Security Policies Incident Response Plans

Human Threats: Theft Of Devices and Storage Media 

Risk Description

Loss of Data, devices and IT infrastructure  

Existing Controls

Security cameras and surveillance but very outdated and dilapidated 

Risk Mitigation Policy

  1. Upgrade the Security cameras and surveillance system and ensure it works 24hours /7days. 
  2. Implement security protocols for sensor placement, routine maintenance, and monitoring.  
  3. Ensure backup power sources and redundancy in critical areas. 
  4. Implement motion sensors, PIR and smart. access control in the data center and sensitive area. And implement the threshold of pre-configured alarm. 
  5. The ability to review the access control log  
  6. Restricted policies to reach out the data center and sensitive area.  

Location/Contact Person details

The chairman of risk management sub-committee in UTAS-SUR
Dr.Sami Al-Batashi, Phone: +968 9293 9604
Email: sami.albattashi@utas.edu.om

Risk Management Authority

Risk Management Committee in UTAS-SUR

Risk Likelihood

Low

Risk Impact

Medium

Risk Level

Low

Risk Incident Response Procedures

  1. Verifying the thief through surveillance cameras, in addition to, entry and exit records. 
  2. Stopping all systems and devices associated with the stolen device and prevent any possible communication from this stolen device. 
  3. Installing a replacement for the stolen device. 
  4. Restore the work to what it was and restore the data to the last shot before Device theft.  
  5. Find the thief and move him/her to legal affairs 

Risk Termination

By sending final report explained the problem causes and how we can mitigate next times.