Top Banner
Presented by: Group - 15 Kumar Mayank (14609038) Rachit Mehrotra (14609157) IT Architecture for Dummies – Chapter 5 & 6
22

Planning Enterprise Information Security

Dec 12, 2015

Download

Documents

Kumar Mayank

Complying with Mandates and Managing Risks
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Planning Enterprise Information Security

Presented by:Group - 15

Kumar Mayank (14609038)Rachit Mehrotra (14609157)

IT Architecture for Dum-mies – Chapter 5 & 6

Page 2: Planning Enterprise Information Security

Coverage

• Planning Enterprise Information Security Protecting enterprise data. Creating a security plan. Developing a security policy. Using technology to support security operations.

• Complying with Mandates and Managing Risks Keeping your company complaint. Planning to manage risk. Addressing risks.

04/18/2023IT Architecture for Dummies - Chapter 5

& 62

Page 3: Planning Enterprise Information Security

Protecting Enterprise Data

Data breaches is the inadvertent release of sensitive or protected data that must be protected.

Common ways in which data is revealed include -• Theft of equipment (particularly laptops) containing unencrypted

information.• Equipment discovered missing during periodic inventory checks.• Confidential data posted to a company’s public Web site or

inadequately secured accessible location.• Improper disposal of data processing equipment.• Accidental exposure through e-mail.

04/18/2023IT Architecture for Dummies - Chapter 5

& 63

Page 4: Planning Enterprise Information Security

Creating a Security Plan

• Design a workable program.• View security as a program, not as a project.• Keep security simple.

04/18/2023IT Architecture for Dummies - Chapter 5

& 64

Page 5: Planning Enterprise Information Security

Creating a Security Plan….

• Use a layered framework which involves following security measures –

Data Applications that access the data Hosts on which the applications and data reside Network on which the hosts reside Perimeter separating your organization’s network from the

public network Facility housing the computing

04/18/2023IT Architecture for Dummies - Chapter 5

& 65

Page 6: Planning Enterprise Information Security

Creating a Security Plan….

04/18/2023IT Architecture for Dummies - Chapter 5

& 66

Figure 1 : A simple example of the Layered Defense strategy.

Page 7: Planning Enterprise Information Security

Creating a Security Plan….

• Implement security standard– ISO/IEC 27000 series, published by the International

Organization for Standardization (www.iso.org) Systems Security Engineering Capability Maturity Model (

www.ssecmm.org) The Standard of Good Practice for Information Security,

published by the Information Security Forum (www.isfsecuritystandard.com)

Special Publication 800 standards, published by the U.S. National Institute of Standards and Technology (csrc.nist.gov)

Federal Information Processing Standards (www.itl.nist.gov/fipspubs)

04/18/2023IT Architecture for Dummies - Chapter 5

& 67

Page 8: Planning Enterprise Information Security

Developing a Security Policy

• Classifying data to be secured.• Training employees.• Getting management approval.

It ensures that those who control the finances understand that security is important and must be budgeted for.

It lets employees know that security is a valid business concern.

• Maintaining the policy. Emerging security threats. Changes in business functionality or data classification. Implementation of new technology. Mergers and acquisitions. Security incidents.

04/18/2023IT Architecture for Dummies - Chapter 5

& 68

Page 9: Planning Enterprise Information Security

Developing a Security Policy….

Addressing basic security elements –

• Administrative access• Acceptable use.• Authorized software.• Data disposal.• Encryption.• Firewall.• Incident management.• Malware.• Passwords.• Server and workstation hardening.• Social engineering awareness.• Social media.• Telephone procedures.• Waste disposal04/18/2023

IT Architecture for Dummies - Chapter 5 & 6

9

Page 10: Planning Enterprise Information Security

Using Technology to support Security Operations

• Remain flexible.• Plan for partner relationships.• Outsource only when necessary.

04/18/2023IT Architecture for Dummies - Chapter 5

& 610

Page 11: Planning Enterprise Information Security

Using Technology to support Security Operations• Use collaborative technologies.

E-mail and messaging. Discussion boards and wikis. Scheduling and task management. Conferencing (Web, voice, and video). Communicate new security policies. Announce potential threats. Detail how to address, report, or respond to these risks. Remind users of their responsibilities with regards to

security. Provide a mechanism for security incident reporting

04/18/2023IT Architecture for Dummies - Chapter 5

& 611

Page 12: Planning Enterprise Information Security

04/18/2023 IT Architecture for Dummies - Chapter 19 & 20

12

Complying with Mandates and Managing Risk

Page 13: Planning Enterprise Information Security

Legal Mandates Affecting Organization

• SOX• GLBA• HIPAA• FERPA• COPPA

Page 14: Planning Enterprise Information Security

Planning to manage risk

• Technical ConsiderationsData centre management solutionsTechnology replacement agreements

o Physical Securityo Data centre planning measures

Page 15: Planning Enterprise Information Security

Types Of Threats

• Natural-Weather events• Environmental-Fire, power failure• Human-Cheat, fraud• Electronic

– Malware– Bugs– Phishing mails– Bots & Botnets

Page 16: Planning Enterprise Information Security

Assessing Risk

• Each threat is analyzed to determine its probabil-ity and impact.

• Probability refers to likelihood that the threat will materialize into an actual event.

• Impact refers to loss that would occur.

Page 17: Planning Enterprise Information Security

Assessing Risk Process

• Determining Probability- How often threat events occur.

• Determining Impact- By nature & severity of the consequences of a successful threat event.

• Using a risk matrix-Determining risk rating

Page 18: Planning Enterprise Information Security

Addressing Risk

• Prioritizing Threats• Reducing Probability• Reducing Impact

Page 19: Planning Enterprise Information Security

Prioritizing threats

• Acceptance- Risk identified & accepted. Impact is understood.

• Avoidance-selecting an alternative option.• Mitigation-Additional protection or Alterations.• Transference-Insurance protections

Page 20: Planning Enterprise Information Security

Reducing Probability

• Use of countermeasures against common threats.• Examples:

Threat Countermeasures

Data exposure from lost or stolen backup media

Encrypt backups and implement greater physical security controls.

Thefts of user credentials Install anti-malware software

Unauthorized access to corpo-rate network

Install a firewall

Page 21: Planning Enterprise Information Security

Reducing Impact

• Comprehensive contingency plan.• Training users to report suspected security inci-

dents.• Implementing clusters, load balancing.• Ensure that copies of critical data are stored in a

secure facility.

Page 22: Planning Enterprise Information Security

04/18/2023 IT Architecture for Dummies - Chapter 19 & 20

22