IT Security Policies
Cyber-security threats have been sky-rocketing recently; this calls for the implementation of stiffer measures by every organization to facilitate the security of user information and promote integrity. Therefore, based on how vulnerable a domain is, policies should be implemented to curb those risks or threats. Every organization has the LAN domain, which encompasses the routers and switches. This domain is crucial as it facilitates information exchange and sharing of resources within the organization. Therefore, the domain has sufficient information, making it a significant target for most hackers. Below are some of the best practices for IT security policies aimed at securing the LAN domain.
First, use of at least two accounts where one has no administrative privileges while the other is meant only for administrative tasks to curb tampering with the whole network. Second, securing the domain administrator account. The designated administrator account should only be used while setting up the domain and during recovery in case of a disaster. Third, monitoring the running events in all computers within the LAN. This practice is essential in identifying compromises and any abnormal behavior within the network. Lastly, disabling the local administrator accounts on all computers within the system. There should be only one computer used for administrative purposes, as this practice eliminates the chances of anyone accessing the administrator’s privileges (Deibert & Rohozinski, 2010). . Don't use plagiarised sources.Get your custom essay just from $11/page
Depending on the organization’s needs and how vulnerable their domain could be, the IT department may choose to select the best framework that will satisfy their needs. The chosen framework should easily integrate with the security policies and enable the organization to manage security risks (Bernroider & Ivanov, 2011).
Due to changes in technology and insecurity patches, the policies implemented should be flexible and allow modification when required. Policy flexibility enables a company to be updated and implement new technologies as the company progresses.
Cohesiveness is vital in a company as it unites all members of the company, making them work as a team. During policy implementation, every member is responsible for the success of those policies. Therefore, the participation of all members in policy implementation makes those policies have a positive impact on the company.
Coherency and teamwork between members are essential in a company. During the implementation of security policies, the most crucial part is ensuring all members are on the same page. This helps all activities within the organization to be well-structured.
Ownership is a responsibility that should be played by the authorized people within a company. The senior management is supposed to evaluate the policies to be implemented and making a final decision. Ownership brings order in the company through proper governance and management.
References
Deibert, R. J., & Rohozinski, R. (2010). Risking Security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15-32.
Bernroider, E. W., & Ivanov, M. (2011). IT project management control and the Control Objectives for IT and related Technology (CobiT) framework. International Journal of Project Management, 29(3), 325-336.