Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Systems Management Overview: You are the Information Security Officer of Mahtmar

ID: 3852590 • Letter: S

Question

Systems Management

Overview:

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task

Step 4: Develop the Systems Management section of your ISP

In this week’s Lab you will develop the section on Systems Management which focuses on the user’s relationship to systems management and the responsibilities delegated to both users and systems administrators to avoid confusion. This includes:

Authentication and Encryption

System Administrator Responsibilities

User Responsibilities

Auditing

Configuration

Explanation / Answer

Information Security Officer :

The Information Security Officer is responsible for the development and delivery of a information security and privacy program for the University.The scope of this program is university wide and includes information in electronic,print and other formats.

Authentication and Encryption:

This document identifies tools that can encrypt data using methods sufficient to meet the University’sInformation Classification and Handling Standard, when used in conjunction with other requirements listed in IT Security Standard: Computing Devices.All Level of data encryption exceptions must be documented, reviewed and approved by the Information Security Officer (ISO).

Encrypting data makes it unreadable, unless the software managing the encryption algorithm is presented the appropriate credentials and keys to unlock the encrypted data. This means that if the appropriate authentication and/or keys are unavailable or become corrupted, data could be lost.

The following approaches are used when deciding “what” and “how” to encrypt data:

Responsibilities:

Manager Responsibilities:

User Responsibilities:

Auditing: