Võ Minh Khánh - SE140781 Trần Đăng Khoa - SE140934
Võ Minh Khánh - SE140781 Trần Đăng Khoa - SE140934
Võ Minh Khánh - SE140781 Trần Đăng Khoa - SE140934
- Regulatory policies
Regulatory policy is formulated by governments to impose controls and restrictions on certain
specific activities or behavior. Regulation is not only about rules of governing but also a concept in
governance.
- Constituent policies
Constituent policies are concerned with the establishment of government structure, establishment of
rules or procedures for the conduct of government, rules that distribute or divide power and
jurisdiction within the present and future government policies might be made.
- Redistributive policies
Redistributive policy a policy in which costs are born by a relatively small number of groups or
individuals, but benefits are expected to be enjoyed by a different group in society.
2. In order to effectively implement a policy framework, what three organizational elements are
absolutely needed to ensure successful implementation?
3.Which policy is the most important one to implement to separate employer from employee?
Which is the most challenging to implement successfully?
The most challenging to implement successfully is the policy related to people because user
domain is known as the most vulnerable domain. The most important one would also be the ones
related to people wtih the same reason.
4. Which domain requires stringent access controls and encryption for connectivity to the
corporate resources from home? What policy definition is needed for this domain?
The remote access domain definitely the one domain that we need to controls controls and
encryption for connectivity to the corporate resources from home.
5. Which domains need software vulnerability management & vulnerability window policy
definitions to mitigate risk from software vulnerabilities?
6. Which domain requires AUPs to minimize unnecessary User-initiated Internet traffic and
awareness of the proper use of organization-owned IT assets?
7. What policy definition can help remind employees within the User Domain about on-going
acceptable use and unacceptable use?
Regulatory policies.
8. What policy definition is required to restrict and prevent unauthorized access to organization
owned IT systems and applications?
Constituent policies
9. What is the relationship between an Encryption Policy Definition and a Data Classification
Standard?
Encryption Policy Definition: The goal of an encryption policy is to encrypt data at the requisite
times. For instance, IPSec and SSL provide encryption when data travels across a network but do
little to protect data stored on disk or in a database.
Data Classification Standard: The UNSW Data Classification Standard is a framework for
assessing data sensitivity, measured by the adverse business impact a breach of the data would
have upon the University.
Policy: Policies are formal statements produced and supported by senior management.
Policies are enforceable and mandatory, which means there are consequences if they're not
followed.
Standard: Standards are mandatory courses of action or rules that give formal policies support
and direction.
This makes sure everything and everyone is consistent in their performance across the
organization.
Procedure: Procedures are detailed step-by-step instructions to achieve a given goal or
mandate.
They often go hand-in-hand with policies and guidelines.
Guidelines: Guidelines are recommendations to users when specific standards do not
apply.
Guideline gives the reader guidance and additional information to help the audience
12. Why should an organization have a remote access policy even if they already have an
Acceptable Use Policy (AUP) for employees?
A remote access policy contains everything that an Acceptable Use Policy states, as well as
additions specific to remote access. Alongside with defining rules and regulations with the use of
company assets, network connections, and organization resources, the remote access policy
further addresses issues specific to remote connections and access.
13. What security controls can be implemented on your e-mail system to help prevent rogue or
malicious software disguised as URL links or e-mail attachments from attacking the Workstation
Domain? What kind of policy definition should this be include in?
Spam filters, dynamic code analysis tools like FireEye that analyze email attachments,
blacklisting known malicious domains and senders, blackholing malicious domain redirects, and
security awareness training to help identify spam and malicious links and attachments, are some
of the security controls that an organization can employ to protect their email systems from
phishing attempts, malicious links, and virus attachments.
14. Why should an organization have annual security awareness training that includes an
overview of the organization’s policies?
Having an annual security awareness training that includes a review of the organization’s latest
version of the policies is an effective way of ensuring every employee is aware of the current
policies and cannot cite ignorance as a reason for violating them.
The purpose of defining a framework for IT security policies is to have a defined structure that
shows what the gaps in the policy are and how it can be filled. Having a proper framework will
show what adjustments are needed to strengthen the policies.