Top Banner
If you don’t want to help yourself, no one can Security and Internet security Jasmina Trajkovski [email protected] .mk ELSA Conference Strumica, 27.11.2008
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Security and Internet security

Jasmina [email protected]

ELSA ConferenceStrumica, 27.11.2008

Page 2: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Topics covered

• What is Security and Information Security?

• Culture of Security

• Global Information Security Trends

• Security and Internet security

• Best practices for senior managers

Page 3: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

What is Security and Information Security?

Page 4: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

What is Security?

• “The quality or state of being secure—to be free from danger”

• A successful organization should have multiple layers of security in place:

– Physical security

– Personal security

– Operations security

– Communications security

– Network security

– Information security

Page 5: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

What is Information Security?

• The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information

• Necessary tools: policy, awareness, training, education, technology

• C.I.A. triangle was standard based on confidentiality, integrity, and availability

• C.I.A. triangle now expanded into list of critical characteristics of information

Page 6: 2 Security And Internet Security

If you don’t want to help yourself,

no one can 6

Page 7: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Critical Characteristics of Information

The value of information comes from the characteristics it possesses:

– Availability

– Accuracy

– Authenticity

– Confidentiality

– Integrity

– Utility

– Possession

Page 8: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Figure 1-4 – NSTISSC Security Model

NSTISSC Security Model

Page 9: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Culture of security

Page 10: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

History

OECD Guidelines for the Security

of Information Systems and Networks:

Towards a Culture of Security

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

• adopted as a Recommendation of the OECD Council at

its 1037th Session on 25 July 2002.

Page 11: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Principles part 1

Awareness

• Participants should be aware of the need for security of information systems and networks and what they can do to enhance security.

Responsibility

• All participants are responsible for the security of information systems and networks.

Response

• Participants should act in a timely and co-operative manner to prevent, detect and respond to security incidents.

Page 12: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Principles part 2

Ethics

• Participants should respect the legitimate interests of others.

Democracy

• The security of information systems and networks should be compatible with essential values of a democratic society.

Risk assessment

• Participants should conduct risk assessments.

Page 13: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Principles part 3

Security design and implementation

• Participants should incorporate security as an essential element of information systems and networks.

Security management

• Participants should adopt a comprehensive approach to security management.

Reassessment

• Participants should review and reassess the security of information systems and networks, and make appropriate modifications to security policies, practices, measures and procedures.

Page 14: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Global Information Security Trends

Page 15: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Global information security survey 2008 – Ernst & Young 1/2

• Meeting business objectives is a growing focus of information security.

• Information security is now more integrated into overall risk management.

• Information security remains isolated from executive management and the strategic decision making process.

• Improving IT and operational efficiency are emerging as important objectives.

• Compliance continues to be primary driver of information security improvements.

Page 16: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Global information security survey 2008 – Ernst & Young 2/2

• Privacy and data protection have become increasingly important drivers of information security.

• Organisations rely on audits and self-assessments to evaluate the effectiveness of their information security programs.

• Organisations are demanding more from vendors and business partners in managing third-party relationships.

• The greatest challenge to delivering information security projects continues to be the availability of experienced IT and information security resources.

Page 17: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Internet security

Page 18: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

What is internet security

Internet security involves the protection of a computer's internet account and files from intrusion

of an outside user

Why is it important?

Page 19: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Our life on the internet

• electronic mail (e-mail)

• Instant messaging: Skype, Gtalk, MSN messenger, Yahoo! messenger

• Web 2.0 aplications: Facebook, Hi5, Myspace

• e-commerce, e-banking, stock exchanges,

• Collaborative workspaces

• Educational portal and Student Information Systems

• Official website of corporations, government

Page 20: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Aspects that need security on the internet

• Identity – who we are

– Internet personality

– Profiles, user names, accounts

• Possessions – what we own

– Information on resources: money, grades, property

• Information flow – what we “say”

– Money transfers, sent e-mails, instant messages, submitted documents

• IT assets – what we utilize for our life on the net

– PCs, notebooks, flash drives, mobile phones,…

Page 21: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Attach sophistication vs. Intruders knowledge

Page 22: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Best practices for information security for senior managers

Page 23: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Best practices – part 1

• General management: Managers throughout the organization consider information security a normal part of their responsibility and the responsibility of every employee.

• Policy: Develop, deploy, review, and enforce security policies that satisfy business objectives.

One of the tests of leadership is the ability to

recognize a problem before it becomes an emergency.

Arnold Glasgow (1908-1970)

Page 24: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Best practices – part 2

• Risk Management: Periodically conduct an information security risk evaluation that identifies critical information assets, threats to critical assets, asset vulnerabilities, and risks.

In cases of defense ‘tis best to weigh the enemy more mighty than he seems.

William Shakespeare(1564-1616)

Page 25: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

Best practices – part 3

• Security Architecture & Design: Generate, implement, and maintain an enterprise- (or site-) wide security architecture, based on satisfying business objectives and protecting the most critical information assets.

• User Issues - Accountability and Training, and Adequate Expertise: Establish accountability for user actions, train for accountability and enforce it, as reflected in organizational policies and procedures. Ensure that there is adequate in-house expertise or explicitly outsourced expertise for all supported technologies, including the secure operation of those technologies.

Page 26: 2 Security And Internet Security

If you don’t want to help yourself,

no one can

There is one safeguard known generally to the wise, which is an advantage and security to all...What is it? Distrust.

Demosthenes (c. 384-322 B.C.)