INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

41
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012

Transcript of INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Page 1: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

INFORMATION SECURITY & RISK MANAGEMENT

SZABIST – Spring 2012

Page 2: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Information Security & Risk Management

This chapter presents the following:

Security management responsibilities Difference between administrative, technical, and

physical controls Three main security principles Risk management and risk analysis Security policies Information classification Security-awareness training

Page 3: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Management

Security management includes: risk management / risk analysis, information security policies and procedures, standards, guidelines, baselines, information classification, security organization, and security education.

The objective of security, and a security program, is to protect the company and its assets

Page 4: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Management Process of security management:

Is the Risk Management one time activity?

Risk Assessment and determination of

Need

Monitoring and Evaluation of systems and

practices

Promoting Awareness

Implementation of policies and controls to address the identified risks .

Continuous evaluation

and Evaluation

Page 5: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Management

Are the risks in Mainframes and PC similar? Functionality, Connectivity What about the required controls?

Based on the Risk Assessment, which of the following is more critical? Computers Data Physical buildings, Factory equipment,

Page 6: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Management

“Security is more than just a firewall and a router with an access list; these systems

must be managed, and a big part of security is managing the actions of users

and the procedures they follow”

Page 7: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Management Responsibilities

Okay, who is in charge and why?

Page 8: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Management Responsibilities

Security, management’s functions involve determining: Scope and objectives, policies, priorities, and strategies.

Business Equation = Productivity + Information security

Again, Who’s responsibility is this? IT administrator’s responsibilities. highest levels of management Both IT and Management

Page 9: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Management Responsibilities

Management’s responsibility is to provide: Protection for the resources it is responsible, and the company

overall. human, capital, hardware, information; etc

Funding to support security initiatives, Strategic representatives should participate in the security

program. Assignment of roles and responsibilities to get the security

program off the ground and to keep it evolving as the environment changes.

Integrate the program into the current business environment and monitor its accomplishments.

Management’s support is one of the most important pieces of a security program.

Page 10: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Management Responsibilities

Identification and valuation of company’s assets,

Risk analysis and assessments. Identify vulnerabilities and exposure rate Rank the severity of identified vulnerabilities

Classification of data, Implementation of security policies to provide

integrity, confidentiality, and availability for those assets.

Page 11: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Administration and Supporting Controls Security Officer - Directly responsible for

development and monitoring of the security program. Information Owners - Dictate which users can

access their resources, what those users can do with those resources. Usually a senior executive within the management

group of the company, or the head of a specific department.

Corporate responsibility for data protection If the information owner does not lay out the foundation

of data protection and ensure the directives are being enforced, she would be violating the due care concept.

Page 12: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Administrator - Make sure these objectives are implemented.

Following controls should be utilized to achieve management’s security directives: (figure 3.1) Administrative controls Technical controls (also called logical controls) Physical controls

Security Administration and Supporting Controls

Page 13: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Administration and Supporting Controls

Page 14: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Fundamental Principle of Security Now, what are we trying to

accomplish again?

AIC or CIA triad!!!

Page 15: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Fundamental Principle of Security

Availability

Emergency! I can’t get to my data! Response: Turn the computer on!

Page 16: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Fundamental Principle of Security

Integrity assurance of the accuracy and

reliability of the information any unauthorized modification is

prevented.

Page 17: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Fundamental Principle of Security

Confidentiality

Confidentiality ensures that the necessary level of secrecy is enforced at each junction of data processing and prevents unauthorized disclosure.

Page 18: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Definitions

Define the following, based on the prior knowledge???

Vulnerability Threat Risk Exposure Countermeasure (controls)

Page 19: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Relationship between different Security Components

Page 20: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Frameworks

What are the Security Standards and Frameworks?

Page 21: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Frameworks

Control Objectives for Information and

related Technology (CobiT)

ISO/IEC 27001 – Information Security Management System (ISMS)

Information Technology Infrastructure

Library (ITIL)

Page 22: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Frameworks

ISO 27001:2005 – Information Security Management System Information Security Policy Organization of Information Security Access Controls Communications and Operations Management Asset Management Physical and Environmental Security Systems Acquisition, Development and Maintainence Human Resource Security Business Continuity Management Compliance

Page 23: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Program Development

A continuous life cycle that is described in the following steps: Plan and organize.

Risk Assessment and determination of Need - 1 Implement.

Implementation of policies and controls to address the identified risks - 2

Operate and maintain. Promoting Awareness - 3

Monitor and evaluate. Monitoring and Evaluation of systems and practices - 4

Page 24: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security Program Development

Identify and relate the following in stages of life cycle: Establish management commitment. Carry out a risk assessment. Develop security architectures at an organizational,

application, and network level. Assign roles and responsibilities. Develop and implement security policies, procedures, and

guidelines. Asset identification and management. Follow procedures to ensure all baselines are met as required. Carry out internal and external audits. Manage service level agreements. Review logs, audit results, and SLAs. Assess goal accomplishments.

Page 25: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Information Risk Management

“The process of identifying and assessing risk, reducing it to an acceptable level, and

implementing the right mechanisms to maintain that level.”

Risks to a company come in different forms, and they are not all computer related.

Page 26: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Information Risk Management

Organizations should be aware of the following major risk categories and prioritize them accordingly: Physical damage - Fire, water, vandalism, power loss, and natural

disasters Human interaction - Accidental or intentional action or inaction that

can disrupt productivity Equipment malfunction - Failure of systems and peripheral devices Inside and outside attacks - Hacking, cracking, and attacking Misuse of data - Sharing trade secrets, fraud, espionage, and theft Loss of data - Intentional or unintentional loss of information through

destructive means Application error - Computation errors, input errors, and buffer

overflows

Page 27: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Risk Analysis

A risk analysis has four main goals / steps:

Identify assets and their value to the

organization.

Identify vulnerabilities and threats.

Quantify the probability and business impact of

these potential threats.

Provide controls (a balance between the impact of

the threat and the cost of the countermeasure).

Page 28: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

The Value of Information and Assets

Based on the CIA Triad Qualitative approach will be used in class.

Categorization in HIGH, MEDIUM, and LOW Valuation of assets in High, Medium and Low

Quantitative approach is also used in industry to assign value to assets. Cost to acquire or develop the asset Cost to maintain and protect the asset Value of the asset to owners and users Operational activities affected if the asset is

unavailable Usefulness and role of the asset in the organization

Page 29: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Workshop 1

Identify information Assets

Assets Valuation

Page 30: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Threats and Vulnerability

Difference between threat and vulnerability?

Examples???

Relate threat and vulnerability?

Page 31: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Identification of Threats & Vulnerabilities

Many types of threat agents can take advantage of several types of vulnerabilities, resulting in a variety of specific threats. Threats for IT Environment?

Page 32: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Protection Mechanism (Controls) identify the current security mechanisms

and to evaluate their effectiveness. each threat type must be addressed and

planned for individually. Access control mechanisms Software applications and data malfunction Site location, fire protection, site construction,

power loss, and equipment malfunctions Telecommunication and networking issues Business continuity and disaster recovery

Page 33: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Controls Selection

It should be cost-effective (its benefit outweighs its cost).

(ALE before implementing safeguard) – (ALE after implementing safeguard) – (annual cost of safeguard) = value of safeguard to the company

For example, if the ALE of the threat of a hacker bringing down a web server is $12,000 prior to implementing the suggested safeguard, and the ALE is $3,000 after implementing the safeguard, while the annual cost of maintenance and operation of the safeguard is $650, then the value of this safeguard to the company is $8,350 each year.

Page 34: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Workshop 2

Page 35: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Putting it all Together

Total Risk vs Residual Risk total risk – countermeasures = residual risk

Page 36: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Handling the Risk

Now, Handle which risk? Residual Risk

Risk Management???? Avoid Reduce Transfer Accept

Page 37: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Policies, Standards, Baselines, and Procedures

Security Policy - An overall general statement produced by senior management that dictates what role security plays within the organization.

Standards - mandatory activities, actions, or rules. Can give a policy its support and reinforcement in

direction. Can be internal or external (government laws and

regulations) Baselines - define the minimum level of protection

required. Procedures - detailed step-by-step tasks that should

be performed to achieve a certain goal.

Page 38: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Information Classification

Page 39: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Security-Awareness Training Security Trends and Risk Awareness Communication of Policies and

Procedures Expected responsibilities and acceptable

behaviors Legal Actions in case of Non-Compliance;

etc

Page 40: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

Summary

Page 41: INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.

End of Chapter 2

Thank You