Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Test yourself better with 300 extra Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 5:  Operational/Organizational Security (Domain 5.0; 15%)
      9  5.4  Policy and Procedures
           9  5.4.1  Security Policy
                9  5.4.1.9  HR (Human Resources) Policy

Previous Topic/Section
5.4.1.9  HR (Human Resources) Policy
Previous Page
Pages in Current Topic/Section
1
Next Page
5.4.1.9.2  Hiring
Next Topic/Section

5.4.1.9.1  Termination

While the web site http://www.cio.com has some great reading on the overall topic termination, in this work we are concerned with your job as an IT person. And it wouldn’t hurt you any to follow the footnote to a specific article438.

Since we are talking about Security+, it would be a reasonable bet to take certain computer security related precautions when someone’s employment is terminated. Going back to the concepts of “need to know” and “least privilege”, once someone is no longer employed by the organization, they no longer require access to internal systems, and are no longer subject to internal policies regarding the use of those systems.

Much of security involves reducing the risks by thinking “What if…?” and taking actions to reduce the probability of that result. In the case of terminations, if the decision originates with the organization rather than the employee, many policies recommend that the employee’s computer access be disabled before the employee is notified439.

The idea is that if the employee no longer has computer access, he or she cannot go back in and steal confidential data, install “logic bombs” to trigger a few weeks from today, etc. There is some debate about this in professional circles, with other experts chiming in to say that if no “cause” is involved (for example, if the termination is due to a financially-motivated layoff rather than an employee misdeed), you can cause more potential harm than good with this policy, by engendering ill will on the part of the terminated employee. Remember, that systems administrator you just RIF’d, who wanted a copy of his current login script, probably knows at least one vulnerability in your network for which vendors have not yet provided a fix. Legally speaking, you’re probably on safer ground locking employees out of the system prior to termination. Practically speaking, we’re not sure that that doesn’t increase, rather than decrease, your actual risk.

Termination

Disable the user’s account before informing them of termination (or immediately after they’ve informed you of their resignation)

Change other passwords to affected systems that the user may have known (just like it says in the article at CIO.com).



 __________________

438. http://www.cio.com/archive/060102/doom.html

439. http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci852407,00.html

Previous Topic/Section
5.4.1.9  HR (Human Resources) Policy
Previous Page
Pages in Current Topic/Section
1
Next Page
5.4.1.9.2  Hiring
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.