MANAGEMENT of INFORMATION SECURITY Second Edition.

Slides:



Advertisements
Similar presentations
B2B Advertising.
Advertisements

Management, Leadership, & Internal Organization………..
CHAPTER 7 Business Management.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
© Prentice Hall CHAPTER 15 Managing the IS Function.
© Pearson Prentice Hall 2009
Gallup Q12 Definitions Notes to Managers
1 Auditing in the Public Interest Records Management in the Victorian Public Sector Audit objective Audit had two objectives : The first objective was.
Security and Personnel
CSCU 411 Software Engineering Chapter 2 Introduction to Software Engineering Management.
Screen 1 of 24 Reporting Food Security Information Understanding the User’s Information Needs At the end of this lesson you will be able to: define the.
7 Chapter Management, Leadership, and the Internal Organization
Developing the Security Program
3 Chapter Needs Assessment.
Chapter 5 Developing the Security Program
Chapter 10 Managing the Delivery of Information Services.
McGraw-Hill/Irwin © 2005 The McGraw-Hill Companies, Inc. All rights reserved Chapter The Future of Training and Development.
project management office(PMO)
TEL2813/IS2820 Security Management
Developing the Security Program
Chapter 2 Strategic Training
Implementing Disaster Recovery Plans
Part 3 Managing for Quality and Competitiveness © 2015 McGraw-Hill Education.
Developing the Security Program
Management of Information Security Chapter 5 Developing the Security Program We trained hard ... but every time we formed up teams we would be reorganized.
Employee Orientation and Training
United States Fire Administration Chief Officer Training Curriculum Human Resource Development Module 6: Managing the Workforce.
Control environment and control activities. Day II Session III and IV.
CSE 4482: Computer Security Management: Assessment and Forensics
Matt Maher & Sreeja Nomula 1.  Define ◦ Education ◦ Training ◦ Learning 2.
Copyright Course Technology 1999
Module 1 Session 1.1 Visual 1 Managing the Implementation of Development Projects Course Overview and Introduction.
Matching PMBOK Section
Implementing Security Education, Training, and Awareness Programs
Developing the Security Program. Objectives Upon completion of this material you should be able to: –Explain the organizational approaches to information.
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
PANHA CHIET UNIVERSITY Course: Principle of Management Introduced By: YORN SOMETH, MBA Summary my Background rbs Graduated: BBA from National University.
Introduction to Security
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
A COMPETENCY APPROACH TO HUMAN RESOURCE MANAGEMENT
ENTREPRENEURSHIP Chapter # 07 The Business Plan: Creating and Starting the Venture.
Introduction to Human Resource Development -Achin Bansal -Anu A Natraj.
Chapter 8 Management, Leadership, and Internal Organization Learning Goals Define management and the skills necessary for managerial success. Explain the.
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Health Management Dr. Sireen Alkhaldi, DrPH Community Medicine Faculty of Medicine, The University of Jordan First Semester 2015 / 2016.
Planning and Organizing Chapter 13. The Planning Function Planning for a business should stem from the company’s Business Plan – The business plan sets.
Chapter 10 Personnel Procedures and Practices. Human Resources Perspectives Lack of attention to the needs of employees can have dire consequences for.
A Professional Development Series from the CDC’s Division of Population Health School Health Branch Professional Development 101: The Basics – Part 1.
Security Education, Training, and Awareness Programs Jeff Summits.
Systems Analysis and Design 9 th Edition Toolkit A Communication Tools By: Prof. Lili Saghafi.
Implementing Security Education, Training, and Awareness Programs By: Joseph Flynn.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Encouraging Security Training in a Corporate Environment Lindsey Bertugli.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
INFORMATION SECURITY MANAGEMENT L ECTURE 5: D EVELOPING THE S ECURITY P ROGRAM You got to be careful if you don’t know where you’re going, because you.
TEL2813/IS2820 Security Management Developing the Security Program Jan 29, 2008.
TEL2813/IS2820 Security Management Developing the Security Program Jan 24, 2006.
(3.6) General requirements on resources for the establishment of IMS
Information Security Policy
3 Chapter Needs Assessment.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Developing the Security Program
Developing the Security Programs
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
MANAGEMENT of INFORMATION SECURITY Second Edition.
Management, Leadership, and the Internal Organization
Management, Leadership, and the Internal Organization
Presentation transcript:

MANAGEMENT of INFORMATION SECURITY Second Edition

Management of Information Security, 2nd ed. - Chapter 5 Slide 2 Learning Objectives  Upon completion of this material, you should be able to: –Recognize and understand the organizational approaches to information security –List and describe the functional components of the information security program –Determine how to plan and staff an organization’s information security program based on its size –Evaluate the internal and external factors that influence the activities and organization of an information security program –List and describe the typical job titles and functions performed in the information security program –Describe the components of a security education, training, and awareness program, and understand how organizations create and manage these programs

Management of Information Security, 2nd ed. - Chapter 5 Slide 3 Introduction  Some organizations use the term “security program” to describe the entire set of personnel, plans, policies, and initiatives related to information security  The term information security program is used here to describe the structure and organization of the effort that contains risks to the information assets of the organization

Management of Information Security, 2nd ed. - Chapter 5 Slide 4 Organizing for Security  Among the variables that determine how to structure an information security program are: –Organizational culture –Size –Security personnel budget –Security capital budget “…as organizations get larger in size, their security departments are not keeping up with the demands of increasingly complex organizational infrastructures. Security spending per user and per machine declines exponentially as organizations grow, leaving most handcuffed when it comes to implementing effective security procedures.”

Management of Information Security, 2nd ed. - Chapter 5 Slide 5 Security in Large Organizations  Information security departments in such organizations tend to form and re-form internal groups to meet long-term challenges even as they handle day-to-day security operations  Functions are likely to be split into groups  In contrast, smaller organizations typically create fewer groups, perhaps only having one general group of specialists

Management of Information Security, 2nd ed. - Chapter 5 Slide 6 Very Large Organizations More than 10,000 Computers  Security budgets often grow faster than IT budgets  Even with a large budget, the average amount spent on security per user is still smaller than any other type of organization Where small orgs spend more than $5,000 per user on security, very large organizations spend about 1/18th of that, roughly $300 per user  Do a better job in the policy and resource management areas, although only 1/3 of organizations handled incidents according to an IR plan

Management of Information Security, 2nd ed. - Chapter 5 Slide 7 Large Organizations 1,000 to 10,000 computers  At this size, the approach to security has often matured, integrating planning and policy into the organization’s culture  Unfortunately, the large organization does not always put large amounts of resources into security considering the vast numbers of computers and users often involved  They tend to spend proportionally less on security

Management of Information Security, 2nd ed. - Chapter 5 Slide 8 Security in Large Organizations  One approach separates functions into four areas: –Functions performed by non-technology business units outside of IT –Functions performed by IT groups outside of information security area –Functions performed within information security department as customer service –Functions performed within the information security department as compliance

Management of Information Security, 2nd ed. - Chapter 5 Slide 9 Responsibilities in Large Organizations  It remains the CISO’s responsibility to see that information security functions are adequately performed somewhere within the organization  The deployment of full-time security personnel depends on a number of factors, including sensitivity of the information to be protected, industry regulations, and general profitability  The more money the company can dedicate to its personnel budget, the more likely it is to maintain a large information security staff

Management of Information Security, 2nd ed. - Chapter 5 Slide 10 Figure 5-1 Information Security Staffing in a Large Organization

Management of Information Security, 2nd ed. - Chapter 5 Slide 11 Figure 5-2 InfoSec Staffing in a Very Large Organization

Management of Information Security, 2nd ed. - Chapter 5 Slide 12 Security in Medium-Sized Organizations 100 to 1,000 Computers  Smaller total budget  Same sized security staff as the small organization, but a larger need  Must rely on help from IT staff for plans and practices  Overall, their ability to set policy, handle incidents in a regular manner, and effectively allocate resources is worse than any other size

Security in Medium-Sized Organizations 100 to 1,000 Computers (continued)  These organizations may be large enough to implement the multitiered approach to security described previously, with fewer dedicated groups and more functions assigned to each group  Medium-sized organizations tend to ignore some security functions Management of Information Security, 2nd ed. - Chapter 5 Slide 13

Management of Information Security, 2nd ed. - Chapter 5 Slide 14 Figure 5-3 InfoSec Staffing in a Medium Organization

Management of Information Security, 2nd ed. - Chapter 5 Slide 15 Security in Small Organizations 10 to 100 Computers  Has a simple, centralized IT organizational model  Spends disproportionately more on security  Information security in the small organization is often the responsibility of a single security administrator  Such organizations frequently have little in the way of formal policy, planning, or security measures; they commonly outsource their Web presence or electronic commerce operations and security training; and awareness is commonly conducted on a 1-on-1 basis

Security in Small Organizations 10 to 100 Computers (continued)  When policies exist, they are often issue- specific, and formal planning is often part of IT planning  Threats from insiders are less likely in an environment where every employee knows every other employee Management of Information Security, 2nd ed. - Chapter 5 Slide 16

Management of Information Security, 2nd ed. - Chapter 5 Slide 17 Figure 5-4 InfoSec Staffing in a Smaller Organization

Management of Information Security, 2nd ed. - Chapter 5 Slide 18 Placing Information Security within an Organization  In large organizations, InfoSec is often located within the information technology department, headed by the CISO who reports directly to the top computing executive, or CIO  By its very nature, an InfoSec program is sometimes at odds with the goals and objectives of the IT department as a whole  Because the goals and objectives of the CIO and the CISO may come in conflict, it is not difficult to understand the current movement to separate information security from the IT division  The challenge is to design a reporting structure for the InfoSec program that balances the needs of each of the communities of interest

Management of Information Security, 2nd ed. - Chapter 5 Slide 19 Figure 5-5 Woods’s Option 1: IT Department From Information Security Roles and Responsibilities Made Easy, used with permission.

Management of Information Security, 2nd ed. - Chapter 5 Slide 20 Figure 5-6 Wood’s Option 2: Broadly Defined Security Department From Information Security Roles and Responsibilities Made Easy, used with permission.

Management of Information Security, 2nd ed. - Chapter 5 Slide 21 Figure 5-7 Wood’s Option 3: Administrative Services Department From Information Security Roles and Responsibilities Made Easy, used with permission.

Management of Information Security, 2nd ed. - Chapter 5 Slide 22 Figure 5-8 Wood’s Option 4: Insurance & Risk Management Department From Information Security Roles and Responsibilities Made Easy, used with permission.

Management of Information Security, 2nd ed. - Chapter 5 Slide 23 Figure 5-9 Wood’s Option 5: Strategy & Planning Department From Information Security Roles and Responsibilities Made Easy, used with permission.

Management of Information Security, 2nd ed. - Chapter 5 Slide 24 Figure 5-10 Wood’s Option 6: Legal Department From Information Security Roles and Responsibilities Made Easy, used with permission.

Management of Information Security, 2nd ed. - Chapter 5 Slide 25 Other Options  Option 7: Internal audit  Option 8: Help desk  Option 9: Accounting and Finance through IT  Option 10: Human Resources  Option 11: Facilities Management  Option 12: Operations

Management of Information Security, 2nd ed. - Chapter 5 Slide 26 Components of the Security Program  The information security needs of any organization are unique to the culture, size, and budget of that organization  Determining what level the information security program operates on depends on the organization’s strategic plan, and in particular on the plan’s vision and mission statements  The CIO and CISO should use these two documents to formulate the mission statement for the information security program

Management of Information Security, 2nd ed. - Chapter 5 Slide 27 Information Security Roles  Information security positions can be classified into one of three types: those that define, those that build, and those that administer –Definers provide the policies, guidelines, and standards. They’re the people who do the consulting and the risk assessment, who develop the product and technical architectures. These are senior people with a lot of broad knowledge, but often not a lot of depth. –Then you have the builders. They’re the real techies, who create and install security solutions. –Finally, you have the people who operate and administrate the security tools, the security monitoring function, and the people who continuously improve the processes.

Management of Information Security, 2nd ed. - Chapter 5 Slide 28 Information Security Titles  A typical organization has a number of individuals with information security responsibilities  While the titles used may be different, most of the job functions fit into one of the following: –Chief Information Security Officer (CISO) –Security managers –Security administrators and analysts –Security technicians –Security staff

Management of Information Security, 2nd ed. - Chapter 5 Slide 29 Figure 5-11 Information Security Roles

Management of Information Security, 2nd ed. - Chapter 5 Slide 30 Integrating Security and the Help Desk  An important part of the information security team is the help desk, which enhances the security team’s ability to identify potential problems  When a user calls the help desk with a complaint about his or her computer, the network, or an Internet connection, the user’s problem may turn out to be related to a bigger problem, such as a hacker, denial-of-service attack, or a virus  Because help desk technicians perform a specialized role in information security, they have a need for specialized training

Management of Information Security, 2nd ed. - Chapter 5 Slide 31 Implementing Security Education, Training, and Awareness Programs  The SETA program is designed to reduce accidental security breaches  Awareness, training, and education programs offer two major benefits: –They can improve employee behavior –They enable the organization to hold employees accountable for their actions  A SETA program consists of three elements: security education, security training, and security awareness

Implementing Security Education, Training, and Awareness Programs (continued)  The purpose of SETA is to enhance security –By building in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems –By developing skills and knowledge so that computer users can perform their jobs while using IT systems more securely –By improving awareness of the need to protect system resources Management of Information Security, 2nd ed. - Chapter 5 Slide 32

Management of Information Security, 2nd ed. - Chapter 5 Slide 33 Comparative SETA Framework Source: NIST SP

Management of Information Security, 2nd ed. - Chapter 5 Slide 34 Security Education  Employees within information security, when not prepared by their background or experience, may be encouraged to seek a formal education  A number of institutions of higher learning, including colleges and universities, provide formal coursework in information security

Management of Information Security, 2nd Edition Slide 35 Developing Information Security Curricula  This knowledge map, which can help potential students assess information security programs, identifies the skills and knowledge clusters obtained by the program’s graduates  Creating a knowledge map can be difficult because many academics are unaware of the numerous subdisciplines within the field of information security, each of which may have different knowledge requirements

Figure 5-12 Information Security Knowledge Map Management of Information Security, 2nd ed. - Chapter 5 Slide 36

Management of Information Security, 2nd Edition Slide 37 Developing Information Security Curricula  Depth of knowledge is indicated by a level of mastery using an established taxonomy of learning objectives or a simple scale such as “understanding → accomplishment → proficiency → mastery”  Because many institutions have no frame of reference for which skills and knowledge are required for a particular job area, they frequently refer to the certifications offered in that field

Management of Information Security, 2nd Edition Slide 38 Developing Information Security Curricula  Once the knowledge areas are identified, common knowledge areas are aggregated into teaching domains, from which individual courses can be created  Courses should be designed so that the student can obtain the required knowledge and skills upon completion of the program  The final step is to identify the prerequisite knowledge for each class

Management of Information Security, 2nd EditionSlide 39 Figure 5-13 Technical Course Progression

Management of Information Security, 2nd ed. - Chapter 5 Slide 40 Security Training  Security training involves providing detailed information and hands-on instruction to give skills to users to perform their duties securely  Management can either develop customized training or outsource

Security Training (continued)  There are two methods for customizing training for users by functional background or skill level –Functional background General user Managerial user Technical user –Skill level Novice Intermediate Advanced Management of Information Security, 2nd ed. - Chapter 5 Slide 41

Management of Information Security, 2nd ed. - Chapter 5 Slide 42 Training Techniques  Using the wrong method can actually hinder the transfer of knowledge and lead to unnecessary expense and frustrated, poorly trained employees  Good training programs take advantage of the latest learning technologies and best practices  Recent developments include less use of centralized public courses and more on-site training

Training Techniques (continued)  Training is often for one or a few individuals, not necessarily for a large group; waiting until there is a large-enough group for a class can cost companies lost productivity  Other best practices include the increased use of short, task-oriented modules and training sessions, available during the normal work week, that are immediate and consistent Management of Information Security, 2nd ed. - Chapter 5 Slide 43

Management of Information Security, 2nd ed. - Chapter 5 Slide 44 Delivery Methods  Selection of the training delivery method is not always based on the best outcome for the trainee; often other factors — budget, scheduling, and needs of the organization —come first –One-on-one –Formal class –Computer-based training (CBT) –Distance learning/Web seminars –User support group –On-the-job training –Self-study (noncomputerized)

Management of Information Security, 2nd ed. - Chapter 5 Slide 45 Selecting the Training Staff  To provide employee training, an organization can use a local training program, a continuing education department, or another external training agency  Alternatively, it can hire a professional trainer, a consultant, or someone from an accredited institution to conduct on-site training  It can also organize and conduct training in- house using its own employees

Management of Information Security, 2nd ed. - Chapter 5 Slide 46 Implementing Training  While each organization develops its own strategy based on the techniques discussed above, the following seven-step methodology generally applies: –Step 1: Identify program scope, goals, and objectives –Step 2: Identify training staff –Step 3: Identify target audiences –Step 4: Motivate management and employees –Step 5: Administer the program –Step 6: Maintain the program –Step 7: Evaluate the program

Management of Information Security, 2nd ed. - Chapter 5 Slide 47 Security Awareness  One of the least frequently implemented, but most effective, security methods is the security awareness program  Security awareness programs –Set the stage for training by changing organizational attitudes to realize the importance of security and the adverse consequences of its failure –Remind users of the procedures to be followed

Management of Information Security, 2nd ed. - Chapter 5 Slide 48 SETA Best Practices  When developing an awareness program: –Focus on people –Refrain from using technical jargon –Use every available venue –Define learning objectives, state them clearly, and provide sufficient detail and coverage –Keep things light –Don’t overload the users –Help users understand their roles in InfoSec –Take advantage of in-house communications media –Make the awareness program formal; plan and document all actions –Provide good information early, rather than perfect information late

Management of Information Security, 2nd ed. - Chapter 5 Slide 49 The Ten Commandments of InfoSec Awareness Training  Information security is a people, rather than a technical, issue  If you want them to understand, speak their language  If they cannot see it, they will not learn it  Make your point so that you can identify it and they can too  Never lose your sense of humor

The Ten Commandments of InfoSec Awareness Training (continued)  Make your point, support it, and conclude it  Always let the recipients know how the behavior that you request will affect them  Ride the tame horses  Formalize your training methodology  Always be timely, even if it means slipping schedules to include urgent information Management of Information Security, 2nd ed. - Chapter 5 Slide 50

Management of Information Security, 2nd ed. - Chapter 5 Slide 51 Employee Behavior and Awareness  Security awareness and security training are designed to modify any employee behavior that endangers the security of the organization’s information  Security training and awareness activities can be undermined, however, if management does not set a good example

Management of Information Security, 2nd ed. - Chapter 5 Slide 52 Employee Accountability  Effective training and awareness programs make employees accountable for their actions  Dissemination and enforcement of policy become easier when training and awareness programs are in place  Demonstrating due care and due diligence can help indemnify the institution against lawsuits

Management of Information Security, 2nd ed. - Chapter 5 Slide 53 Awareness Techniques  Awareness can take on different forms for particular audiences  A security awareness program can use many methods to deliver its message  Effective security awareness programs need to be designed with the recognition that people tend to practice a tuning out process (acclimation), and for this reason, awareness techniques should be creative and frequently changed

Management of Information Security, 2nd ed. - Chapter 5 Slide 54 Developing Security Awareness Components  Many security awareness components are available at little or no cost; others can be very expensive if purchased externally  Security awareness components include the following items: –Videos –Posters and banners –Lectures and conferences –Computer-based training –Newsletters –Brochures and flyers –Trinkets (coffee cups, pens, pencils, T-shirts) –Bulletin boards

Management of Information Security, 2nd ed. - Chapter 5 Slide 55 The Security Newsletter  A security newsletter is a cost-effective way to disseminate security information  Newsletters can be in the form of hard copy, , or intranet  Topics can include threats to the organization’s information assets, schedules for upcoming security classes, and the addition of new security personnel

The Security Newsletter (continued)  The goal is to keep the idea of information security uppermost in users’ minds and to stimulate them to care about security  Newsletters might include: –Summaries of key policies –Summaries of key news articles –A calendar of security events, including training sessions, presentations, and other activities –Announcements relevant to information security –How-to’s Management of Information Security, 2nd ed. - Chapter 5 Slide 56

Management of Information Security, 2nd ed. - Chapter 5 Slide 57 Figure 5-14 SETA Newsletter

Management of Information Security, 2nd ed. - Chapter 5 Slide 58 The Security Poster  A security poster series can be a simple and inexpensive way to keep security on people’s minds  Professional posters can be quite expensive, so in-house development may be the best solution  Keys to a good poster series –Varying the content and keeping posters updated –Keeping them simple, but visually interesting –Making the message clear –Providing information on reporting violations

Management of Information Security, 2nd ed. - Chapter 5 Slide 59 Figure 5-15 Security Posters

Management of Information Security, 2nd ed. - Chapter 5 Slide 60 The Trinket Program  Trinkets may not cost much on a per-unit basis, but they can be expensive to distribute throughout an organization  Several types of trinkets are commonly used –Pens and pencils –Mouse pads –Coffee mugs –Plastic cups –Hats –T-shirts  The messages trinket programs impart will be lost unless reinforced by other means

Management of Information Security, 2nd ed. - Chapter 5 Slide 61 Figure 5-16 Security Trinkets

Management of Information Security, 2nd ed. - Chapter 5 Slide 62 Information Security Awareness Web Site  Organizations can establish Web pages or sites dedicated to promoting information security awareness  As with other SETA awareness methods, the challenge lies in updating the messages frequently enough to keep them fresh

Information Security Awareness Web Site (continued)  Some tips on creating and maintaining an educational Web site are provided here: –See what’s already out there –Plan ahead –Keep page loading time to a minimum –Seek feedback –Assume nothing and check everything –Spend time promoting your site Management of Information Security, 2nd ed. - Chapter 5 Slide 63

Management of Information Security, 2nd ed. - Chapter 5 Slide 64 Security Awareness Conference/Presentations  Another means of renewing the information security message is to have a guest speaker or even a mini-conference dedicated to the topic— perhaps in association with National Computer Security Day (November 30)

Management of Information Security, 2nd ed. - Chapter 5 Slide 65 Summary  Introduction  Organizing for Security  Placing Information Security Within an Organization  Components of the Security Program  Information Security Roles and Titles  Implementing Security Education, Training, and Awareness Programs