Ex: SOD Would Be To Separate The Ability To Set Up A New Vendor Account and
Ex: SOD Would Be To Separate The Ability To Set Up A New Vendor Account and
Member:
- A task can be performed by more than one person → SOD creates the minimum
number of organizational layers needed to achieve a specific business
purpose → prevent fraud and reduce errors.
Ex: SOD would be to separate the ability to set up a new vendor account and
ability to authorize payment to a vendor. The ability both to set up and to
authorize a vendor creates an opportunity for fraud. The SOD controls reduce
the likelihood that a fake vendor is set up and paid.
- SOD sets boundaries between roles assigned to an employee, and between the conflict
of interest that may result from an employee’s responsibilities → reducing the risk
of internal fraud.
Ex: One employee calculates the gross pay and net pay information for a payroll, and
another employee verifies that one → prevents the payroll employee from paying
‘fake’ employees.
Assignment Requirements
You are appointed as an information technology (IT) security manager in the XYZ
health care organization. This publicly traded, large health care organization has
25 sites across the region with 2,000 staff members and thousands of patients.
Sean, your manager, has asked you to analyze the available situation of the
corporation and then to identify and finalize the method for creating a security
policy framework. He wants to know how you would approach this endeavor. Write
a report on how you would analyze your organization and how you would go about
identifying and finalizing the method for creating a security policy framework. He will
then compare your findings to his and move forward to make the changes that were
applicable. Be sure to research these steps from the textbook, ITT Tech Virtual
Library, and use these methods to formulate your recommendations. Complete a
report no longer than three pages describing how you would approach the task
above.
- Protect: Must have some protection such as authentication when using assets
or organization.
- Detection: Have some warning when someone try to unauthorized access
data of organization
- Response: When being attacked, the system must warn the administrator,
have a process to guide the troubleshooting when the problem occurs.
- Recovery: Must have a recovery system to reduce the damage from attacking
and the organization can go back to work immediately