Cle Unit - 3 PDF
Cle Unit - 3 PDF
Cle Unit - 3 PDF
UNIT - I:
Introduction to Computer Security: Definition, Threats to security, Government requirements,
Information Protection and Access Controls, Computer security efforts, Standards, Computer
Security mandates and legislation, Privacy considerations, International security activity
UNIT – 2
Secure System Planning and administration, Introduction to the orange book, Security policy
requirements, accountability, assurance and documentation requirements, Network Security,
The Red book and Government network evaluations.
UNIT – 3
Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and Tier3
policies - process management-planning and preparation-developing policies-asset
classification policy developing standards.
UNIT - 5:
Organizational and Human Security: Adoption of Information Security Management
Standards, Human Factors in Security- Role of information security professionals.
REFERENCES:
1. Debby Russell and Sr. G. T Gangemi, "Computer Security Basics (Paperback)”, 2nd
Edition, O’ Reilly Media, 2006.
2. Thomas R. Peltier, “Information Security policies and procedures: A Practitioner’s
Reference”, 2nd Edition Prentice Hall, 2004.
3. Kenneth J. Knapp, “Cyber Security and Global Information Assurance: Threat Analysis and
Response Solutions”, IGI Global, 2009.
4. Thomas R Peltier, Justin Peltier and John blackley,” Information Security Fundamentals”,
2nd Edition, Prentice Hall, 1996
5. Jonathan Rosenoer, “Cyber law: the Law of the Internet”, Springer-verlag, 1997
6. James Graham, “Cyber Security Essentials” Averbach Publication T & F Group.
COURSE OBJECTIVES
1. To make the students understand the types of roles they are expected to play in the society
as practitioners of the civil engineering profession
2. To develop some ideas of the legal and practical aspects of their profession.
COURSE OUTCOMES
1. The students will understand the importance of professional practice, Law and Ethics in
their personal lives and professional careers.
2. The students will learn the rights and responsibilities as an employee, team member and a
global citizen
.
Standards of Conduct
• This policy addresses what is expected of employees and how they are to conduct
themselves when on company property or when representing the organization.
• This policy normally discusses examples of unacceptable behavior (dishonesty,
sleeping on the job, substance abuse, introduction of unauthorized software into
company systems) and the penalties for infractions.
• Also included in this policy is a statement that “Company management has the
responsibility to manage enterprise information, personnel, and physical
properties relevant to their business operations, as well as the right to monitor
the actual utilization of these enterprise assets.”
03-06-2021 DEPT OF CSE 13
• Information security should also address confidential information: “Employees
shall also maintain the confidentiality of corporate information.
• A discussion on unacceptable conduct is generally included in an employee code
of conduct policy; this should include a discussion on unauthorized code and
copyright compliance.
Conflict of Interest
• Company employees are expected to adhere to the highest standards of conduct.
• To assure adherence to these standards, employees must have a special sensitivity
to conflict-of-interest situations or relationships, as well as the inappropriateness
of personal involvement in them.
• While not always covered by law, these situations can harm the company or its
reputation if improperly handled.
• This is where discussions about due diligence will be addressed. Many
organizations restrict conflict-of-interest policy requirements to management
levels; all employees should be required to annually review and sign a
responsibility statement.
03-06-2021 DEPT OF CSE 14
Performance Management
• This policy discusses how employee job performance is to be used in determining
an employee’s appraisal.
• Information security requirements should be included as an element that affects
the level of employee performance.
• As discussed, having job descriptions for each job assignment will ensure that
employees are reviewed fairly and completely at least annually on how they do
their job and part of that includes information security.
Employee Discipline
• When things go wrong, this policy outlines the steps that are to be taken.
• As with all policies, it discusses who is responsible for what and leads those
individuals to more extensive procedures.
• This policy is very important for an effective information security program.
• When an investigation begins, it may eventually lead to a need to implement
sanctions on anemployee or group of employees.
• Having a policy that establishes who is responsible for administering these
03-06-2021
sanctions will ensure that all involvedDEPT
inOFthe
CSE
investigation are properly protected. 15
Information Security
• This is the cornerstone of the information security program and works in close
harmony with the enterprise-wide Asset Classification Policy and the Records
Management Policy.
• This policy established the concept that information is an asset and the property of
the organization, and that all employees are required to protect this asset.
Corporate Communications
• This policy will support the concepts established in the Employee Standards of
Conduct, which address employee conduct and include harassment whether
sexual, racial, religious, or ethnic.
• The policy also discusses libelous and slanderous content and the organization’s
position on such behavior.
• The policy also addresses requests from outside organizations for information.
• This will include media requests for information as well as representing the
organization by speaking at or submitting whitepapers for various business-related
conferences or societies.
03-06-2021 DEPT OF CSE 16
Workplace Security
• Workplace security policy addresses the need to provide a safe and secure work
environment for the employees.
• The need to implement sound security practices to protect employees, organization
property, and information assets is established here.
• Included in this policy are the basic security tenets of authorized access to the
facility, visitor requirements, property removal, and emergency response plans,
which include evacuation procedures. Business Continuity Plans (BCPs)
• For years this process was relegated to the Information Technology department
and consisted mainly of the IT disaster recovery plan for the processing
environment.
• The proper focus for this policy is the establishment of business unit procedures to
support restoration of critical business processes, applications, and systems in the
event of an outage.