Uploaded by sanenot

IN203 Networking with Microsoft Technologies Unit 8 assignment

advertisement
Stacy Lewellyn
IT104 Unit 8 Assignment
Professor Porter
February 7, 2022
Lewellyn 2
Operational Security Controls
Screening potential employees before hiring is essential. Looking into the past of
someone might make it possible to predict the future.
The following paragraph is my humble opinion and has not been sourced:
Job-seeking individuals should be honest when speaking with potential employers.
If someone has negative events in their past and is not honest about them, this could
be a red flag for the employer. I mention this aspect because it is my opinion that
people are capable of changing and righting their wrongs and setting out on a better
path. If their past is continuously held against them, it is impossible to improve life.
Second chances are important. However, if they do not inform potential employers
of these unfavorable events, they will appear to be hiding something and not honest
people.
A credit check is beneficial if an employee handles the organization's finances. (PreScreening Your Employees: What You Should Know, n.d.) An inability to control one's finances
could indicate a financial disaster for the employee. Desperate times could lead to desperate
measures by employees.
Criminal History reports can show trustworthiness. (Pre-Screening Your Employees: What
You Should Know, n.d.) They can also identify someone with anger issues if they have assault and
battery charges or a financial risk due to petty theft charges.
Lewellyn 3
Security professionals in the IT world have access to delicate data. The same data they are
protecting. A credit history check CAN show how responsible a person is. If they have several
accounts behind and their credit score is low, the person could become a security liability. (Security
Clearances and Cybersecurity: What You Need To Know, n.d.) Suppose the individual's credit
history is going to be the deciding factor. In that case, the employer should look at which accounts
are in arrears and question the potential employee why the accounts are not current. If the employee
had recently been displaced and lost their income, their accounts would fall behind, and remaining
current is out of their control (To Check or Not to Check: The Pros and Cons of Using Credit
Reports in the Hiring Process, n.d.).
A hiring credit check doesn't give the employer a complete credit check like a financial
institution credit check. An employer can't see the employee's credit score or how many open
accounts. They also can't see information about accounts that are in good standing. The employer
will receive the employee's social security number, past addresses, past employers, and only credit
accounts past due, charged-off, or in collections. (To Check or Not to Check: The Pros and Cons
of Using Credit Reports in the Hiring Process, n.d.) The credit check is only a partial picture of
the employee's responsibility. However, it does give information that should or could be on the
application so that the employer can verify the employee's honesty.
A credit check is a great resource as long as the employer uses it responsibly and does not
use it to decide without talking to the employer about the negative items on the credit check.
Two ways to prevent administration privilege abuse are only allowing access to those who
need to know information and separation of duties. HR needs to see the information about other
employees but the IT department does not. Encryption allows the IT department to do its job while
Lewellyn 4
protecting the information in the database. Logs could also be used and monitored by someone
other than the IT department. (Prevent Privileged User Abuse with an IT Security Policy, 2013)
Rotation of staff and a well-defined security policy that outlines the consequences of abuse
will also help with privilege abuse.
Lewellyn 5
References
Pre-Screening Your Employees: What You Should Know. (n.d.). Retrieved from Indeed:
https://www.indeed.com/hire/c/info/pre-screening
Prevent Privileged User Abuse with an IT Security Policy. (2013, February 3). Retrieved from
Verizon: https://www.verizon.com/about/news/prevent-privileged-user-abuse-it-securitypolicy
Security Clearances and Cybersecurity: What You Need To Know. (n.d.). Retrieved from Start A
Cyber Career: https://startacybercareer.com/security-clearances-and-cybersecurity/
To Check or Not to Check: The Pros and Cons of Using Credit Reports in the Hiring Process.
(n.d.). Retrieved from Employment Practices Solutions: http://www.epspros.com/newsresources/white-papers/2014-prior/using-credit-reports-in-hiring-process.html
Lewellyn 6
Download