Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 4: Security Management.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Chapter 10 Accounting Information Systems and Internal Controls
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
The Islamic University of Gaza
Environmental Management Systems An Overview With Practical Applications.
Security Controls – What Works
Information Security Policies and Standards
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Introducing Computer and Network Security
Unit # 3: Information Security and Risk Management
Information Systems Security Officer
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Network security policy: best practices
Control environment and control activities. Day II Session III and IV.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Storage Security and Management: Security Framework
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Chapter 3 Internal Controls.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Internal Control in a Financial Statement Audit
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Introduction to Information Security
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Policies and Procedures Security+ Guide to Network Security Fundamentals Chapter 11.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
SecSDLC Chapter 2.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Security Policy Development for Management By Peter McCarthy.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Information Security Policy
CompTIA Security+ Study Guide (SY0-401)
Risk management.
Information Security Principles and Practices
Disaster and Emergency Planning
Chapter 9 Control, security and audit
CompTIA Security+ Study Guide (SY0-501)
IS4550 Security Policies and Implementation
Cybersecurity ATD technical
Security Policies and Implementation Issues
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Security Policies and Implementation Issues
Presentation transcript:

Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 4: Security Management

Chapter 4: Security Management © Pearson Education Information Security: Principles and Practices 2

3 Objectives Choose the appropriate type of policies (Security Policy) Distinguish between the roles of standards, regulations, baselines خطوط الأساس, procedures, and guidelines Organize a typical standards and policies library Classify assets according to standard principles

© Pearson Education Information Security: Principles and Practices 4 Objectives cont. Incorporate the separation of duties principle Outline the minimum preemployment hiring practices Analyze and manage risk Outline the elements of employee security education, awareness, and training List the eight types of people responsible for security

Introduction Security policy is a definition of what it means to be secure for a system, organizationsystem For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors, locks, keys بالنسبة للمنظمة ، فإنه يتناول القيود المفروضة على سلوك أعضائها فضلا عن القيود المفروضة على خصومه © Pearson Education Information Security: Principles and Practices 5

For systems or computer system, the security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries. Note that: security policy is a high level definition of secure behavior © Pearson Education Information Security: Principles and Practices 6

The effective policy contains the following information: © Pearson Education Information Security: Principles and Practices 7

Title Purpose Authorizing individual Author/sponsor Reference to other policies Scope Measurement expectations Exception process عملية استثناء Accountability المساءلة Compliance management and measurements description الامتثال لإدارة ووصف القياسات Effective/expiration dates Definition © Pearson Education Information Security: Principles and Practices 8

9 System-level policy System-framework policy Issue-specific policy System-specific policy Four Types of Policies

Policy Level: is used for creating a management-sponsored computer security program. Think of this as the mission statement for the IT security program. The component of the level policy are: Purpose: This include defining the the goals of the computer security as well as its management structure. Scope: Scope specifies which resources (including facilities, hardware, and software), information, and personnel the programme covers. © Pearson Education Information Security: Principles and Practices 10

Responsibilities addresses responsibilities of officials and offices throughout the organization, including the role of line managers, applications owners, users, and information processing or IT organization. © Pearson Education Information Security: Principles and Practices 11

 Normally issued by the manager or owner of the system but may originate from a high- level executive or official  Examples Who is allowed to read or modify data in the system? Under what conditions can data be read or modified? Are users allowed to dial into the computer system from home or while on travel? © Pearson Education Information Security: Principles and Practices 12

System-Framework Policies Define the organization’s security programme elements that form the foundation for the computer security programme Reflect information technology management’s decisions about priorities for protection, and assignment of responsibilities © Pearson Education Information Security: Principles and Practices 13

Examples of possible system-framework policies Business continuity planning (BCP) framework (Chapter 6). Physical security requirements framework for data centers (Chapter 7). Application development security framework (Chapter 13). © Pearson Education Information Security: Principles and Practices 14

System-specific policy States security objectives of a specific system. Define how the system should be operated to achieve objectives. Specify how the protections and features of the technology used to support or enforce the security objectives © Pearson Education Information Security: Principles and Practices 15

Who Is Responsible for Security? Everyone who uses information technology is responsible for maintaining the security and confidentiality of information resources and must comply with security policies and procedures © Pearson Education Information Security: Principles and Practices 16

Chief information security officer (CISO), information resources manager, information resources security officer, owners of information resources, custodians of information resources, technical managers (network and system administrators, internal auditors, and users © Pearson Education Information Security: Principles and Practices 17

© Pearson Education Information Security: Principles and Practices 18 Issue-Specific Policies cont. May come from the head of the organization, the top management official, the chief information officer (CIO), or the computer security programme manager (e.g., CISO) Examples  acceptable use  Internet acceptable use  Laptop security policy

© Pearson Education Information Security: Principles and Practices 19 System-Specific Policies State security objectives of a specific system Define how the system should be operated to achieve objectives Specify how the protections and features of the technology used to support or enforce the security objectives

© Pearson Education Information Security: Principles and Practices 20 System-Specific Policies cont. Normally issued by the manager or owner of the system but may originate from a high- level executive or official Examples  Who is allowed to read or modify data in the system?  Under what conditions can data be read or modified?  Are users allowed to dial into the computer system from home or while on travel?

© Pearson Education Information Security: Principles and Practices 21 Development and Management of Security Policies Three-level model for system security policy  Security objectives consist of a series of statements to describe meaningful actions about specific resources  Operational security list the rules for operating a system.  Policy implementation the organization must determine the role technology plays in enforcing or supporting the policy

© Pearson Education Information Security: Principles and Practices 22 Policy Support Documents Provide levels of detail supporting the policy and explaining the system development, management, and operational requirements, including  Regulations: laws passed by regulators and lawmakers  Standards and baselines: topic-specific (standards) and system specific (baselines) documents that describe overall requirements for security  Guidelines: documentation that aids in compliance with standard considerations, hints, tips, and best practices in implementation  Procedures: step-by-step instructions on how to perform a specific security activity

© Pearson Education Information Security: Principles and Practices 23 Suggested Standards Taxonomy Standards are formal written documents that describe several security concepts that are fundamental to all successful programmes The highest level includes  Asset and data classification  Separation of duties  Pre-employment hiring practices  Education, awareness, and training  Risk analysis and management

© Pearson Education Information Security: Principles and Practices 24 Asset Classification  Asset and data classification is needed by businesses and agencies to help determine how much security is needed for appropriate protection Separation of Duties  Separating duties within a business or organization helps limit any individual’s ability to cause harm or perpetrate theft Suggested Standards Taxonomy cont.

© Pearson Education Information Security: Principles and Practices 25 Preemployment Hiring Practices  Policies, standards, and procedures issued by human resources should address internal information security processes and functions Education, Training, and Awareness  Because people are the weakest link in any security-related process, it’s crucial that a security programme address user education, awareness, and training on policies and procedures  Education must be driven top-down and must be comprehensive  Training must be ongoing (at least annually) and also take place whenever policies change Suggested Standards Taxonomy cont.

© Pearson Education Information Security: Principles and Practices 26 Risk Analysis and Management  A risk analysis answers three fundamental questions: What am I trying to protect? What is threatening my system? How much time, effort, and money am I willing to spend? Two basic types of risk analysis  Quantitative Risk Analysis  Qualitative Risk Analysis Suggested Standards Taxonomy cont.

© Pearson Education Information Security: Principles and Practices 27 Attempts to establish and maintain an independent set of risk metrics and statistics Some of the calculations used for quantitative risk analysis  Annualized loss expectancy (ALE): single loss expectancy multiplied by annualized rate of occurrence  Probability: chance or likelihood that an event will occur  Threat: an event, the occurrence of which could have an undesired impact  Control: risk-reducing measure that acts to detect, prevent, or minimize loss associated with the occurrence of a specified threat  Vulnerability: the absence or weakness of a risk-reducing safeguard Quantitative Risk Analysis

© Pearson Education Information Security: Principles and Practices 28 The most widely used approach to risk analysis Makes use of a number of interrelated elements:  Threats: things that can go wrong or that can “attack” the system  Vulnerabilities: make a system more prone to attack or make an attack more likely to have some success or impact  Controls: the countermeasures for vulnerabilities A risk is real when there is a presence of threat, a vulnerability that the attacker can exploit, and a high likelihood that the attacker will carry out the threat Qualitative Risk Analysis

© Pearson Education Information Security: Principles and Practices 29 A Model of The Risk Analysis Process

© Pearson Education Information Security: Principles and Practices 30 Who Is Responsible for Security? Everyone who uses information technology is responsible for maintaining the security and confidentiality of information resources and must comply with security policies and procedures  Chief information security officer (CISO), information resources manager, information resources security officer, owners of information resources, custodians of information resources, technical managers (network and system administrators, internal auditors, and users

© Pearson Education Information Security: Principles and Practices 31 Summary Security Management Practices domain is most concerned with the establishment and ongoing operation of the organization’s security programme. This programme includes policies, standards, baselines, procedures, and guidance for compliance.