Computer & Info Security Guidelines
Computer & Info Security Guidelines
Group No:
# Student Name Reg.No. Email address use in Contact
Coordinators goggle classroom Number
1 A.Lasith Rasanga TAN/IT/2019/F/0004 [email protected] 071 9610513
2 A.W. Janith Akalanka TAN/IT/2019/F/0014 [email protected] 0712619193
3 D.J.Hasini Kawshalya TAN/IT/2019/F/0072 [email protected] 0765914292
4 M.Ushadi madushini TAN/IT/2019/F/0069 [email protected] 0763857854
5 N.G.Deepika Chathurani TAN/IT/2019/F/0075 [email protected] 0714718503
Instructions to follow:
Page 1 of 17
Please Upload this word file. Copying with other groups and one-to-one copying
from web sites lead to less marks.
You have given 01-hour time to read and understand the assignment.
Purpose
These guidelines outline our company's information security practices about the confidentiality,
integrity, and availability of our ICT infrastructure (systems and processes).
1. Guidelines for standards, procedures, procedures and guidelines required to implement the
Company's information security practices
4. Provide clear guidance to authorized users on the need to protect the Youth Training Center from
misuse, modification, loss or disclosure of information assets;
5. Refer youth training centers to identify, assess and manage areas that do not support the objective of
risk management for information assets;
Establish, implement, monitor, review and improve the security standards and procedures required to
ensure that the Youth Training Centers Information Security Management System (ISMS)
documentation framework and business objectives are met.
Implementing the Information Security Management System (ISMS) Documentation Framework is the
intention of the Youth Training Center and the appropriate security measures are:
Scope
These guidelines apply to all authorized users who own, manage, access or use Information and
Communication Technology (ICT) services at Youth Training Centers.
1. Information and communication technology systems, data and information related to youth training
center networks;
2. Youth Training Center Systems;
3. Communications sent in or out of the Youth Training Center; and
4. Data belonging to youth training centers, internally or off-campus systems.
The personal responsibility of each employee is as follows.
Account Administrator:
People who support accounts by adding, modifying, or assigning account attributes such as
passwords, access, and roles.
Account holder:
Application Owner:
Administration The application admin and system administrator ensure that the application is
supported.
Identify processes / functions and provide guidance and assistance to processors / active owners
regarding important reports classified as particularly critical. Ensures that critical processes /
tasks are included in the system of academic / business integrity.
Data Owner:
It is the responsibility of the data owner to establish standards / guidelines for granting and
revoking access privileges.
End users:
The network ensures that all assigned RIT-owned or leased desktops and portable portables
comply with the above minimum standards.
All portable media containing personal or confidential information are guaranteed to comply
with the minimum standards and information access and security standards.
To improve compliance with the Standards, end users can contact support staff, such as system
administrators. The burden of compliance with each standard is placed on each end user.
Administration defines a system ad as the end user with administrative rights or system sharing
capabilities
Ensures that all existing RIT portable media that contain personal or confidential information
are configured to support the above minimum standards or that their information holder is
provided with an alternative risk management plan.
Includes network and system administrators that support systems that contain confidential or personal
information. They can be
Confirm the transfer of data rights from outgoing or former employees or contractors to current
employees or contractors
Provide technical support for information integrity, business integrity, and retirement or
electronic data destruction.
System Owner:
The system owner is ultimately responsible for providing the owner's services / activities to the
campus. Often the system owner is the manager / director, department head or CEO. It is the
responsibility of the system owner to ensure that the operating procedures comply with the
standards / guidelines set by the data owner.
third party :
Access Information compliance with any RIT management regulations relating to access and
security standards and the handling of confidential or personal information. Access to
confidential or legally regulated information is granted only when specifically permitted.
Web System Administrator:
The person responsible for certifying the client who provides web services and applications
complies with the client's standards. This person ensures that all web servers are configured to
support the minimum standard.
Volunteers:
Includes loosely affiliated but non-employee trustees, agents, members of affiliate groups, etc.
Volunteers comply with this standard and comply with any RIT management order regarding
the handling of confidential or personal information. Volunteers have limited access to
confidential or personal information.
Service The person responsible for developing and administering the content of a web service or
application.
Recommended policies
Creating a password and personal identification policy helps ensure that employees securely
create their logins or credentials. The general guideline is not to use birthdays, names, or other
readily available information.
Device control:
To control access to computers, proper access systems must be installed for computers, tablets,
and smartphones. The methods can include access card readers, passwords, and PINs.
Devices must be locked when the user exits. Access cards should be removed, passwords and
PINs should be written and should not be stored in accessible locations.
Internet access to the workplace should be restricted to business purposes only. Not only does
personal web use tie up resources, it also introduces the risks of viruses and allows hackers to
access information.
Business Email Business should only be done through email clients and clients if your business
is built around a model that does not allow it.
You may want to develop encryption procedures for your information. If your business has
information such as customer credit card numbers stored in a database, encrypting files provides
additional security.
Report employees need to understand what they want to report, how they should report it and to
whom it should be reported. Clear instructions should be published. The policy should
implement training and ensure that all employees understand the reporting procedures.
Best practices
Data protection:
Use encryption to transmit and store transmissions, and set user permissions so that only people
who are qualified to read, add, modify, or delete data in your records (or fields in the data
records). Also consider enabling DLP (Data Loss Prevention) tools, which can track what data
is going where and block unauthorized data streams.
Restrict access:
Devices This applies to anyone who uses your devices, across all data access points, and for
administrative changes to software and systems.
Be physically safe:
On Make sure there are no web servers and repositories on the site, they are placed behind a
locked door.
Use Prepare basic guidelines for appropriate use, read and sign them to employees.
Physical safety
This increases the physical security of your computer and computer peripherals, makes it
difficult to install any unauthorized malware or devices, and reduces the likelihood of theft. If
you have sensitive data on paper, CDs, DVDs, or external hard drives, make sure they are
invisible, preferably in a key-removed locker.
Keep your backup, external hard disks and media in safe areas:
Data If your data is encrypted and stored on portable media, make sure access to that media is
limited.
Keep external hard drives, USB drives and CDs / DVDs invisible, preferably in a locked
container that is sensitive to information.
Install and use only hardware from reputable sources:
Hardware You can usually modify computer hardware (eg cables and keyboards) to spy on
keyboard activity.
These are called "key loggers" because they are typed on a keyboard. The goal is usually to add
usernames and passwords.
One method of attack is to land a USB drive near the target workplace, home or vehicle. The
target can see it and connect it to their computer to identify their owner - by doing so they may
accidentally or intentionally install malicious software stored on the USB drive.
Lock your computer screen when you are outside and use password-protected screen protection:
Computer If you've running your computer and logged in, any intruder can pretend to be you
and do whatever you normally would. This can be as minimal as posting a funny but fake
Facebook update, or as serious as permanently deleting all your files and pictures.
Question2: [ 15% Marks]
Classify security attack types, list security attacks and prevention methods and tools
as according to the following table.
Eg: Google Search “classification of computer and network security attacks”
# Type of Name of Precaution methodology Security tools
Security Security available
Attack attack
Type1 Viruses Antivirus software must be Antivirus
Malware installed on the computer. software,
The firewall of the computer antimalware
network must be kept active. software,
If it is a public computer or a
computer on a public network, the
access to USB ports should be
restricted.
The use of flash memory on public
computer networks should be
limited as much as possible.
Trojans Avoid using cracked software. Trojans removal
Torrent downloads should be tools
limited as much as possible.
Use of software downloaded from
unknown websites should be
restricted as much as possible.
Worms Anti-malware must be used. antimalware
Be careful when opening software, anti
messages received from unknown worms
email addresses.
If it is a public computer or a
computer on a public network, the
access to USB ports should be
restricted.
The use of flash memory on public
computer networks should be
limited as much as possible.
Ransomware Avoid using cracked software. antimalware
Torrent downloads should be software
limited as much as possible.
Use of software downloaded from
unknown websites should be
restricted as much as possible
Be careful when opening
messages received from unknown
email addresses.
Spyware Anti-malware must be used.
Be careful when opening
messages received from unknown
email addresses.
If it is a public computer or a
computer on a public network, the
access to USB ports should be
restricted.
The use of flash memory on public
computer networks should be
limited as much as possible.
Avoid using cracked software.
Torrent downloads should be
limited as much as possible.
Use of software downloaded from
unknown websites should be
restricted as much as possible
Care should be taken when giving
device access to extremely
personal devices such as phones
IT Security
Manager
Forensic
Investigator
Information
Systems Security
Officer
Security
Engineer
Asset Security
Communications and Network
Security
Identity and Access Management
Security and Risk Management
Security Architecture and
Engineering
Security Assessment and Testing
Security Operations
Software Development Security