Page 1296 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1296

Offsite Challenges to Security


                  The constant threat of theft and vandalism is the bane of
                  information security professionals worldwide. Personal identity
                  information, proprietary or trade secrets, and other forms of

                  confidential data are just as interesting to those who create and
                  possess them as they are to direct competitors and other
                  unauthorized parties. Here’s an example.

                  Aaron knows the threats to confidential data firsthand, working as
                  a security officer for a very prominent and highly visible computing
                  enterprise. His chief responsibility is to keep sensitive information
                  from exposure to various elements and entities. Bethany is one of

                  his more troublesome employees because she’s constantly taking
                  her notebook computer off site without properly securing its
                  contents.

                  Even a casual smash-and-grab theft attempt could put thousands
                  of client contacts and their confidential business dealings at risk of
                  being leaked and possibly sold to malicious parties. Aaron knows
                  the potential dangers, but Bethany just doesn’t seem to care.

                  This poses the question: How might you better inform, train, or

                  advise Bethany so that Aaron does not have to relieve her of her
                  position should her notebook be stolen? Bethany must come to
                  understand and appreciate the importance of keeping sensitive
                  information secure. It may be necessary to emphasize the potential
                  loss and exposure that comes with losing such data to wrongdoers,
                  competitors, or other unauthorized third parties. It may suffice to

                  point out to Bethany that the employee handbook clearly states
                  that employees whose behavior leads to the unauthorized
                  disclosure or loss of information assets are subject to loss of pay or
                  termination. If such behavior recurs after a warning, Bethany
                  should be rebuked and reassigned to a position where she can’t
                  expose sensitive or proprietary information—that is, if she’s not
                  fired on the spot.
   1291   1292   1293   1294   1295   1296   1297   1298   1299   1300   1301