Preview

Unit 5 Assignment 1

Better Essays
Open Document
Open Document
1355 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Assignment 1
Unit 5 Assignment 1: Implementing Comprehensive Human Resources Risk Management Plan
Human Resources Risk Mitigation:
Objective • Human resources policies and practices should reduce the human risk factors in information technology (IT) security and information access controls. Decrease the risk of theft, fraud or misuse of information facilities by employees, contractors and third-party users.
Scope • the organization’s human resources policies, taken as a whole, should extend to all the persons within and external to the organization that do (or may) use information or information processing facilities. This could include:
* tailoring requirements to be suitable for particular roles within the organization for which persons are considered;
* ensuring that persons fully understand the security responsibilities and liabilities of their role(s);
* ensuring awareness of information security threats and concerns, and the necessary steps to mitigate those threats; and
* Providing all persons to support organizational privacy and security policies in the course of their normal work, through appropriate training and awareness programs that reduce human error; and ensuring that persons exit the organization, or change employment responsibilities within the organization, in an orderly manner.
Roles and responsibilities • Security roles and responsibilities of employees, contractors and third-party users should be defined and documented in accordance with the organization 's information privacy and security policies. This could include:
* To act in accordance with the organization 's policies, including execution of all processes or activities particular to the individual 's role(s);
* To protect all information assets from unauthorized access, use, modification, disclosure, destruction or interference;
* To report security events, potential events, or other risks to the organization and its assets
* Assignment of responsibility to individuals for



Bibliography: Custom Security Policies.com. 2012. http://www.instantsecuritypolicy.com/it_policies_procedures.html?gclid=CI_U3_HmpboCFc-Y4AodInIAWg (accessed 10 20, 2013). Ledanidze, Evgeny. Guide to Developing a Cyber Security and Risk Mitigation Plan. 2011. http://www.smartgrid.gov/sites/default/files/doc/files/CyberSecurityGuideforanElectricCooperativeV11-2%5B1%5D.pdf (accessed 10 20, 2013). Risk Mitigation Planning Including Contingencies. http://www.incose.org/sfbac/armor/id12.htm (accessed 10 20, 2013).

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Centre for the protection of National Infrastructure: Sources of Guidance on Security in the Telecommunications sector…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Human resource management policies and procedures can be effective through critical decisions because the current policies may not concur with the new tendencies. For this new strategies must be put in place to reflect the new tendencies. Indeed human resource management strategies or constraints can affect company policy based upon which law the policies are written for. Different strategies are originated to comply with federal or state laws that control the entity and the strategies may not allow for changes.…

    • 496 Words
    • 2 Pages
    Better Essays
  • Powerful Essays

    With constant reports in the media of hacked sites, denial of service attacks, computer espionage and newly discovered vulnerabilities in applications and hardware, it is impossible for the management of any organization to ignore the likelihood of a security incident occurring. Over the last few years concerns to protect the organization’s assets and minimize liability has grown substantially, of recent it has become management’s personal responsibility to implement effective information security controls.…

    • 2629 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Risk Management Plan

    • 4407 Words
    • 18 Pages

    Information security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. This publication specifically addresses assessment and analysis of security control effectiveness and of organizational security status in accordance with organizational risk tolerance. Security control effectiveness is measured by correctness of implementation and by how adequately the implemented controls meet organizational needs in accordance with current risk tolerance. Organizational security status is determined using metrics established by the organization to best convey the security posture of an organization’s information and information systems, along with organizational resilience given known threat information. This necessitates:…

    • 4407 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Ima Ethical Standards

    • 555 Words
    • 3 Pages

    II. CONFIDENTIALITY Each member has a responsibility to: 1. Keep information confidential except when disclosure is authorized or legally required. 2. Inform all relevant parties regarding appropriate use of confidential information. Monitor subordinates' activities to ensure compliance. 3. Refrain from using confidential information for unethical or illegal advantage.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    | should Identify all information assets of an organization, Identify all security risks may cause an information asset loss, For each risk, identify the safeguards exist to detect, prevent, and recover from a loss…

    • 2911 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Job Analysis Hr Manager

    • 603 Words
    • 3 Pages

    * Completes human resource operational requirements by scheduling and assigning employees; following up on work results.…

    • 603 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security Manager Role

    • 1762 Words
    • 8 Pages

    To understand the role(s) of a Security Manager, a person must know what security is and what it means to an organization. According to Ortmeier, “security may be defined as a public or private service-related activity that provides personnel, equipment, and creates policies and procedures designed to prevent or reduce losses. These losses, caused by criminal action as well as by noncriminal events resulting from human error, emergencies, man-made and natural disasters, and business intelligence collection by competitors”. (2009).…

    • 1762 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    The security manager of any business is one of the most important positions within the organization. They are usually a member of the executive management team with the primary duty of overseeing the security operations for their organization. The actual responsibilities will differ based on the type of business or organization they are in, and whether or not it is a private or government operation. Whatever the organization type, one of the key functions of the security manager is assessing the risks and vulnerabilities of the organization and creating plans to mitigate them. They are charged with creating a culture of safety and security and ensuring that the company's exposure to liabilities is as little as possible. The plans that they create will generate policies and procedures that the security manager will formulate, implement, and monitor. Although, their duties differ from organization to organization, the security manager's responsibilities are essential to the daily operational success of the company.…

    • 1286 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Hr Monkey Fax

    • 473 Words
    • 2 Pages

    HR policies provide an organization with a mechanism to manage risk by staying up to date with current trends in employment standards and legislation. The policies must be framed in a manner that the companies vision & the human resource helping the company to achieve it or work towards it are at all levels benefited and at the same time not deviated from their main objective.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Peltier, T. R. ( (2002)). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton, FL.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Purpose and Use of Hrms

    • 1510 Words
    • 7 Pages

    Focusing on the purpose and uses of the human resource information systems, let’s look at the reason why managers want to implement these systems in the first place. There comes a time when your business is generating large profits and there is an immense amount of information that needs to be stored; be it about your employees or about the organization itself, there has to be a database securing this information. To ensure the security of this information along with reduction in paper work, organization of data, reorganization of processes, maintenance of profits and the employees an organization may require a human resource management system.…

    • 1510 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The importance of maintaining a consistent approach to the development, use, and review of Staff Management Information systems within the institution must be an ongoing concern of Human Resource Department. MIS should have a clearly defined framework of guidelines, policies or practices, standards, and procedures for the organization. These should be followed throughout the institution in the development, maintenance, and use of all MIS. MIS is viewed and used at many levels by management. It should be supportive of the institution 's longer term strategic goals and objectives.…

    • 1449 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    There are several strategies and policies that the human resources have in place to implement the above goals into an organization. For most companies, these generally include keeping up-to-date with federal laws and making sure that employees comply, employee record keeping and confidentiality, employee motivation and morale boosting, industrial and employee relations, performance, conduct and behavior management (this may include conducting seminars for sexual harassment or other inappropriate behavior), human resource analysis and workforce personnel data management and recruitment and selection.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays