Page 154 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 154

Information  Security and Privacy




                    Notes          8.  Compliance – outlines measures on how compliance with this policy will be calculated
                                       including any metrics involved.
                                   9.  Sanctions – outlines what appears when the policy is violated. This may include X happens
                                       on the first offense, Y happens on the second offense, and Z happens on the third offense.
                                   10.  Review and evaluation – states when the policy must be reviewed for accuracy, applicability,
                                       and compliance purposes (i.e. SOX, HIPAA, GLBA, PCI, etc.).
                                   11.  References – Points to rigid code sections and information security standards (ISO/IEC
                                       17799, ITIL, COBIT, etc.).
                                   12.  Related documents – refers to other policies, guidelines, standards, and related documents.
                                   13.  Revisions – section for documenting ongoing alterations made to this policy document.
                                   14.  Notes – highlights notes,  tips, etc.  that can help with future policy management and
                                       enforcement.





                                     Notes  If you do all of this to construct out your policies in the right method, it’ll save you
                                     a lot of time over the long drag and make your auditors pleased to boot.

                                   Self Assessment

                                   Fill in the blanks:
                                   13.  To be precise, in order to find out exactly which security policies are required, you need to
                                       perform an information ........................ assessment.
                                   14.  ........................ include detailed steps on how the policy is being executed and enforced in
                                       your environment.
                                   15.  ........................ points to rigid code sections and information security standards (ISO/IEC
                                       17799, ITIL, COBIT, etc.).

                                     


                                     Caselet     Symantec Corp Launches Database Security Products

                                           rying to keep ahead of security threats that could affect consumers, Symantec Corp
                                           has introduced the Symantec Database Security and the Raw Disk Virus Scan. Most
                                     Tof the development work has been carried out from its Pune development centre.
                                     Talking to presspersons, Mr Mark Bregaman, Chief Technology Officer, Symantec Corp,
                                     said it had developed a new tool that would help identify root kits in the users’ systems
                                     that usually escape its antivirus tools. The new product, called “Raw Disk Virus Scan,”
                                     goes below the file level to read raw blocks of data, enabling it to  “see” rootkits that
                                     otherwise would be difficult to spot. It is a technology that has been developed bringing
                                     together  storage management  technologies from  the  erstwhile  Veritas and  security
                                     technology from Symantec.
                                     He said that most of the development work was handled by the Pune development team.
                                     The company was now shipping products to the customers. On the Symantec database
                                     security, he said that it was always ‘trying to keep the bad boys out.’ But this software
                                     would sit on the system and continuously monitor what was being sent out or received.
                                                                                                         Contd...



          148                               LOVELY PROFESSIONAL UNIVERSITY
   149   150   151   152   153   154   155   156   157   158   159