Indeed, the problem identified above is the very technical capabilities of those designing these technical security measures, and thus any security measure could likely be overridden with a fair amount of ease by these individuals (ITSP, 2005). Human resource control must also be implemented as a security measure, then, and this is done not through technology but rather through policy. A comprehensive and detailed information policy produced b the SANS Institute (2012) lists quite clearly the responsibilities and prohibitions of all employees in regards to information access, transmission, and utilization, covering far more than the issue being examined here. There are also policies for the control of information security personnel, however, and guidelines for executives and managers to control risks and exposures as a result of employee malice or avarice (SANS Institute, 2012). Simple procedural elements such as separating the work of various...
In the information age, however, they seem to multiple more rapidly than ever before. Proper safeguards -- and guards for the guards -- are necessary in order to maintain sensitive information appropriately and prevent enterprise risk.Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now