and operations include the measures an


organisation will implement for handling each level of classified
data. There are three primary categories of data support
operations:
 Data protection regulations,
 Data backup requirements and
 Movement of data

 
Data protection regulations

 These are standards an organisation put in place to protect personally identifiable


information and other sensitive data.

 Organisations mostly align these standards with any applicable industry


compliance standards and local regulations. Most security standards and
regulations require at least a firewall, data encryption, and malware protection.

 Data backup requirements


 An organization will also need to generate secure data backups. The backups need
to be encrypted and have the backup media securely stored. In addition, there also
need for a Disaster recovery plan which spells out how the organisation protect
against data losses in the event of calamities such as fires, natural disasters etc.

 Movement of data
 An organisation should ensure data security whenever it moves its data. The policy
outlines the secure protocols to be followed when transferring data.
Security awareness and behavior

The data security policy highlight the strategies the


organization will need to implement in an attempt to heighten
its security awareness and prevent security breaches.
It may need to encourage specific employee behaviours to
bolster that awareness and thwart attacks and losses.
Some companies have their employees sign some declarations
requiring them not to divulge business information. Some
government departments workers make such declarations
under the Official Secrets Act.
This prevents leakages of information to unauthorised
individuals and companies.
Responsibilities, rights, and duties of personnel

The final component of an organisation’s data security policy


should outline the staff members' rights, responsibilities, and
duties regarding data protection since it is the responsibility of
all members to ensure data security.
This component allows an organisation to give employees some
responsibilities by designating certain individuals to perform
access reviews, educate other employees, oversee change
management protocols, handle incidents, and provide general
oversight and implementation support for information security
policy, (Schuster et al., 2015).
Responsibilities, rights, and duties of personnel cont’d

This allows clear definition of personnel


responsibilities and duties, and also a clarity on
employees’ rights and authorizations they have.
In essence, this will help an organization to avoid data
management errors that could pose severe security
risks.
REFERENCES
Bishop, J. (2013). The effect of de-individuation of the Internet troller on criminal
procedure implementation: An interview with a hater. International journal of cyber
criminology, 7(1).

Chanda, D. (2021). Principles of Sustainable Cybersecurity. Retrieved from: https://


www.bankingfosecurity.com/blogs/principles-sustainable-cybersecurity-p3127.

Chanda, D and Kelly, D .(2022). How to put cybersecurity sustainability into practice:
Retrived from
: https//www.techtarget.com/searchsecurity/tip/How-to-put-cybersecurity-sustaina
bility-into-practice
.

Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards:


guidelines for effective information security management. CRC Press.

Schuster, F., Costa, M., Fournet, C., Gkantsidis, C., Peinado, M., Mainar-Ruiz, G. and
Russinovich, M., (2015). Trustworthy data analytics in the cloud using SGX. IEEE
symposium on security and privacy (pp. 38-54). IEEE

You might also like