IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.

Slides:



Advertisements
Similar presentations
Chapter 10 Accounting Information Systems and Internal Controls
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Developing Information Security Policy. Why is Developing Good Security Policy Difficult? Effective Security/IA Policy is more than locking doors and.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Information Security Policies and Standards
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Lecture 11 Reliability and Security in IT infrastructure.
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
E-Commerce Security and Fraud Issues and Protections
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Stephen S. Yau CSE , Fall Security Strategies.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Technology Audit
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Information Systems Planning
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Alter – Information Systems © 2002 Prentice Hall 1 The Process of Information System Planning.
BPK Strategic Planning: Briefing for Denpasar Regional Office Leadership Team Craig Anderson Ahmed Fajarprana August 11-12, 2005.
Economic security of enterprise.. By economic security of the enterprise (ESE) we mean the state of protection of it’s vital interests from internal and.
Principles of Information Systems, Sixth Edition Information Systems in Organizations Chapter 2.
1.less than 3 million. 2.less than 10 million. 3.over 23 million. 4.over 100 million. 5.Not sure In the U.S., the number of managers that rely on Information.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Introduction to Information Security
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Risk Management for Small & Medium Sized Enterprises
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Enterprise Risk Management & IT Implications BADM 559 Megan Kasbohm.
For More Tutorials ACC 210 WEEK 1 DQ 1  How does information flow between departments at your organizations? Why do some organizations.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Royal Scientific Society Eng. Nael Almulki. Royal Scientific Society FunctionsAbout RSS RSS was established in 1970 as an independent, not-for- profit.
Securing Information Systems
Securing Information Systems
Risk management.
MGMT 452 Corporate Social Responsibility
Cybersecurity - What’s Next? June 2017
Data and database administration
Securing Information Systems
I have many checklists: how do I get started with cyber security?
Presentation transcript:

IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing

The primary message Good security in an organization starts at the top, not with firewalls, shielded cables or biometrics. Senior management has a much more significant role to play in achieving security than they may think.

E-commerce and virtual organizations Organizations have an internal value chain and must interact with external entities at either end of this chain. External entities may be other businesses, individual customers, or the government. Interactions must be protected from being compromised by unauthorized parties,

Security vs. Privacy Privacy deals with the degree of control that an entity, whether a person or organization, has over information about itself. Security deals with vulnerability to unauthorized access to content.

Why won’t Sr. Management engage in Security? It is difficult to connect security security- related expenditures to profitability Increases in security will often increase costs and reduce efficiency

What Should Sr. Management Know? Security is not a technical issue; it is a management issue Total security is a myth. –Not all information is of equal value –it is not technically possible to protect all information assets Stakeholders will be increasingly less tolerant of cyber-related vulnerabilities

Threats Numerous adversaries are aligned against any firm's information, systems, and the critical infrastructures that support them. –disgruntled current or former employees –Hackers –virus writers –criminal groups –those engaged in corporate espionage –Terrorists –foreign intelligence services –information warfare by foreign militaries and various other actors.

Barriers to Security The worldwide diffusion of the Internet opens up new business opportunities (e.g., 3-R Framework) It also increases an organization's vulnerability since so many more individuals of unknown origin and intent now have access to its systems

Increasing Richness; Good or Bad? Active web content, such as Java applets, enhances interaction with customers and suppliers. This technical capability allows programs created by external entities to also run on an organization's machines

Increasing Reach; Good or Bad? Organizations that have an extensive partnering network find it difficult to define the boundaries of their information systems There is an inherent conflict between security and "open systems" architectures that facilitate EC interactions

Clue IT In! Organizations commonly look for technical certification when hiring IT staff, but how often is any effort made to educate new security workers on the organization's strategic focus or to communicate to them the criticality levels of their information assets?

Three Cornerstones Senior managers need to remember that security depends on the strength of the three cornerstones –Critical infrastructures –Organization –Technology Security also requires an end-to-end view of business processes.

Critical Infrastructures Critical Infrastructure Protection Government-Industry Collaboration Management's Role in Critical Infrastructure Protection –To recognize that critical infrastructure protection is an essential component of corporate governance as well as organizational security

Organization Structure leads to locus of ownership of data and processes Business Environment: threats are based on… –Value of the firm's intellectual property –The degree of change the firm is facing –Its accessibility –Its industry position Culture SOPs Education, Training, and Awareness

Technology Firewalls and Intrusion Detection Password Layering Public Key Infrastructure Secure Servers VPNs

Ok, So What? Managerial Implications Asset Identification Risk Assessment The Control Environment –Physical –Data –Implementation –Operations –Administrative –Application System Controls

Balancing Risks and Costs Step 1: Identify information assets at an appropriate level of aggregation Step 2: Identify the financial consequences of these information assets being compromised, damaged, or lost Step 3: Identify the costs of implementing the control mechanisms that are being proposed to enhance organizational security Step 4: Estimate overall risk based on the likelihood of compromise Step 5: Estimate the benefits expected by implementing the proposed security mechanisms Step 6: Compare the expected benefits obtained in Step 5 with the cost estimates obtained in Step 3

Management Actions Corporate boards should ensure that senior managers buy into the process of risk assessment Senior managers also need to ensure that technical and operational staff understand each other's requirements and cooperatively engaged in the process Establish an ongoing process of monitoring risk

The Myth of Secure Computing When it comes to digital security, there's no such thing as an impenetrable defense. But you can mitigate risks by following sound operating practices

What’s a Manager to Do? Business managers should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that they'll be compromised, and then tailor a set of risk-abatement processes to particular vulnerabilities

Threats Network attacks Intrusions Malicious code

The Operational Approach Identify your company's digital assets, and decide how much protection each deserves Define the appropriate use of IT resources Control access to your systems Insist on secure software

The Operational Approach Know exactly what software is running Test and benchmark Rehearse your response Analyze the root causes

The Bottom Line… Managers need to sort through which risks are most likely to materialize and which could cause the most damage to the business, then spend their money where they think it will be most useful When viewed through an operational lens, decisions about digital security are not much different from other cost-benefit decisions general managers must make

Back to the Risks Facebook and Privacy Google Hacks