Page 62 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 62

Information  Security and Privacy




                    Notes          4.  Alternative physical  security strategies  should  be  implemented.  When  appropriate,
                                       consider the use of window bars, anti-theft cabling (with alarm when cable is disconnected
                                       from system), magnetic key cards, and motion detectors.
                                   5.  Be prepared for  fire emergencies with appropriate  automatic non  water fire  fighting
                                       equipment, and provide appropriate staff training in its use.

                                   6.  Maintain reasonable climate control in secured rooms, with temperature ranges between
                                       50 and 80 degrees Fahrenheit, with a humidity range of 20 - 80%.
                                   7.  Minimize nonessential materials that could jeopardize a secure room.


                                          Example: Non-essential items include: coffee, food, cigarettes, curtains, reams of paper,
                                   and other flammables.
                                   8.  Dispose of confidential waste carefully and adequately to maintain confidentiality.
                                   9.  Label confidential  information appropriately  and ensure  suitable security procedures
                                       from common carriers when shipping or receiving confidential information.
                                   10.  Keep critical systems separate from general systems.
                                   11.  Store computer equipment in places that cannot be seen or reached from windows and
                                       doors, and away from radiators, heating vents, air conditioners, or other work. Workstations
                                       that do not routinely display sensitive information should stored in open, visible spaces
                                       to prevent covert use.
                                   12.  Protect cabling, plugs, and other wires from foot traffic.
                                   13.  Keep a secure inventory of equipment and peripheral equipment, with up-to-date logs of
                                       manufacturers,  models, and serial numbers.  Consider videotaping  the equipment  for
                                       insurance purposes.
                                   14.  Hardware (servers, workstations, network devices) must be replaced or upgraded within
                                       reasonable timeframes to keep the network functional. However, once a workstation gets
                                       to be four to five years old, its processing power diminishes in relation to the requirements
                                       of newer software.
                                   15.  Consider the use of maintenance contracts. Keep equipment information, contact and tech
                                       support numbers readily available at the computers.
                                   16.  When computers containing sensitive information are being maintained or repaired, be
                                       sure that sensitive data is properly passworded, encrypted, or removed from the computer
                                       before maintenance or repair.
                                   17.  Proper annual maintenance and repairing of computer equipment is required.
                                   18.  Backup media should be more secured. Some hardware techniques provide a higher level
                                       of security than non-secure media such as backup tapes, floppy diskettes, or smart cards,
                                       since the latter can be easily removed or copied. Backup on internet may be used for that.

                                   19.  Proper procedure to be used to backup system information and applications.
                                   20.  Establish a procedure and schedule of system backup.
                                   21.  Establish overall system backup responsibilities and assign them.
                                   22.  Individuals who use the computers should also have backup responsibilities.

                                   23.  Use  a rotation  of media  (using different  disks at  each  backup  and rotating  every
                                       X days or weeks).




          56                                LOVELY PROFESSIONAL UNIVERSITY
   57   58   59   60   61   62   63   64   65   66   67