Top Banner
Managing Information Managing Information System Security: System Security: Principles Principles GP Dhillon GP Dhillon Associate Professor Associate Professor Virginia Commonwealth Virginia Commonwealth University University
30

Managing Information System Security: Principles

Jan 05, 2016

Download

Documents

Weston Zhu

Managing Information System Security: Principles. GP Dhillon Associate Professor Virginia Commonwealth University. Shocking news. 25% of the organizations did not have an internal audit 50% of the organizations did not have computer audit skills - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Managing Information System Security: Principles

Managing Information Managing Information System Security: PrinciplesSystem Security: Principles

GP DhillonGP Dhillon

Associate ProfessorAssociate Professor

Virginia Commonwealth UniversityVirginia Commonwealth University

Page 2: Managing Information System Security: Principles

Shocking newsShocking news

25% of the organizations did not have an 25% of the organizations did not have an internal auditinternal audit

50% of the organizations did not have 50% of the organizations did not have computer audit skillscomputer audit skills

60% of the organizations had no security 60% of the organizations had no security awarenessawareness

80% of the organizations did not conduct 80% of the organizations did not conduct a risk analysisa risk analysis

Page 3: Managing Information System Security: Principles

General StatisticsGeneral Statistics

CERT/CC: Incidents CERT/CC: Incidents ReportedReported1991 – 4061991 – 4061993 – 1,3341993 – 1,3341995 – 2,4121995 – 2,4121997 – 2,1341997 – 2,1341999 – 9,8591999 – 9,8592001 – 52,6582001 – 52,6582003 – 137,5292003 – 137,529

Page 4: Managing Information System Security: Principles

Common MythsCommon Myths

““Why should I care, I have nothing to hide.”Why should I care, I have nothing to hide.” ““Why does anyone care about my computer?”Why does anyone care about my computer?” ““It’s too difficult to get access to my computer or It’s too difficult to get access to my computer or

personal information…”personal information…” ““If someone tries to [insert malicious activity If someone tries to [insert malicious activity

here], I will notice!”here], I will notice!” ““Ignorance is bliss!”Ignorance is bliss!”

Page 5: Managing Information System Security: Principles

Are you at risk?Are you at risk?

Using the following puts you at risk:Using the following puts you at risk: ComputersComputers Credit CardsCredit Cards BanksBanks AirlinesAirlines AutomobilesAutomobiles ……many more…many more…

Page 6: Managing Information System Security: Principles

CIACIA – the building blocks – the building blocks

ConfidentialityConfidentiality

AvailabilityAvailabilityIntegrityIntegrity

Page 7: Managing Information System Security: Principles

ConfidentialityConfidentiality

Ensures privacy.Ensures privacy. Applies to both data Applies to both data

on disks and network on disks and network communication.communication.

Accomplished Accomplished through encryption:through encryption: https://https:// s/mimes/mime pgppgp ssh and ipsecssh and ipsec

ConfidentialityConfidentiality

Page 8: Managing Information System Security: Principles

IntegrityIntegrity

Develops trust of the Develops trust of the network and network and computer systems.computer systems.

Applies to both data Applies to both data on disks and network on disks and network communication.communication.

Integrity is increased Integrity is increased by proper data and by proper data and system management.system management.

IntegrityIntegrity

Page 9: Managing Information System Security: Principles

AvailabilityAvailability

Another catalyst for Another catalyst for trust.trust.

Required for data on Required for data on disk and network disk and network

Prevents Denial o Prevents Denial o Service attacks, etc.Service attacks, etc.

AvailabilityAvailability

Page 10: Managing Information System Security: Principles

Defending with Defending with technologytechnology

Defending with Defending with technologytechnology

Page 11: Managing Information System Security: Principles

Start with the basicsStart with the basics

Basic computer security is Basic computer security is through technology is easy; through technology is easy; use…use… A firewall,A firewall, Anti-Virus Software,Anti-Virus Software, Patch your computer Patch your computer

quickly, when required,quickly, when required, Strong passwords!Strong passwords!

Page 12: Managing Information System Security: Principles

FirewallsFirewalls

The most useful tool in your bag The most useful tool in your bag of defenses.of defenses.

Prevents intruders from accessing Prevents intruders from accessing services on your computer.services on your computer.

Validates/normalizes network Validates/normalizes network traffic.traffic.

May provide reports and trend May provide reports and trend analysis.analysis.

Available for all major operating Available for all major operating systems – usually for free!systems – usually for free!

Page 13: Managing Information System Security: Principles

Anti-virus softwareAnti-virus software

Stops viruses and worms sent Stops viruses and worms sent by email, attachments, by email, attachments, downloads, etc.downloads, etc.

Detects malicious software Detects malicious software through intelligent heuristics.through intelligent heuristics.

Available for all major desktop Available for all major desktop and and server operating systems.server operating systems.

A requirement; not an option.A requirement; not an option.

Page 14: Managing Information System Security: Principles

PatchesPatches

(Usually) free updates to your computer; (Usually) free updates to your computer; can be downloaded can be downloaded from the Internet. from the Internet.

Available before most Available before most exploits surface.exploits surface.

Automated, usually.Automated, usually.CriticalCritical to overall security. to overall security. Chant:Chant: “We Must Patch, We Must “We Must Patch, We Must

Patch…”Patch…”

Page 15: Managing Information System Security: Principles

Strong passwordsStrong passwords

Keeps you on-target with best Keeps you on-target with best practices.practices.

Is composed of 8 or more Is composed of 8 or more characters and includes letters, characters and includes letters, numbers and 2 special characters, numbers and 2 special characters, including !@#$%^&.-+-=|]{}:”.including !@#$%^&.-+-=|]{}:”.

Not based on any dictionary word Not based on any dictionary word from any language.from any language.

Changes regularly; not shared.Changes regularly; not shared.

Page 16: Managing Information System Security: Principles

Behavioral changesBehavioral changesBehavioral changesBehavioral changes

Page 17: Managing Information System Security: Principles

What technology doesn’t solveWhat technology doesn’t solve

Security technologies adapt Security technologies adapt as threats appear. They are as threats appear. They are not able to (easily) combat:not able to (easily) combat: Threats,Threats, Hoaxes,Hoaxes, Scams,Scams, The behavior of others.The behavior of others.

Page 18: Managing Information System Security: Principles

The clue factorThe clue factor

Page 19: Managing Information System Security: Principles

Education and awarenessEducation and awareness

Education and awareness are Education and awareness are key to increasing the security key to increasing the security posture of the University, and posture of the University, and global Internet.global Internet. Dispells the FUD (fear, uncertainty, Dispells the FUD (fear, uncertainty,

doubt).doubt). Addresses problems before they Addresses problems before they

exist.exist. Extends the radius of clue.Extends the radius of clue. Creates inclusion in the entire Creates inclusion in the entire

infosecurity effort.infosecurity effort.

Page 20: Managing Information System Security: Principles

Self-educationSelf-education

You can increase your own You can increase your own awareness of security awareness of security related issues.related issues. Subscribe to mailing lists for Subscribe to mailing lists for

security notifications.security notifications. Visit security related websites.Visit security related websites. Voice your concern on Voice your concern on

security related issues, security related issues, helping raise awareness in helping raise awareness in others.others.

Page 21: Managing Information System Security: Principles

Test your effortsTest your efforts

Remember: security is Remember: security is about sharing about sharing knowledgeknowledge and and contactscontacts, not , not technology.technology.

Page 22: Managing Information System Security: Principles

The ‘RITE’ principlesThe ‘RITE’ principles

RResponsibility esponsibility (and knowledge of (and knowledge of Roles)Roles)

IIntegrity ntegrity (as requirement of Membership)(as requirement of Membership)

TTrust rust (as distinct from Control)(as distinct from Control)

EEthicality thicality (as opposed to Rules)(as opposed to Rules)

Page 23: Managing Information System Security: Principles

““Total” securityTotal” security

CIA + RITECIA + RITE

Page 24: Managing Information System Security: Principles

Conceptualizing controlsConceptualizing controls

Pragmatic controls

Formal controls

Technical controls

Page 25: Managing Information System Security: Principles

Principle #1Principle #1

Principle 1: Education, training and Principle 1: Education, training and awareness, although important, are awareness, although important, are not sufficient conditions for not sufficient conditions for managing information security. A managing information security. A focus on developing a security focus on developing a security culture goes a long way in culture goes a long way in developing and sustaining a secure developing and sustaining a secure environment. environment.

Page 26: Managing Information System Security: Principles

Principle #2Principle #2

Principle 2: Responsibility, integrity, Principle 2: Responsibility, integrity, trust and ethicality are the trust and ethicality are the cornerstones for maintaining a secure cornerstones for maintaining a secure environment.environment.

Page 27: Managing Information System Security: Principles

Principle #3Principle #3

Principle 3: Establishing a boundary Principle 3: Establishing a boundary between what can be formalized and between what can be formalized and what should be norm based is the basis what should be norm based is the basis for establishing appropriate control for establishing appropriate control measures.measures.

Page 28: Managing Information System Security: Principles

Principle #4Principle #4

Principle 4: Rules for managing Principle 4: Rules for managing information security have little information security have little relevance unless they are relevance unless they are contextualized.contextualized.

Page 29: Managing Information System Security: Principles

Principle #5Principle #5

Principle 5: In managing the security of Principle 5: In managing the security of technical systems a rationally planned technical systems a rationally planned grandiose strategy will fall short of grandiose strategy will fall short of achieving the purpose.achieving the purpose.

Page 30: Managing Information System Security: Principles

Principle #6Principle #6

Principle 6: Formal models for Principle 6: Formal models for maintaining the confidentiality, maintaining the confidentiality, integrity and availability (CIA) of integrity and availability (CIA) of information cannot be applied to information cannot be applied to commercial organizations on a grand commercial organizations on a grand scale. Micro-management for scale. Micro-management for achieving CIA is the way forward. achieving CIA is the way forward.