The objectives of this study were to analyze the implementation of information security systems in an administrative context and to determine the procedures needed and the necessary technical advice required to guarantee the safety of the data handled by computer networks for FIT. The study hypothesized that privacy, remote printing, data and program back-up, and portable computers are key aspects of accurate network security and protection for FIT.
The findings of the study can be used to create a network security policy plan that will ensure maximum protection of the FIT computer networks and the information shared on these networks. This policy will be applicable to all individuals, computers, and data communication systems within the FIT networks, including personal portable computers. The study found the following elements to be essential to the effective protection of FIT networks:
Privacy
FIT can claim any data and communication that passes through its computers and systems. FIT is mandated to inspect this information based on the assumption that any data conveyed through its networks is official and therefore concerns the organization directly. Users on FIT computers and systems therefore do not have any privacy and have no claim on the information conveyed. This should be clearly stated in the policy for the sake of users.
Portable Computers
Portable computers that are linked to the FIT networks also present security challenges. These portable devices largely belong to employees and contain both personal information and FIT data. To ensure protection of the FIT data without encroaching on the privacy of the device owners the policy will outline ways for employees to keep their confidential information safe from administrators as their devices will automatically be scrutinized once they join the network. The policy will also give employees tips on how to keep their devices safe from theft.
Data and Program Backup
An essential element of security is storage. Storing of data must be done correctly in order to ensure the data is safe from all physical and virtual threats. The stored information should also be regularly analyzed to ensure it has not been tampered with, and to discard data that is no longer useful or necessary.
Remote Printing
Remote printing is a normal and convenient part of the day-to-day activities of any organization. As part of the policy plan, all information shared to remote printers is open to scrutiny from FIT administrators. This provides the organization with another avenue to safeguard their data by reviewing all printed material and linking it back to its source.
These elements of security will be implemented as part of the policy plan along with other basic security techniques. All users of the FIT networks will be provided with unique passwords in order to access the information stored within these networks. This will help FIT keep track of the authorized users in their systems. Users will be required to keep these passwords private and change them following a defined period. The login and logoff process will also require the users to identify themselves. This is crucial as accurate identification allows administrators to trace any suspicious activity back to specific users based on the login and logoff data. Finally, restricted access on certain information will help improve network security by minimizing the exposure to potential threats.