Page 702 - StudyBook.pdf
P. 702

686    Chapter 12 • Operational and Organizational Security: Policies and Disaster Recovery

                 Computer software and equipment is expensive, so employers expect staff
             members to take care when using it. Damage caused by irresponsible use can void
             warranties, meaning the company must pay for any repairs. Using assets in a way
             they were not intended, or breaching the recommendations or agreements estab-
             lished in the licensing or documentation (such as the owner’s manual), are consid-
             ered irresponsible uses. For example, using security software for hacking purposes
             or using equipment to hold open a door would be considered irresponsible. Users
             are expected to take reasonable levels of care when using the equipment and soft-
             ware that is issued to them.What is considered reasonable often depends on the
             equipment or software in question, but generally involves following the recommen-
             dations and best practices included in the equipment or software’s documentation.
             Primarily, it involves using common sense and taking care of the assets as a reason-
             able person would.
                 Maintaining equipment and software is not solely the responsibility of the user;
             employers must also acknowledge their part in due care.Technologies need to be
             maintained and updated regularly. For this reason, due care policies exist for the
             purpose of outlining who is responsible for taking care of specified equipment.This
             may be an IT staff member who ensures that users have the hardware, software, and
             access to resources to do their jobs properly. Because technology changes, the IT
             staff responsible for due care needs to determine the life spans of various technolo-
             gies and upgrade them after specified periods of time.
                 Due care also applies to data. Irresponsibly handling data can destroy it, unin-
             tentionally modify it, or allow sensitive information to fall into the possession of
             unauthorized users. It can also result in privacy issues. Irresponsibility on the part of
             a company can infringe on an employee’s right to privacy, such as when informa-
             tion in a personnel database or permanent record is allowed to be accessed without
             authorization. Irresponsibility on the part of users can also result in sensitive infor-
             mation becoming available to unauthorized parties, such as when a salesperson e-
             mails a client’s credit card information over the Internet to another department or
             person.As will be seen in the next section, privacy policies may also be a legislated
             requirement of conducting business in certain industries, such as those involving
             health care or finance.
                 Reasonable efforts must be made to ensure the integrity of data, including reg-
             ular checks for viruses,Trojan horse attacks, and malicious programs. Efforts must
             also be made to deal with the possibility of problems occurring, such as main-
             taining regular backups of data. By setting up proper procedures for protecting data
             and ensuring damaged data can be recovered, a system’s integrity and security are
             drastically enhanced.



          www.syngress.com
   697   698   699   700   701   702   703   704   705   706   707