Final Unit-4 (Part-A) HTCS-601, Topic (Personnel Security Practices and Procedures) by Updesh Given To AKG Students
Final Unit-4 (Part-A) HTCS-601, Topic (Personnel Security Practices and Procedures) by Updesh Given To AKG Students
Delivered by:
Mr. Updesh Kumar Jaiswal
Assistant Professor,
Department of CSE,
AKGEC, Ghaziabad.
Syllabus
Unit 1: SECURITY BASICS: Information Security (INFOSEC) Overview: critical
information characteristics – availability information states – processing security
countermeasures-education, training and awareness, critical information , characteristics
– confidentiality critical information characteristics –
integrity, information states – storage, information states –transmission, security ,
countermeasures- policy, procedures and practices, threats, vulnerabilities.
Types of Clearances:
•Confidential
•Secret
•Top Secret
Best Practices:
•Periodic reinvestigations.
•Clearance termination upon role change or exit.
•Clearance reciprocity between agencies when appropriate.
Position Sensitivity
Categories:
•Non-sensitive: No access to classified/sensitive data.
•Public Trust: Access to systems or roles that impact public safety or
trust.
•National Security: Positions that could cause damage to national
security, if compromised.
Process:
•Conduct position risk assessments.
•Categorize roles accordingly.
•Implement clearance and monitoring based on sensitivity.
Security Training and Awareness
Security training and awareness programs are designed to educate
employees about security policies, threats, and best practices to maintain a
secure workplace.
Goals:
•Ensure personnel understand their responsibilities
•Prevent insider threats (accidental or malicious)
•Encourage reporting of suspicious activities
Training Types:
•New hire orientation
•Annual refresher courses
•Role-specific training (e.g., for IT or HR personnel)
•Phishing simulations and social engineering drills
Delivery Methods:
•Online modules
•Instructor-led sessions
•Posters and newsletter
Systems Maintenance Personnel
These individuals maintain, troubleshoot, and upgrade IT systems. Due to
their elevated/improved access, they are a high-risk group and must be
carefully managed.
Risks:
•Unauthorized access or changes to systems.
•Potential for data exfiltration.
•Exploitation by external threat actors.
•Proper oversight of systems maintenance personnel is crucial because
they often possess "superuser" or administrative rights, which can be
misused if not monitored.
Controls:
•Background checks before hiring.
•Strict access control and logging.
•Supervised access in high-security environments.
•Segregation of duties.
•Regular review of administrative privileges.
References
Text books:
1. Information Systems Security, 2ed: Security Management, Metrics, Frameworks and Best
Practices, Nina Godbole, John Wiley & Sons.
2. Principles of Incident Response and Disaster Recovery, Whitman & Mattord, Course
Technology ISBN:141883663X.
3. Dr. Surya Prakash Tripathi, Ritendra Goyal, Praveen Kumar Shukla, KLSI. “Introduction to
information security and cyber laws”. Dreamtech Press. ISBN: 9789351194736, 2015.
Websites:
1.https://swayam.gov.in/nd2_nou20_cs01/preview
2.http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf
Research papers:
1.Fotis, F. (2024). Economic impact of cyber attacks and effective cyber risk management
strategies: A light literature review and case study analysis. Procedia Computer Science, 251,
471–478.
2.Al-Gburi, Q.A., Mohd Ariff, M.A. Dynamic Security Assessment for Power System Under
Cyber-Attack. J. Electr. Eng. Technol. 14, 549–559 (2019).
19
Thank-You
If you have any question then feel free to contact me.
My email-id is:- [email protected]
Subject: HTCS-601