ICT380 - Workshop 7
ICT380 - Workshop 7
1. We have to dump the old FTP technology of transferring files and adopt new and more
secure technology of SSH to send files to customer.
2. All the workstations need to be upgraded to windows 10 after through testing for the
compatibility of all the applications that has been currently used.
3. The access to the upper levels will only via front security desk and security officers will
be present on the security desk every time. There will be biometric access given to each
user and access to the users will be given to only specific areas.
4. Visitors should be escorted in and then out of the building of the office. There will be
proper training programs for the employees to create awareness among them.
5. All the portable workstations and devices will be encrypted to prevent data theft.
6. Password policy as described above will be applied immediately.
7. Auto locking features of the door will be implemented so that only people with
authorisation can enter the rooms and after they have entered or left the room, the
doors will automatically close it.
8. A proper BCP location will be identified and the tapes will be stored in a location away
from the city where the organisation office is located.
Considerations need to be taken into account.
1. The consideration that we need to keep in account first is that all the employees are
following the instructions that have been given to them during the training and them a
vigilant enough to point out any violation of security policy by any one.
2. The second assumption that we need to take is that till all the new changes in the
security policy have been implemented, no breach of security will take place and current
setup will be able to hold off any kind of attempt of unauthorised access.
3. The third assumption we have to take is that senior management is willing to put effort,
resources and investment into the change in security policy.
4. The fourth consideration will be regarding the backup location. We will assume that the
location that has been considered for BCP will not be hit by an outage at the same time
when the present location faces any serious outage.
5. The fifth assumption is that we have the required expertise in the organisation to
implement the changes and if we don’t have the correct experts in the company then
we will be able to hire some talent but that process will take up some extra time.
1. There need to be an internal audit performed by associates from the same company
who have the correct knowledge of the security policies and the process of
implementing them. A regular audit of the system and activities is very necessary in the
organisation.
2. There is a need of an external audit also which will bring professional from third party
organisations who will audit the security policy and implementation. This will provide
great insight on improving the existing policies.
3. Daily monitoring the access usage by the employees is required to identify any person if
tried to enter any restricted space. This will help in tightening of security in the
attempted zones.
4. The monitoring of the training progress of the employees should be considered which
will tell us how effectively the associates are participating in the training programs.
5. Organising physical workshops for the employees to create awareness in a fun and
hands on method.