INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Auditing Computer Systems
Lecture 1: Overview modified from slides of Lawrie Brown.
The Islamic University of Gaza
Security Controls – What Works
Information Security Policies and Standards
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Information Assurance and Security: Overview. Information Assurance “Measures that protect and defend information and information systems by ensuring.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Peer Information Security Policies: A Sampling Summer 2015.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Central Piedmont Community College Internal Audit.
An Educational Computer Based Training Program CBTCBT.
N ational I NFOSEC E ducation and T raining P rogram Educational Solutions for a Safer World http//
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Chapter Three IT Risks and Controls.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Status Report: Task Force on FAMU Finance and Operational Control Issues Derry Harper, Inspector General & Director of Compliance December 6, 2007.
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security What is Information Security?
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
CS457 Introduction to Information Security Systems
APPLICATION RISK AND CONTROLS
#IASACFO.
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT
HIPAA Security Standards Final Rule
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

INFORMATION ASSURANCE POLICY

Information Assurance Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities

Information Assurance Objectives Confidentiality - assurance that information is not disclosed to unauthorized persons, processes, or devices Availability - timely, reliable access to data and information services for authorized users; Integrity - protection against unauthorized modification or destruction of information; Authentication - security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information Non-repudiation - assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data

U.S. National IT Security Strategy T H E N A T I O N A L S T R A T E G Y T O SECURE CYBERSPACE F E B R U A R Y

Reasons for not being concerned with security policy ● “Data doesn’t need protecting because it isn’t sensitive” ● “Risk must be accepted as a part of doing business” ● Technical personnel would rather work with the technical system than perform the mundane tasks associated with policy ● Security impedes productivity (efficiency and costs time and money) ● Policy is measure to control behavior ● Policy will be difficult to adhere to all the time

Reasons for Establishing Security Policy ● Provides comprehensive, integrated plan ● Defines appropriate behavior for all consumers/managers of system ● Defines the tools and procedures needed to meet the determined security requirements ●Communicates a consensus of what should be done ● Provides authority for response to inappropriate behavior

INDIANA UNIVERSITY OF PENNSYLVANIA INFORMATION PROTECTION POLICY December 1, 2005 Approved for implementation by Dr. Tony Atwater and President’s Cabinet October 31, 2005

IUP POLICIES (from ATS Homepage) ATS also provides guidelines on: IUP Computer Account Retention Policy Student Computing Rights Student Computing Responsibilities Guidelines for the IUP Computing Lab Facilities Guidelines for the IUP Computing Lab Facilities Computing Resources Policy Computer Software Policy Privacy Policy IUP Policy Pages New Information Protection Policy IMPORTANT NEW INFORMATION!! New Information Protection Policy IUP Use of Policy Academic Affairs Policies Student Affairs Policies The Source: Student Handbook Technology Services Center Policies

HIERARCHICAL POLICY MODEL VALUES + INTERESTS  GOALS OR OBJECTIVES (POLICY) + VULNERABILITIES + THREATS + CAPABILITIES  STRATEGY

VALUES

INTERESTS

POLICY It is the policy of IUP that all information be used in a manner that maintains an appropriate and relevant level of confidentiality and that provides sufficient assurance of its integrity in compliance with existing laws and PASSHE and University Policies. While the elimination of all risk is impossible, the goal of the policy is to minimize the possibility of information misuse, corruption, and loss through adoption of reasonable procedures for the University community to follow

1st Step – Define policy makers ● should represent all users (students/faculty/administrators) ● decide what will be the scope and goals of the policy ●● Who and what is covered? ●● How specific? ● Use vision statements from Academic, Administrative, and Library computing as to what they would like to be able to do with the IT system to assist in guiding policy development

IUP IT Security Policy Chain of Responsibility Information System Security Officer Academic Computing Policy Advisory Committee & Academic Technology Operating Group Administrative Computing Oversight Committee College Deans College Technology Managers Technolog y Services Center

2nd Step – Document IT system (Vulnerabilities & Capabilities) ● in order to protect have to know ●● What it is ●● What it does ●● What its weaknesses are ●● What potential threats to it exist ●● What has or is being done to mitigate the risks to your data and system ● Provides institutional data about system ● Documenting controls in place, or the planned controls, identifies specifics about a system’s security

Higher Ed vs Others requirement to protect data and data systems is present in today’s world; security issues same “open” academic environment vs requirement to protect data and data systems paramount to faculty no barriers to flow of information either coming into or going out from the institution

Higher Ed vs Others Administrative Domain: Restricted access to financial data Restricted access to student/administrative data Restricted access to alumni data Restricted access to marketing data -- Academic Domain Access to instructional programs Remote access (students and faculty) -- Commonalities (but may require different security requirements) Internet access Access to state and federal agencies

3rd Step – Assessments (Capabilities) ● Examine current policies ● Determine security requirements for all users based on ●● sensitivity and criticality of data processed/stored, ●● relationship of the IT system to the organization’s mission ●●economic value of system’s data and components ● Examine network infrastructure and operating system(s) ● Security requirements show developers, managers, and auditors what the system should be allowed to do or not do ● Define other security-related policies to fully implement institution’s IT security policy

4th Step – Develop Strategy ● Specify security controls to be implemented and maintained ● Define access between authorized users and the networking environment ● Define duties and authorization levels ● Define chain of command responsibility for execution and authorization levels ●● Ensure personnel given responsibility have the authority to carry out their responsibilities ● Address data ownership, confidentiality, availability, integrity, authentication, & non-repudiation standards ● Define system’s transmission accuracy, integrity, and recoverability requirements to be met ● specify a process for detection and reporting of errors ● Have to approval of institution’s administration

5th Step - Specific Issues All Institutions Should Address ● Physical Security ● Login Name Standards ● Password Standards ● Virus Protection ● Auditing ● Disaster Recovery/Contingency Planning ● Training

Conclusions ● Important as many ideas or requirements from as many different types of users as possible ● Important to win administration’s support for policy process and resulting policy ● Policy documents ●● The system’s basic security requirements ●● The controls in place ●● Planned controls ●● The responsibility of system users ●● Expected user behavior ● Strive for industry “best practices” security ● Resulting policy has to be implemented and enforceable to be effective ● Training ●Document is dynamic