Risk Management Vs Risk avoidance William Gillette.

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

Risk Control Strategies And Physical Security By William Gillette.
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
Fundamentals of Information Systems, Second Edition
Lecture 2: Planning for Security INFORMATION SECURITY MANAGEMENT
7.2 System Development Life Cycle (SDLC)
Principles of Information Security, 2nd Edition1 Risk Management.
Computer Security: Principles and Practice
Lecture 8: Risk Management Controlling Risk
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Risk Management.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Introduction to Systems Analysis and Design
Session 3 – Information Security Policies
Introduction to Network Defense
Release & Deployment ITIL Version 3
Adaptive Processes Simpler, Faster, Better 1 Adaptive Processes Understanding Information Security ISO / BS7799.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
1 Introduction to Information Security. 2 Historical aspects of InfoSec Critical characteristics of information CNSS security model Systems development.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Database Administration
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Alaa Mubaied Risk Management Alaa Mubaied
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
SecSDLC Chapter 2.
Chapter 12 Implementation and Maintenance
Risk Identification and Risk Assessment
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
The NIST Special Publications for Security Management By: Waylon Coulter.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security.
Development, Validation, Implementation and Enhancement for a Voluntary Protection Programs Center of Excellence (VPP CX) Capability for the Department.
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Information Security Policy Development for Management By Peter McCarthy.
1.  1. Introduction  2. Policy  3. Why Policy should be developed.  4. www policies 2.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
CMGT 400 Entire Course CMGT 400 Week 1 DQ 1  CMGT 400 Week 1 Individual Assignment Risky Situation  CMGT 400 Week 1 Team Assignment Kudler Fine Foods.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part I.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
For more course tutorials visit
CMGT 400 GUIDE Real Success CMGT 400 Entire Course FOR MORE CLASSES VISIT CMGT 400 Week 1 Individual Assignment Risky Situation CMGT.
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
CHAPTER 3 Management Systems. Learning Objectives Describe the basic business activities and tools necessary to implement successful industrial hygiene.
CS457 Introduction to Information Security Systems
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Information Systems Development
Fundamentals of Information Systems, Sixth Edition
TRINITY UNIVERSITY HOSPITAL INTERNAL EXIT MEETING
CMGT 400 Education for Service-- tutorialrank.com
(System Development Life Cycle)
Presentation transcript:

Risk Management Vs Risk avoidance William Gillette

Security System Development Life Cycle An Overview Investigation Investigation Teams of employees define the problem, scope and set goals/objectives and check feasibility of the project Teams of employees define the problem, scope and set goals/objectives and check feasibility of the project Analysis Analysis Looks at current security policies, threats, controls, and legal issues that could impact a new security policy/system. Risk management stage Looks at current security policies, threats, controls, and legal issues that could impact a new security policy/system. Risk management stage Design Design The logical and physical design of security system. Risk avoidance stage The logical and physical design of security system. Risk avoidance stage Implement Implement The purchase or development of security solutions. The purchase or development of security solutions. Maintenance Maintenance Security systems constantly need updating, modifying and testing Security systems constantly need updating, modifying and testing

Risk Management Defined: Defined: The process of identifying vulnerabilities in an organization’s information systems and or programs. Then taking steps to assure its confidentiality, availability, integrity, authenticity. The process of identifying vulnerabilities in an organization’s information systems and or programs. Then taking steps to assure its confidentiality, availability, integrity, authenticity.

Risk Management Step by Step analysis Step 1 Know yourself. Step 1 Know yourself. First, you must identify, examine, and understand the data/information and systems that interact on these elements. First, you must identify, examine, and understand the data/information and systems that interact on these elements. Second, once you know what you have you can now look at what is already being done to protect these assets. Second, once you know what you have you can now look at what is already being done to protect these assets. Third, Identify if these controls are being properly maintained and administrated. Third, Identify if these controls are being properly maintained and administrated.

Risk Management Step by Step analysis Step 2 know you enemy Step 2 know you enemy Now that you are informed of your organization’s assets and weaknesses you must identify, examine, understanding the treats facing your organization. Now that you are informed of your organization’s assets and weaknesses you must identify, examine, understanding the treats facing your organization. In turn you must also identify the aspects of the treats that will most directly effect you organization. In turn you must also identify the aspects of the treats that will most directly effect you organization. With your understanding of the threats you are now ready to create a list of treats prioritized by the importance of the threat and the asset. With your understanding of the threats you are now ready to create a list of treats prioritized by the importance of the threat and the asset. Remember in business, business needs come first technology (including security mainly come second) Remember in business, business needs come first technology (including security mainly come second)

Risk Management Step by Step analysis Step 3 know your community Step 3 know your community Information security community: theses people understand the threats the most and often take a leadership role when it comes addressing threats. Information security community: theses people understand the threats the most and often take a leadership role when it comes addressing threats. Users and managers communities: when properly trained this group plays a critical part in the area of early detection. Users and managers communities: when properly trained this group plays a critical part in the area of early detection. Both groups are also responsible for Both groups are also responsible for Evaluating risk controls Evaluating risk controls Determining which control option are cost effective Determining which control option are cost effective Acquiring or installing the needs for controls. Acquiring or installing the needs for controls. Overseeing that the controls remains effective. Overseeing that the controls remains effective.

Risk avoidance Defined: Defined: A risk control strategy that attempts to prevent attacks to organizational assets, through there vulnerabilities. A risk control strategy that attempts to prevent attacks to organizational assets, through there vulnerabilities. This is the most preferred risk control strategy as it seeks to avoid risk/treats entirely. This is the most preferred risk control strategy as it seeks to avoid risk/treats entirely. Avoidance is accomplish through countering treats, removing vulnerabilities in assets, limiting access to assets, and adding protective safeguards. Avoidance is accomplish through countering treats, removing vulnerabilities in assets, limiting access to assets, and adding protective safeguards.

Methods of risk avoidance Avoidance through application of policy. Avoidance through application of policy. Avoidance through application of training and education. Avoidance through application of training and education. Avoidance though application of technology. Avoidance though application of technology.

Avoidance through application of policy This mandates that procedure must be followed when dealing with a sensitive asset. This mandates that procedure must be followed when dealing with a sensitive asset. Example requiring random assigned password to access sensitive assets like customer databases. Example requiring random assigned password to access sensitive assets like customer databases.

Avoidance through application of training and education New policies must be communicated to employees. In addition new technology requires training. New policies must be communicated to employees. In addition new technology requires training. General security awareness issues. General security awareness issues. Awareness, education, and training are essential if employees are to exhibit safe controlled behavior. Awareness, education, and training are essential if employees are to exhibit safe controlled behavior.

Avoidance though application of technology. In the real world technological solutions are often required to assure that a risk is reduced. In the real world technological solutions are often required to assure that a risk is reduced. The use of countering measure to reduce or eliminating the exposure of a particular asset to a specific treat. The use of countering measure to reduce or eliminating the exposure of a particular asset to a specific treat. Implementing safeguards to defect attack on systems and therefore minimize the probability of a attack will be successful. Implementing safeguards to defect attack on systems and therefore minimize the probability of a attack will be successful.

Risk Management Vs Risk avoidance Risk management Risk management Identifying vulnerabilities in an organization’s information systems and or programs Identifying vulnerabilities in an organization’s information systems and or programs Risk avoidance Control strategy that attempts to prevent attacks

Bibliography Information Technology for Management Henry C. Lucas 7 th Edition Irwin McGraw-Hill Information Technology for Management Henry C. Lucas 7 th Edition Irwin McGraw-Hill Principles of Information Security Michael E. Whitman Thomson Course Technology. Principles of Information Security Michael E. Whitman Thomson Course Technology. Information Security Issues that Healthcare Management Must Understand Journal of Healthcare Information Management Vol 17 # Winter 2003 Information Security Issues that Healthcare Management Must Understand Journal of Healthcare Information Management Vol 17 # Winter 2003