Final Work Miss Jennita Appanah
Final Work Miss Jennita Appanah
Final Work Miss Jennita Appanah
Group Assignment
Team Members:
Abdurrahman Noor-Ul-Haqq Gurib (Team Leader)
Prabha Devi Jeewooth
Varun Mohunah
Jean Terry Castel
DCY1B
IT207
August 12, 2022
As we move further into the 21st century, the importance of ISO 27001‘s emphasis on
information protection is becoming increasingly clear to organizations. In this context, waiting
until it’s too late can be disastrous for an organization’s reputation in the market as a safe
vendor to do business with.
ISO 27001 is an internationally recognized framework that ensures the organization analyses
the gaps in its information security policies and makes changes that meet the best practices of
cybersecurity and awareness amongst staff. This process helps to identify the level of
compliance that your existing management system has in the context of information security
and allows you to mitigate potential threats to your organization before they impact your
bottom line.
We have to realize that management has a mindset and an obligation to improve the business’s
figures and performance. What they need is the Return on Investment (ROI), so, if you are
trying to convince your management team that there is a need for ISO 27001 standard, you
have to talk about investment, not expenditure.
To seek your management’s attention, you have to speak their language. Top management, like
Executives, General Managers, etc., wants to see everything in their profitability. Therefore, it
is important to emphasize how ISO 27001 can be profitable for the business.
Questions:
1. As an ISO 27001 implementer for the company, you need to come up with concrete
layman explanations to show the management why ISO 27001 is important for the
company. (5 marks)
ISO 27001 is a methodical way of managing sensitive corporate data and ensuring its
security. It encompasses the implementation of a risk management method as well as
people, procedures, and IT systems.
But why would businesses choose to undergo the ISO 27001 certification procedure?
First, make sure your cybersecurity program is sufficiently secure. To make
cybersecurity work for the firm rather than against it, the certification process searches
for areas of weakness.
Second, adherence to ISO 27001 facilitates the two factors that are crucial for every
business: employee and customer trust. If you couldn't ensure the protection of their
personal information, who would opt to use your service or work for your business?
Last but not least, ISO 27001 accreditation is a terrific instrument for streamlining
internal operations, getting rid of outdated procedures, and guiding your company
toward continual progress.
2. Explain how being ISO 27001 certified will increase the profit of the company?
(5 marks)
Although ISO 27001 compliance is not required for any organization, businesses may
opt to attain and maintain it as proof that they have put in place the appropriate security
controls and procedures to safeguard their systems and the private data they own.
ISO 27001’s framework ensures that you have the tools in place to strengthen your
organization across the three pillars of cyber security: people, processes, and
technology.
You can use the Standard to identify the relevant policies you need to document, the
technologies to protect you, and the staff training to avoid mistakes.
Indeed, the Standard’s framework has much in common with the GDPR, and
organizations can use its guidelines to achieve and maintain compliance.
But the GDPR isn’t the only framework that ISO 27001 can help you with. Its best-
practice approach to information security means it is a suitable starting point for any
number of regulations.
This will help you win new business and enhance your reputation with existing clients
and customers. Some organizations will only work with organizations that can
demonstrate that they have certified to ISO 27001.
Cyber attacks are on the increase across Europe and the rest of the world and can have
a massive impact on your organization and its reputation. An ISO 27001-certified ISMS
(information security management system) helps protect your organization and keeps
you out of the headlines.
With ISO 27001, you can create a system that has enough flexibility to ensure that
everyone maintains their focus on information security tasks. Similarly, it requires
organizations to conduct annual risk assessments, which help you make changes where
necessary.
The policy should include information about the incident response team, personnel
responsible for testing the policy, the role of each team member, and actions, means,
and resources used to identify and recover compromised data. Phases of incident
response include:
Preparation
Identification
Containment
Eradication
Recover
Post- Incident
Goals for the security awareness and training policy should include education about the
security policy and help develop an understanding of how the policy protects the
business, employees, and customers. The policy must also highlight personnel that is
responsible for creating and maintaining the training. This personnel must learn to
recognize changes in technology that impact security and the organization.
For all users, the policy should include points on maintaining workstations, email and
internet access policies, and employee responsibility for computer security. Key parts
of security awareness training include identifying social engineering tactics, limiting
system downtime, and protecting critical business information.
Requirements for remote access should be similar to requirements for onsite access.
The policy should also enforce strong passphrases, logging off when leaving their
device alone, and refraining from connecting to other networks at the same time they
are connected to the internal one. They should also require users to ensure that they are
using the most up-to-date antimalware software and operating systems.