KEMBAR78
Unit 4 Htcs | PDF | Security | Computer Security
0% found this document useful (0 votes)
5 views5 pages

Unit 4 Htcs

Personnel security practices are essential for mitigating human-related risks within organizations, focusing on access control, contractor management, employee clearances, and security training. Effective auditing and monitoring enhance security by evaluating the effectiveness of programs, investigating breaches, and ensuring compliance with privacy regulations. Key measures include role-based access, periodic reviews, and maintaining detailed logs to support accountability and transparency.

Uploaded by

ayush231225
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views5 pages

Unit 4 Htcs

Personnel security practices are essential for mitigating human-related risks within organizations, focusing on access control, contractor management, employee clearances, and security training. Effective auditing and monitoring enhance security by evaluating the effectiveness of programs, investigating breaches, and ensuring compliance with privacy regulations. Key measures include role-based access, periodic reviews, and maintaining detailed logs to support accountability and transparency.

Uploaded by

ayush231225
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Unit 4

Personnel Security Practices and Procedures

Personnel security is a foundational element of organizational security. It focuses on reducing


human-related risks such as insider threats, negligence, or social engineering attacks.

1. Access Authorization and Verification (Need-to-Know Principle)

This ensures controlled access to sensitive resources.

Key Concepts:

• Role-Based Access Control (RBAC): Access is granted based on job role.

• Least Privilege Principle: Users receive the minimum access necessary to perform tasks.

• Access Verification Techniques:

o Two-factor/multi-factor authentication (2FA/MFA)

o Smart cards, biometrics

o Periodic review of access rights

Example in Practice:

In a bank, only branch managers can authorize high-value transactions, while tellers have limits.
Access to the transaction approval system is restricted to them.

2. Contractors

External personnel like consultants or vendors may temporarily work with an organization.

Risks:

• Less organizational loyalty

• May bring infected devices or software

• May access confidential data and leave without accountability

Security Measures:

• Temporary and role-limited access

• Dedicated contractor systems/networks

• Contractor logs and activity monitoring

• Exit clearance when contract ends

Real-Life Scenario:
In 2013, Edward Snowden, a contractor for the NSA, leaked classified information due to inadequate
monitoring and excessive access rights.

3. Employee Clearances

Security clearances align with the sensitivity of the data or systems handled.

Levels of Clearance:

• Public Trust: For non-sensitive positions

• Confidential: Basic sensitive info

• Secret/Top Secret: National security-related or highly sensitive operations

Clearance Process:

• Background verification (criminal, employment, education)

• Psychological evaluations (for high clearance)

• Revalidation every few years

Key Point:

High-clearance roles are audited more frequently and monitored closely.

4. Position Sensitivity

Risk analysis of a job role determines how much security scrutiny it requires.

Factors Considered:

• System/data access level

• Financial transaction power

• Decision-making authority

Example:

A payroll officer has moderate sensitivity, while a cybersecurity analyst in a defense firm has high
sensitivity.

5. Security Training and Awareness

Most cyber-attacks succeed due to human error or negligence.

Training Topics:

• Data protection laws (e.g., GDPR, HIPAA)

• Email and link phishing identification


• Device security and secure browsing

• Incident reporting procedures

Awareness Methods:

• Monthly newsletters

• Security posters in offices

• Simulation drills (e.g., mock phishing emails)

Real-World Example:

In a 2021 case, attackers sent a phishing email that successfully tricked employees into revealing
login credentials. Post-incident training was made mandatory.

6. Systems Maintenance Personnel

These include:

• System administrators

• IT support staff

• Software patch managers

Unique Challenges:

• Elevated access (often full control)

• Ability to install/uninstall software

• Manage configurations affecting all users

Controls:

• Assign tasks to multiple people (separation of duties)

• Maintain detailed audit logs

• Conduct exit interviews and ensure immediate revocation of access

Auditing and Monitoring

Auditing and monitoring enhance transparency, accountability, and proactive threat detection in
organizations.

1. Conducting Security Reviews

Review Types:

• Physical Security Reviews: Are server rooms secure? Are entry logs maintained?
• Technical Reviews: Are firewalls, antivirus, and IDS working properly?

• Policy Reviews: Are current security policies still effective and compliant?

Frequency:

• Scheduled (e.g., quarterly)

• Triggered by changes (e.g., after a cyberattack or system upgrade)

2. Effectiveness of Security Programs

Simply implementing a security solution is not enough — evaluating its effectiveness is crucial.

Metrics Used:

• Number of security incidents detected

• Employee response rate to phishing drills

• Average time to detect and respond to a breach

Example:

An organization runs a simulation where a USB labeled “confidential” is dropped in the parking lot. If
staff plug it in, training is re-evaluated.

3. Investigation of Security Breaches

A forensic and legal process, critical for identifying cause, accountability, and impact.

Steps:

1. Detection – IDS alerts, logs

2. Containment – Disconnecting affected systems

3. Analysis – Reviewing logs, interviewing users

4. Eradication – Removing malware or threats

5. Recovery – Restoring systems

6. Lessons Learned – Updating procedures and training

Tools Used:

• SIEM (Security Information and Event Management)

• Digital forensics software (FTK, EnCase)

4. Privacy Review of Accountability Controls

Ensures individuals’ data is processed legally and securely.


Activities:

• Assess access control policies for personal data

• Review consent mechanisms

• Verify encryption of sensitive data in storage and transit

Example:

Under GDPR, companies must be able to show who accessed personal data, when, and why.

5. Review of Audit Trails and Logs

Logs are a timeline of events in the system — invaluable during audits and investigations.

Types of Logs:

• System Logs: Logins, logouts, file changes

• Application Logs: Software use and errors

• Network Logs: IP addresses, connection attempts

• Security Logs: Intrusion attempts, antivirus activity

Good Practices:

• Logs should be protected from alteration

• Retained as per legal/compliance rules (e.g., 3–7 years)

• Integrated into SIEM for real-time analysis

Real-Life Relevance:

A bank detects a late-night login from a country where it doesn’t operate. Logs confirm unauthorized
access and trigger an investigation. The attack is mitigated before funds are compromised.

You might also like