The purpose of this assignment is to examine noncompliance of security policies and possible ways to handle these violations. In addition, students will develop a security policy document, called Rules of Behavior, in order to clarify the security policies.
Prompt
The chief information security officer (CISO) reaches out to you again and complains about the interns who appear to be violating many security policies. They do not lock their workstations, download illegal music, connect their personal devices to the organization’s computers, spend too much time on social media, and even download pornography to the organization’s computers. The CISO asks you to address these violations by developing two-page security document (Rules of Behavior) stating at least 15 rules about what activities employees are not allowed to conduct on the network. See the Department of Justice RoB template as a sample. Additionally, write three supplementary paragraphs to discuss what types of training should occur in order to keep these violations from occurring in the future. How can you proactively aim for compliance with these behaviors?
Specifically, the following critical elements must be addressed:
Address violations committed by the interns.
State at least 15 rules about network conduct.
Propose future training possibilities with three supplementary paragraphs.
Discuss how businesses can aim for compliance with behaviors.
What to Submit
Your paper must be submitted as a two-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins
Guide On Rating System
Vote
To: Chief Information Security Officer (CISO)
From: [Your Name]
Subject: Addressing Violations of Security Policies by Interns
Dear CISO,
I have taken note of the concerns you raised regarding the interns who have been violating several security policies. In order to address these violations and ensure a secure network environment, I have developed a two-page security document called "Rules of Behavior" (RoB). This document outlines 15 rules that employees, including interns, must adhere to when accessing the network. Additionally, I have also included three supplementary paragraphs to discuss the training possibilities that can help prevent such violations in the future and promote compliance with these behaviors.
Please find below the Rules of Behavior (RoB) document:
------------------------------
[Your Organization's Logo]
Rules of Behavior (RoB)
1. Workstation Security:
Employees must lock their workstations whenever they are away from their desk. Failure to do so may lead to unauthorized access to sensitive information.
2. Network Usage:
Employees are prohibited from downloading any illegal content such as unauthorized music, movies, or software.
3. Personal Device Connection:
Connecting personal devices to the organization's computers without prior authorization is strictly prohibited. This may lead to security breaches and potential malware infections.
4. Social Media Usage:
Employees must refrain from spending excessive time on social media platforms during working hours, as it may result in low productivity and compromise network security.
5. Inappropriate Content:
Downloading, viewing, or sharing any inappropriate or offensive content, including pornography, is strictly prohibited on the organization's computers.
6. Password Security:
Employees must select strong passwords, refrain from sharing them, and change them regularly. Using default passwords or easily guessable combinations is strictly prohibited.
7. Email Usage:
Employees must exercise caution when opening email attachments or clicking on links to prevent potential phishing attacks and malware infections.
8. Data Protection:
Employees must comply with data protection policies and refrain from unauthorized access, modification, or sharing of sensitive information.
9. Reporting Incidents:
Employees must promptly report any security incidents or suspected policy violations to the IT department or the designated security contact.
10. Physical Security:
Employees must not tamper with any physical security controls or devices in place to protect the organization's assets and information.
11. Personal Email Usage:
The use of personal email accounts for official communication is prohibited to prevent data leakage and maintain confidentiality.
12. System Updates:
Employees must promptly install software updates and security patches to ensure the security and stability of the organization's systems.
13. Remote Access:
Employees must follow proper procedures for remote access and adhere to any additional security measures, such as two-factor authentication.
14. Wireless Network Usage:
Employees must adhere to wireless network usage policies and refrain from connecting to unauthorized networks, especially those without encryption.
15. Compliance with Policies:
Employees must familiarize themselves with all organization-wide security policies and comply with them during their employment.
-------------------------------
In order to proactively aim for compliance with these behaviors, here are three supplementary paragraphs suggesting training possibilities:
1. Security Awareness Training:
Organize regular security awareness training sessions for all employees, including interns, to educate them about the importance of adhering to security policies and the consequences of noncompliance. These sessions can cover topics such as password security, email hygiene, safe internet browsing, and social engineering awareness.
2. Role-Specific Training:
Tailor the training program to the specific roles and responsibilities of employees. For example, provide training sessions for interns on the basics of cybersecurity, secure coding practices if applicable, and the potential risks associated with their access to network resources.
3. Continuous Monitoring and Feedback:
Implement a system for continuous monitoring of employee activities on the network, such as network traffic analysis and endpoint protection solutions. Regular feedback and reminders can be provided to employees regarding their adherence to security policies. This can include periodic email reminders, digital signage, or monthly newsletters highlighting best practices and recent security incidents.
By implementing these training possibilities, businesses can foster a culture of security awareness and vigilance among employees, reducing the likelihood of policy violations and strengthening compliance with expected behaviors.
Thank you.
Sincerely,
[Your Name]