Security+ Guide to Network Security Fundamentals, Fourth Edition

Slides:



Advertisements
Similar presentations
Child Safeguarding Standards
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 14 Security Policies and Training.
Security Controls – What Works
Security Awareness: Applying Practical Security in Your World
Information Security Policies and Standards
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 6 Enterprise Security.
Information Systems Security Officer
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Office of Inspector General (OIG) Internal Audit
Computer Security: Principles and Practice
Purpose of the Standards
Session 3 – Information Security Policies
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
Network security policy: best practices
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Security Awareness Norfolk State University Policies.
Chapter 11: Policies and Procedures
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter 11: Project Risk Management
Information Systems Security Computer System Life Cycle Security.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Architecture
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
SECTION 1 THE PROJECT MANAGEMENT FRAMEWORK
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Policies and Procedures Security+ Guide to Network Security Fundamentals Chapter 11.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Security fundamentals Topic 12 Maintaining organisational security.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
~ pertemuan 4 ~ Oleh: Ir. Abdul Hayat, MTI 20-Mar-2009 [Abdul Hayat, [4]Project Integration Management, Semester Genap 2008/2009] 1 PROJECT INTEGRATION.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 4: Security Management.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Security+ Guide to Network Security Fundamentals, Fifth Edition
Chapter 14 Risk Mitigation
WSU IT Risk Assessment Process
IS4680 Security Auditing for Compliance
Project Management Process Groups
Chapter 8 Developing an Effective Ethics Program
Cyber security Policy development and implementation
The Elements of appropriate Internal Controls
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 14 Risk Mitigation

Objectives Explain how to control risk List the types of security policies Describe how awareness and training can provide increased security Security+ Guide to Network Security Fundamentals, Fourth Edition

Introduction Risk Multifaceted approach to information security Concept at the heart of information security Multifaceted approach to information security Control risk through different management techniques Develop a security policy User awareness and training Security+ Guide to Network Security Fundamentals, Fourth Edition

Controlling Risk Threat Threat agent Vulnerability Risk Type of action that has potential to cause harm Threat agent Person or element with power to carry out a threat Vulnerability Flaw or weakness that allows threat agent to bypass security Risk Likelihood threat agent will exploit the vulnerability Security+ Guide to Network Security Fundamentals, Fourth Edition

Table 14-1 Risk classifications Security+ Guide to Network Security Fundamentals, Fourth Edition

Controlling Risk (cont’d.) Privilege Subject’s access level over an object, such as a file Privilege management Process of assigning and revoking privileges to objects Privilege auditing Periodically reviewing a subject’s privileges over an object Objective: determine if subject has the correct privileges Security+ Guide to Network Security Fundamentals, Fourth Edition

Figure 14-1 Sample user access and rights review © Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition

Controlling Risk (cont’d.) Change management Methodology for making modifications and keeping track of changes Ensures proper documentation of changes so future changes have less chance of creating a vulnerability Involves all types of changes to information systems Two major types of changes that need proper documentation Changes to system architecture Changes to file or document classification Security+ Guide to Network Security Fundamentals, Fourth Edition

Controlling Risk (cont’d.) Change management team (CMT) Body responsible for overseeing the changes Composed of representatives from all areas of IT, network security, and upper management Proposed changes must first be approved by CMT CMT duties Review proposed changes Ensure risk and impact of planned change are understood Security+ Guide to Network Security Fundamentals, Fourth Edition

Controlling Risk (cont’d.) CMT duties (cont’d.) Recommend approval, disapproval, deferral, or withdrawal of a requested change Communicate proposed and approved changes to coworkers Incident management Response to an unauthorized incident Components required to identify, analyze, and contain an incident Security+ Guide to Network Security Fundamentals, Fourth Edition

Controlling Risk (cont’d.) Incident handling Planning, coordination, communications, and planning functions needed to resolve incident Incident management objective Restore normal operations as quickly as possible with least impact to business or users Security+ Guide to Network Security Fundamentals, Fourth Edition

Reducing Risk Through Policies Security policy Another means of reducing risks Important considerations regarding security policies Understanding what it is Knowing how to balance trust and control Understanding the process for designing a policy Knowing what the different types of policies are Security+ Guide to Network Security Fundamentals, Fourth Edition

What Is a Security Policy? Document that outlines protections to ensure organization’s assets face minimal risks Higher level definition Set of management statements that define organization’s philosophy of how to safeguard information Lower level definition Rules for computer access and how the rules are carried out Security+ Guide to Network Security Fundamentals, Fourth Edition

What Is a Security Policy? (cont’d.) Security policy functions Documents management’s overall intention and direction Details specific risks and how to address them Provides controls to direct employee behavior Helps create a security-aware organizational culture Helps ensure employee behavior is directed and monitored Security+ Guide to Network Security Fundamentals, Fourth Edition

Balancing Trust and Control Three approaches to trust Trust everyone all of the time Trust no one at any time Trust some people some of the time Security policy attempts to provide right amount of trust Builds trust over time Level of control must also be balanced Influenced by security needs and organization’s culture Security+ Guide to Network Security Fundamentals, Fourth Edition

Designing a Security Policy Standard Collection of requirements specific to system or procedure that must be met by everyone Guideline Collection of suggestions that should be implemented Policy Document that outlines specific requirements that must be met Security+ Guide to Network Security Fundamentals, Fourth Edition

Designing a Security Policy (cont’d.) Characteristics of a policy Communicates a consensus of judgment Defines appropriate user behavior Identifies needed tools and procedures Provides directives for Human Resource action in response to inappropriate behavior Helps if necessary to prosecute violators Security+ Guide to Network Security Fundamentals, Fourth Edition

Designing a Security Policy (cont’d.) Three phases of the security policy cycle Vulnerability assessment Asset identification Threat identification Vulnerability appraisal Risk assessment Risk mitigation Create the policy using information from risk management study Review the policy for compliance Security+ Guide to Network Security Fundamentals, Fourth Edition

Figure 14-2 Security policy cycle © Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition

Table 14-2 Security policy must and should statements Security+ Guide to Network Security Fundamentals, Fourth Edition

Designing a Security Policy (cont’d.) Security policy design should be the work of a team Development team representatives Senior level administrator Member of management who can enforce the policy Member of the legal staff Representative from the user community Team should first decide on policy goals and scope Also how specific the policy should be Security+ Guide to Network Security Fundamentals, Fourth Edition

Designing a Security Policy (cont’d.) Due care Obligations imposed on owners and operators of assets Owners must exercise reasonable care of assets and take precautions to protect them Examples of due care policy statements Employees should exercise due care in opening attachments received from unknown sources Students will exercise due care when using computers in a crowded lab setting Security+ Guide to Network Security Fundamentals, Fourth Edition

Designing a Security Policy (cont’d.) Policy development guidelines Notify users in advance of development of and reasons for a new security policy Provide affected users an opportunity to review and comment on policy prior to deployment Give users with responsibility the authority to carry out their responsibilities Security+ Guide to Network Security Fundamentals, Fourth Edition

Types of Security Policies Security policies often broken down into subpolicies Acceptable use policy Privacy policy Security-related human resource policy Password management and complexity policy Disposal and destruction policy Classification of information policy Ethics policy Security+ Guide to Network Security Fundamentals, Fourth Edition

Types of security policies Table 14-3 Types of security policies Security+ Guide to Network Security Fundamentals, Fourth Edition

Types of Security Policies (cont’d.) Acceptable use policy Policy that defines actions users may perform while accessing systems Users include employees, vendors, contractors, and visitors Typically covers all computer use Generally considered most important information security policy Security+ Guide to Network Security Fundamentals, Fourth Edition

Types of Security Policies (cont’d.) Privacy policy Also called personally identifiable information policy Outlines how organization uses personal information it collects Security-related human resource policy Includes statements about how an employee’s information technology resources will be addressed Typically presented at employee orientation session after employee is hired Security+ Guide to Network Security Fundamentals, Fourth Edition

Figure 14-3 Sample privacy policy © Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition

Types of Security Policies (cont’d.) Security-related human resource policy (cont’d.) May include statements regarding due process and/or due diligence May include statements regarding actions to be taken when employee is terminated Password management and complexity policy Addresses how passwords are created and managed Reminds users of differences between strong and weak passwords Security+ Guide to Network Security Fundamentals, Fourth Edition

Figure 14-4 Weak password information © Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition

Figure 14-5 Strong password information © Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition

Types of Security Policies (cont’d.) Disposal and destruction policy Addresses disposal of confidential resources Describes how to dispose of equipment, records, and data Classification of information policy Designed to produce standardized framework for classifying information assets Generally involves creating classification categories Example: high, medium, low Security+ Guide to Network Security Fundamentals, Fourth Edition

Types of Security Policies (cont’d.) Defining ethics can be difficult Values A person’s fundamental beliefs and principles Morals Values attributed to a belief system that helps individuals distinguish right from wrong Ethics Study of what a group of people understand to be good and right behavior Security+ Guide to Network Security Fundamentals, Fourth Edition

Types of Security Policies (cont’d.) An organization does not set an employee’s values Does set ethical behavior standards Ethics policy Written code of conduct Guides employees in decision making Serves as a communication tool to reflect organization’s commitments Security+ Guide to Network Security Fundamentals, Fourth Edition

Awareness and Training Providing users with security awareness training Key defense in information security Awareness and training topics Compliance Secure user practices Awareness of threats Security+ Guide to Network Security Fundamentals, Fourth Edition

Compliance Users should be informed regarding: Security policy training and procedures Personally identifiable information Information classification Data labeling, handling, and disposal Compliance with laws, best practices, and standards Security+ Guide to Network Security Fundamentals, Fourth Edition

User Practices Table 14-4 User practices Security+ Guide to Network Security Fundamentals, Fourth Edition

Threat Awareness Peer-to-peer (P2P) networks Similar to instant messaging Users connect directly to each other Typically used for sharing audio, video, data files Tempting targets for attackers Viruses, worms, Trojans, and spyware can be sent using P2P Most organizations prohibit use of P2P High risk of infection Legal consequences Security+ Guide to Network Security Fundamentals, Fourth Edition

Threat Awareness (cont’d.) Social networking Grouping individuals based on some sort of affiliation Can be physical or online Web sites that facilitate social networking called social networking sites Increasingly becoming prime targets of attacks Reasons social networking sites are popular with attackers Lots of personal data is available Security+ Guide to Network Security Fundamentals, Fourth Edition

Threat Awareness (cont’d.) Reasons social networking sites are popular with attackers (cont’d.) Users are generally trusting Sites are vulnerable Security tips for using social networking sites Consider carefully who is accepted as a friend Show limited friends a reduced version of your profile Disable options and reopen only as necessary Security+ Guide to Network Security Fundamentals, Fourth Edition

Table 14-5 Recommended Facebook profile settings Security+ Guide to Network Security Fundamentals, Fourth Edition

Table 14-6 Recommended Facebook contact information settings Security+ Guide to Network Security Fundamentals, Fourth Edition

Training Techniques Opportunities for security education and training When new employee is hired After computer attack has occurred When employee promoted During annual department retreat When new user software is installed When user hardware is upgraded Security+ Guide to Network Security Fundamentals, Fourth Edition

Training Techniques (cont’d.) Learner traits impact how people learn Examples of learning styles Visual Auditory Kinesthetic Training styles impact how people learn Pedagogical approach Classic teaching method Andragogical approach Art of helping an adult learn Security+ Guide to Network Security Fundamentals, Fourth Edition

Table 14-7 Traits of learners Security+ Guide to Network Security Fundamentals, Fourth Edition

Table 14-8 Approaches to training Security+ Guide to Network Security Fundamentals, Fourth Edition

Summary A risk is the likelihood that a threat agent will exploit a vulnerability Privilege management and change management are risk management approaches A security policy states how an organization plans to protect its information technology assets Development and maintenance of a security policy follows a three-phase cycle Security+ Guide to Network Security Fundamentals, Fourth Edition

Summary (cont’d.) Security policies are often broken into subpolicies Acceptable use policy Privacy policy Password management and complexity policy Disposal and destruction policy Classification of information policy Ongoing awareness training provides users with knowledge and skills necessary to support information security Security+ Guide to Network Security Fundamentals, Fourth Edition