Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Topic Outline — Information security? — Security Why? — Security approach — Vocabulary — The weakest link — Real life security sample.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Controls – What Works
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Introducing Computer and Network Security
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Computer Security: Principles and Practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Stephen S. Yau CSE , Fall Security Strategies.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
What is HIPAA? H ealth I nsurance P ortability and A ccountability A ct (Kennedy-Kassenbaum Bill) nAdministrative Simplification –Privacy –Transactions.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
HIPAA COMPLIANCE WITH DELL
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Lecture 1: Overview modified from slides of Lawrie Brown.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Information Systems Security Operations Security Domain #9.
Chapter VII Security Management for an E-Enterprise -Ramyah Rammohan.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Chap1: Is there a Security Problem in Computing?.
SecSDLC Chapter 2.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
IS3220 Information Technology Infrastructure Security
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
CS457 Introduction to Information Security Systems
ISSeG Integrated Site Security for Grids WP2 - Methodology
Information System and Network Security
I have many checklists: how do I get started with cyber security?
IS4680 Security Auditing for Compliance
How to Mitigate the Consequences What are the Countermeasures?
IS4680 Security Auditing for Compliance
Mohammad Alauthman Computer Security Mohammad Alauthman
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332

Main Points Information Security and Policy Definition Key Security Concepts Key Security Concepts Relationship

Definition Information security is the practice of protecting information from unauthorized access, use, disclosure, alert, inspection, recording or damage. Information policy is the set of all public laws and regulations that control the creation, use, storage, access, and communication of information Information security policy A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

Key Security Concepts Confidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information Integrity Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity Availability Ensuring timely and reliable access to and use of information © 2016 PEARSON EDUCATION, INC., HOBOKEN, NJ. ALL RIGHTS RESERVED.

Cyber Security vs. Cyber Crime Cyber-Security: the protection of the confidentiality, integrity and availability of computer data and systems in order to enhance security, resilience, reliability and trust in ICT Figure: Cyber security (read box) and Cyber crime (blue box): ◦Commons ◦Differences

Key Security Concepts Asset: Anything that has value to the organization. ◦Tangible and Intangible assets. ◦Examples: Threat: A potential cause of an unwanted incident, which may result in harm to a system or organization ◦Capable of exploiting vulnerabilities ◦Source: Intentional and Unintentional threats ◦Origin: Human and natural ◦Examples: Exploit: A program or a “cookbook” on how to take advantage of a specific vulnerability Example:

Key Security Concepts Vulnerability: A weakness of an asset or group of assets that can be exploited by a threat ◦Vulnerability in: Code, Configuration, Design, Policy, Human, and Transfer ◦Example: ◦Categories of vulnerabilities ◦Corrupted (loss of integrity) ◦Leaky (loss of confidentiality) ◦Unavailable or very slow (loss of availability) Attack: is a threat that is carried out (threat action) and, if successful, leads to an undesirable violation of security, or threat consequence.

Key Security Concepts Risk: An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. ◦Risk level increase when:  Threat level increase  Asset value increase  Vulnerability is found Risk = Threats x Vulnerabilities x Assets

Key Security Concepts

Importance of Key Security Concepts To avoid the threats: Know your self ◦Know the value of assets and information you have to be protected Know your threats you might face ◦Intentional and Unintentional threats Know your vulnerabilities you have ◦Scanning ◦Conducting ethical hacking (CEH holder) Response to the threats ◦Actions to be taken to avoid the threats ◦Actions to be taken when the threats occur

Key Security Concepts Security Control: Means of managing risk, including polices, procedures, guidelines, practices or organizational structures, which can be of administrative, technical, or management. ◦Example: Countermeasure: is an action, device, procedure, or technique that reduces a threat, vulnerability, or an attack ◦Example:

Key Security Concepts Relationship Ontology is a formal naming and definition of the types, properties, and interrelationships of the things (individual concepts) that really exist for a particular domain. Each individual concept has a relationship with one or more of other concepts. The ontology of the following figure has 5 top level classes: 1.asset, 2.Countermeasure (e.g. control), 3.organization, 4.threat and 5.vulnerability. These 5 classes are the most basic in security area Reference: Security Ontology for Adaptive Mapping of Security Standards S. Ramanauskait˙e, D. Olifer, N. Goranin, A. 2013

The overview of the concepts and relationships in the information security ontology

Key Security Concepts Relationship The previous ontology can be extended as shown in the following figure. The central elements are threats, vulnerabilities, controls, and their implementations. As soon as a threat exploits a physical, technical, or administrative weakness, it gives rise to follow-up threats, represents a potential danger to the organization’s assets, and affects specific security attributes (e.g., confidentiality, integrity, and/or availability). We also use potential threat origins (human or natural origin) and sources (accidental or deliberate source) to describe each threat. Each vulnerability is assigned a severity value and the asset on which it could be exploited. Decision makers have to implement controls to mitigate identified vulnerability and to protect the respective assets through preventive, corrective, recovery, or detective measures (control type). Reference: Mapping ISO into Security Ontology, Ferran Alcázar, Vienna, Austria, 2004

Computer and Network Assets, with Examples of Threats.

17 Multiple domains and Information Security Information security draws upon the best practices and experiences from multiple domains including ◦Compliance, policies, and standards ◦Administration, auditing, access controls, and permission controls ◦Intrusion detection and prevention and incident response ◦Software development security ◦Physical security ◦Operations control ◦Public key infrastructure and key management ◦Disaster recovery ◦Security testing ◦Software development security ◦Antivirus solutions ◦Training and awareness