The main objectives
of information security are: confidentiality, integrity and availability. To
achieve these three objectives, security policy needs to be the basis of
information security planning, design and implementation; and this need to be
applied to every department in an organization including general staff. Even
though policies do not specify how software and devices should be operated;
however, policies direct how issues should be addressed and how technologies
should be used in order to enhance security.
An Information security
policy will be considered weak if it does not meet the criteria of an effective
one. The criteria include: distribution, review, comprehension, compliance, and
uniform. Therefore, an information security policy is weak if:
·
The
policy has not been made readily available for review by every employee within
the organization.
·
The
organization is unable to demonstrate that employees (including: visually
impaired and non-English employees) can review the policy document.
·
The
organization is unable to demonstrate that employees understand the content of
the policy document.
·
The
organization is unable to demonstrate that employees agree to comply with the
policy. Example: employee did not sign agreement form.
·
The
organization is unable to demonstrate that the policy has been enforce
effectively upon every employee.
Any of these five points
will make an Information security policy weak. This is because a major data breach
may be caused by a single employee knowingly or unknowingly breaching the InfoSec
policy.
Impacts
of weak or lack of information security policy includes: Security breaches,
beach of confidentially, virus attack, loss of important data, damage of
equipment, unauthorized access to information, theft, and other major security issues.
Example of weak security policy:
In June 2017, Miami-Dade
school district was sued by 2 former students because the students found their social
security numbers and personal information posted on the school district’s
website. The students asked for both monetary damages and an “overhaul” of
school district’s policies on the
protection of student information. See full story here…
Giscard D
Yoryor
Metropolitan State University
References:
Principles of Information Security: Michael E. Whitman/ Herbert J.
Mattord