Top Banner

of 28

IS365-CH5

Apr 03, 2018

Download

Documents

teddycbe1
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/28/2019 IS365-CH5

    1/28

    IS 365/765Information

    Security

    Sung Kim

  • 7/28/2019 IS365-CH5

    2/28

    Planning forSecurity

  • 7/28/2019 IS365-CH5

    3/28

    3

    Understand policies, standards, and practices/procedures/guidelines

    Describe what an information securityblueprint is

    Discuss security education, training, andawareness (SETA) programs

    Explain what contingency planning is and howincident response planning, disaster recoveryplanning, and business continuity plans arerelated to contingency planning

    Learning Objectives

  • 7/28/2019 IS365-CH5

    4/28

    4

    Definitions

    Policies are organizational laws influence and determine decisions and actions

    Standards: more detailed statements ofwhat must be done to comply with

    policyPractices, procedures, and guidelines

    effectively explain how to comply withpolicy

    For a policy to be effective, it must beproperly disseminated, read,understood, and agreed to by allmembers of organization and uniformly

    enforced

  • 7/28/2019 IS365-CH5

    5/28

    5

  • 7/28/2019 IS365-CH5

    6/28

    Example in an Enterprise Context

    Policies:It is our policy to investigate everysecurity-related incident within the enterprise.

    Standards:Every security-related incidentshall be investigated by a security officer

    within five days and reported to theconcerned Departmental head. ..

    Procedures:

    Day 1: Preliminary investigation including interviews

    Day 2: Detailed investigation by examining logs etc. Day 3: .

    Day 4: .

    Day 5: Report 1 submitted to concerned DepartmentalHead.

  • 7/28/2019 IS365-CH5

    7/287

    Policy

    Sets strategic direction, scope, andtone for all security efforts within theorganization

    Usually high-level Provide strategic direction

    Support the mission of an organization

    Sanctioned by senior management

    Information security policy providesrules for the protection of theorganizations information assets

  • 7/28/2019 IS365-CH5

    8/288

    Enterprise Information SecurityPolicy (EISP)

    Also known as a general security policy

    Sets the direction for all security effortswithin the organization

    Defines the purpose, scope, constraintsand applicability of the security program

    Guides the development,implementation and management of thesecurity program

  • 7/28/2019 IS365-CH5

    9/28

    Components of EISP

    Statement of Purpose

    IT Security Elements (or Scope)

    IT Security Responsibilities and Roles

    Reference to Other IT Standards andGuidelines

    Examples Table 5-1 on PP. 176-177

    9

    T f I f ti S it

  • 7/28/2019 IS365-CH5

    10/28

    Types of Information SecurityPolicies

    EISP

    Enterprise InfoSec Program

    Policy

    ISSP

    Issue SpecificInfo Sec policy

    SysSP

    System-specificInfo Sec policy

    Organizationallevel, Strategic

    guidelinesspecific to each

    area

    Detailed,Targeted

    Guidelines forTechnology-

    based systems

    Configurationand

    Maintenance ofspecific systems

    NIST 800-14

  • 7/28/2019 IS365-CH5

    11/28

    Issue-Specific Security-Related Policy(ISSP)

    ISSP Various technologies and processes to support

    routine operations

    Need to define the proper use of them

    Electronic Mail, Use of the Internet, Home Use ofCompany-Owned Computer, Use of TelecommunicationTechnologies, Privacy

    Examples

    Table 5-2 on P. 178

    UW Examples http://www.cio.wisc.edu/security/standards.aspx

    11

  • 7/28/2019 IS365-CH5

    12/28

    Systems-Specific Policy (SysSP)

    Often created when configuring ormaintaining systems

    SysSPs can be separated into:

    Management guidance Technical specifications

    May also be combined in a single

    policy document

  • 7/28/2019 IS365-CH5

    13/2813

    Systems-Specific Policy (SysSP)

    SysSPs frequently function as standardsand procedures used when configuringor maintaining systems

    Many security systems require specificconfiguration scripts telling systemswhat actions to perform on each set of

    information they process (e.g.,Firewall)

  • 7/28/2019 IS365-CH5

    14/28

    Management Guidance SysSPs

    Created by management

    Guides the implementation andconfiguration of technology

    Applies to any technology that affectsthe confidentiality, integrity oravailability of information

    Informs technologists of managementintent

  • 7/28/2019 IS365-CH5

    15/28

    Technical Specifications SysSPs

    Created by System administrators

    Each type of equipment has its owntype of policies

    Two general methods of implementingsuch technical controls:

    Access control lists

    Configuration rules

    Th I f ti S it

  • 7/28/2019 IS365-CH5

    16/2816

    The Information SecurityBlueprint

    After identifying vulnerabilities, assessing risks,

    and determining controls

    Should specify tasks to be accomplished andthe order in which they are to be realized

    The security blueprint is the basis for thedesign, selection, and implementation of allsecurity program elements including

    Risk management programs

    Education and training programs Contingency programs

    Technological controls

    Maintenance of the security program

    Th I f ti S it

  • 7/28/2019 IS365-CH5

    17/2817

    The Information SecurityBlueprint

    NIST Special Publication 800-14

    Generally Accepted Security Principles and Practices

    Provides best security practices and principles that can direct

    the security team in the development of a security blueprint. Table 5-6 on PP. 193-194

  • 7/28/2019 IS365-CH5

    18/2818

    Generally Accepted Principles

    1. Security supports the mission of the organization2. Security is an integral element of sound management3. Security should be cost-effective4. System owners have security responsibilities outside

    their own organizations

    5. Security responsibilities and accountability should bemade explicit

    6. Security requires a comprehensive and integratedapproach

    7. Security should be periodically reassessed8. Security is constrained by societal factors

  • 7/28/2019 IS365-CH5

    19/28

    Generally Accepted Practices

    1. Policy2. Program Management

    3. Risk Management

    4. Life Cycle Planning

    5. Personnel/User Issues

    6. Preparing for Contingencies and Disasters7. Computer Security Incident Handling

    8. Security Considerations in Computer Support and Operations

    9. Physical and Environmental Security

    10. Awareness and Training

    11. Identification and Authentication12. Logical Access Control

    13. Audit Trails

    14. Cryptography

    19

    S it Ed ti T i i d

  • 7/28/2019 IS365-CH5

    20/2820

    Security Education, Training andAwareness (SETA)

    After developing policy, program, andblueprint, you need to implement a SETAprogram.

    Control measure designed to reduceaccidental security breaches

    Human errors are among the top threats toinformation assets.

    Help employees to do their jobs securely

    Security Education Training and

  • 7/28/2019 IS365-CH5

    21/28

    Security Education, Training andAwareness (SETA)(continued)

    Purpose: Education To build in-depth knowledge and

    understanding in security matters

    Training To develop skills so that computer

    users can perform their jobs more securely Awareness To increase awareness of the

    need to protect information assets

    Table 5-10 on p. 207

    Security Education Training &

  • 7/28/2019 IS365-CH5

    22/28

    Security Education Training &Awareness Framework (SETA)

  • 7/28/2019 IS365-CH5

    23/28

    23

    Security Education

    Everyone in an organization needs tobe trained and aware of informationsecurity; not every member needsformal degree or certificate in

    information security

    Summary

    Objective: understanding/ insight

    Impact timeframe: long term Method: classroom

    Test measure: essay

    Focuses on why.

  • 7/28/2019 IS365-CH5

    24/28

    24

    Security Training

    Involves providing members of organizationwith detailed information and hands-oninstruction designed to prepare them toperform their duties securely

    Summary Objective: hands-on knowledge (rather than

    exposure).

    Impact timeframe: intermediate term (somewhere

    between short and long term). Method: lab

    Test measure: problem solving

    Focuses on how.

  • 7/28/2019 IS365-CH5

    25/28

    25

    Security Awareness

    One of least frequently implemented butmost beneficial programs is the securityawareness program

    Designed to keep information security

    at the forefront of users minds

    Need not be complicated or expensive

    Summary

    Objective: exposure Impact timeframe: short-term

    Method: videos and newsletters

    Test measure: true/false, multiple choice

    Focuses on what

  • 7/28/2019 IS365-CH5

    26/28

    26

    Continuity Strategies

    Incident response plans (IRPs); disasterrecovery plans (DRPs); businesscontinuity plans (BCPs)

    Primary functions of above plans IRP focuses on immediate response; if attack escalates or is

    disastrous, process changes to disaster recovery and BCP

    DRP typically focuses on restoring systems after disastersoccur; as such, is closely associated with BCP

    BCP occurs concurrently with DRP when damage is major orlong term, requiring more than simple restoration ofinformation and information resources

  • 7/28/2019 IS365-CH5

    27/28

    27

    Contingency Planning Timeline

  • 7/28/2019 IS365-CH5

    28/28

    Summary

    Management has essential role in development, maintenance,

    and enforcement of information security policy, standards,practices, procedures, and guidelines

    Information security blueprint is a planning document that isbasis for design, selection, and implementation of all securitypolicies, education and training programs, and technological

    controls

    Information security education, training, and awareness (SETA)is control measure that reduces accidental security breachesand increases organizational resistance to many other forms ofattack

    Contingency planning (CP) made up of three components:incident response planning (IRP), disaster recovery planning(DRP), and business continuity planning (BCP)