Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

IT Service Continuity Management
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Security Risk Analysis & Management
Module 1 Evaluation Overview © Crown Copyright (2000)
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Information Security Policies and Standards
A Robust Process Model for Calculating Security ROI Ghazy Mahjub DePaul University M.S Software Engineering.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Introducing Computer and Network Security
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 5 Tom Olzak, MBA, CISSP.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Information Security What is Information Security?
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Alaa Mubaied Risk Management Alaa Mubaied
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Security fundamentals Topic 12 Maintaining organisational security.
SecSDLC Chapter 2.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
CIT-460 Chapter 1 : Basic Terminologies Lecture #1-Week 1 Dr.Khalid, Dr. Mohannad Computer and Information Security 1.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Welcome to the ICT Department Unit 3_5 Security Policies.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Information Security Management Goes Global
Risk management.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Chapter 8 – Administering Security
Security Risk Analysis & Management
Understand mechanisms to control organisational IT security
I have many checklists: how do I get started with cyber security?
Presentation transcript:

Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1

Information security Polices  Define security policies and standards  Measure actual security against policy  Report violations to policy  Correct violations to conform with policy  Summarize policy compliance for the organization 2 CIT 460 Information Security Dr.Khalid Dr. Mohannad

The Information Security Functions 3 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Managing Information Security 4 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Polices Purpose Provide a framework for the management of security across the enterprise 5 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Definitions  Policies  High level statements (rules) defining what the organization will do to protect information.  Standards  Requirement statements that provide specific technical specifications and help enforce and support information security, like length of keys …  Procedures  Specific operation steps or manual that workers will follow to implement the goal of the written policies and standards  Guidelines  Optional but recommended specifications 6 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Security Policy Access to network resource will be granted through a unique user ID and password Passwords should include one non-alpha and not found in dictionary Passwords will be 8 characters long 7 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Chapter 8 : Management of Security Lecture #2-Week 13 Dr.Khalid Dr. Mohannad Information Security 8 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Policies should……  Clearly identify and define the information security goals and the goals of the university. 9 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Policy Lifecycle 10 CIT 460 Information Security Dr.Khalid Dr. Mohannad

The Ten-Step Approach 11 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Policy Hierarchy Governance Policy Access Control Policy User ID Policy Access Control Authentication Standard Password Construction Standard User ID Naming Standard Strong Password Construction Guidelines 12 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Security Risk Analysis & Management 13 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Security in System Development  Risk Analysis & Management needs to be a part of system development, not tacked on afterwards  Baskerville's three generations of methods 1st Generation: Checklists Example: BS 7799 Part 1 2nd Generation: Mechanistic engineering methods Example: this risk analysis method 3rd Generation: Integrated design Not yet achieved [Baskerville, R. (1993). Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys 25 (4): ] 14 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Introduction Risk Analysis and Management Framework AssetsThreatsVulnerabilities Risks Security Measures } } Analysis Management 15 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Definitions 1 The meanings of terms in this area is not universally agreed. We will use the following  Asset: what you want to protect  Threat : Harm that can happen to an asset  Vulnerability : a weakness in the system that makes an attack more likely to succeed  Risk : a quantified measure of the likelihood of a threat being realised R=A+T+V 16 CIT 460 Information Security Dr.Khalid Dr. Mohannad

 Impact : A measure of the seriousness of a threat  Attack : A threatening event  Attacker : The agent causing an attack (not necessarily human) CIT 460 Information Security Dr.Khalid M.O Nahar 17

Chapter 8 : Management of Security Lecture #3-Week 13 Dr.Khalid Dr. Mohannad Information Security 18

Definitions 2  Risk Analysis involves the identification and assessment of the levels of risk, calculated from the  Values of assets  Threats to the assets  Their vulnerabilities and likelihood of exploitation  Risk Management involves the identification, selection and adoption of security measures justified by  The identified risks to assets  The reduction of these risks to acceptable levels 19 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Goals of Risk Analysis  All assets have been identified  All threats have been identified  Their impact on assets has been valued  All vulnerabilities have been identified and assessed 20 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Problems of Measuring Risk Businesses normally wish to measure in money, but  Many of the entities do not allow this  Valuation of assets  Value of data and in-house software - no market value  Value of goodwill and customer confidence  Likelihood of threats  How relevant is past data to the calculation of future probabilities?  The nature of future attacks is unpredictable  The actions of future attackers are unpredictable  Measurement of benefit from security measures  Problems with the difference of two approximate quantities  How does an extra security measure affect a ~10 -5 probability of attack? 21 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Levels  Precise monetary values give a false precision  Better to use levels, e.g.  High, Medium, Low  High: major impact on the organisation  Medium: noticeable impact (“material” in auditing terms)  Low: can be absorbed without difficulty   Express money values in levels, e.g.  For a large University Department a possibility is  High  Medium  Low £1,000,000+ £1,000+ < £1, CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Analysis Steps  Decide on scope of analysis  Set the system boundary  Identification of assets & business processes  Identification of threats and valuation of their impact on assets (impact valuation)  Identification and assessment of vulnerabilities to threats  Risk assessment 23 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Analysis – Defining the Scope  Draw a context diagram  Decide on the boundary  It will rarely be the computer!  Make explicit assumptions about the security of neighbouring domains  Verify them! 24 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Analysis - Identification of Assets  Types of asset  Hardware  Software: purchased or developed programs  Data  People: who run the system  Documentation: manuals, administrative procedures, etc  Supplies: paper forms, magnetic media, printer liquid, etc  Money  Intangibles  Goodwill  Organisation confidence  Organisation image 25 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Chapter 8 : Management of Security Lecture #1-Week 14 Dr.Khalid Dr. Mohannad Information Security 26 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Analysis – Impact Valuation Identification and valuation of threats - for each group of assets  Identify threats, e.g. for stored data  Loss of confidentiality  Loss of integrity  Loss of completeness  Loss of availability (Denial of Service)  For many asset types the only threat is loss of availability  Assess impact of threat  Assess in levels, e.g H-M-L or  This gives the valuation of the asset in the face of the threat 27 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Analysis – Process Analysis  Every company or organisation has some processes that are critical to its operation  The criticality of a process may increase the impact valuation of one or more assets identified So  Identify critical processes  Review assets needed for critical processes  Revise impact valuation of these assets 28 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Analysis – Vulnerabilities 1  Identify vulnerabilities against a baseline system  For risk analysis of an existing system  Existing system with its known security measures and weaknesses  For development of a new system  Security facilities of the envisaged software, e.g. Windows NT  Standard good practice, e.g. BS 7799 recommendations of good practice 29 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Analysis – Vulnerabilities 2 For each threat  Identify vulnerabilities  How to exploit a threat successfully;  Assess levels of likelihood - High, Medium, Low  Of attempt  Expensive attacks are less likely (e.g. brute-force attacks on encryption keys)  Successful exploitation of vulnerability;  Combine them Vulnerability Likelihood of Attempt Likelihood of Success Low Med Low MedHigh Med Low 30 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Risk Assessment Assess risk  If we had accurate probabilities and values, risk would be  Impact valuation x probability of threat x probability of exploitation  Plus a correction factor for risk aversion  Since we haven't, we construct matrices such as Risk Impact valuation Low Med Low MedHigh Med Low Vulnerability 31 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Responses to Risk Responses to risk  Avoid it completely by withdrawing from an activity  Accept it and do nothing  Reduce it with security measures  Transfer 32 CIT 460 Information Security Dr.Khalid Dr. Mohannad

Security Measures Possible security measures  Transfer the risk, e.g. insurance  Reduce vulnerability  Reduce likelihood of attempt  e.g. publicise security measures in order to deter attackers  e.g. competitive approach - the lion-hunter’s approach to security  Reduce likelihood of success by preventive measures  e.g. access control, encryption, firewall  Reduce impact, e.g. use fire extinguisher / firewall  Recovery measures, e.g. restoration from backup 33 CIT 460 Information Security Dr.Khalid Dr. Mohannad