CYSM Business Diagrams Dr. Thanos Karantjias Dr. Spyros Papastergiou 1.

Slides:



Advertisements
Similar presentations
Basic Concepts of a Computer Network
Advertisements

Chapter 7: Physical & Environmental Security
Multi-layer ICT Management Presented by Andy Park.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
IS Network and Telecommunications Risks
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Computer Networks IGCSE ICT Section 4.
What is a Computer Network? Two or more computers which are connected together.
Networking Computers. Advantages & Disadvantages of Networking.
Section 2.1 Compare the Internet and the Web Identify Web browser components Compare Web sites and Web pages Describe types of Web sites Section 2.2 Identify.
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
CN. Computer NEtwork ► A computer network, often simply referred to as a network, is a collection of computers.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Creating a Network Diagram Teacher's Guide. Why use Google Draw It is FREE Ready made templates Children can collaborate with each other on the same diagram.
Component 6 - Health Management Information Systems Unit 2-1a - Hardware and Software Supporting Health Information Systems.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
Health Management Information Systems Unit 2 Hardware and Software Supporting Health Information Systems Component 6/Unit21 Health IT Workforce Curriculum.
NETWORKING & SYSTEM UPDATES
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
Digital Literacy: Computer Basics
Understand how a router works and its purpose
Information Security tools for records managers Frank Rankin.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Chapter 1: Computer Basics Learning Objectives: Understand the purpose and elements of information systems Recognize the different types of computers Distinguish.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
PCs ENVIRONMENT and PERIPHERALS Lecture 4. An expansion cards: - An expansion card (expansion board) is an electronic circuit board that adds more functionality.
CYSM Risk Assessment Methodology Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme.
Networks basics Your name here You’ll use this presentation for 2 lessons, and then print it. Format the presentation in your own choice of colours/font.
ICT Unit 4: Network and the effects of using them
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Service Desk Good Practice Guide – Benchmarking survey results January 11 th 2012.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Draft UniNet-ID Sales Training For ESD Sales People & Estimators.
CYSM RISK ASSESSMENT TOOLKIT PROCEDURES I David Calduch Project Manager Port planning and Development Dept. VALENCIAPORT FOUNDATION.
TECHNOLOGY IN ACTION. Chapter 7 Networking: Connecting Computing Devices.
Identify internal hardware devices (e. g
Identify internal hardware devices (e. g
Dr. Ir. Yeffry Handoko Putra
Information Systems Security
CS457 Introduction to Information Security Systems
CompTIA Security+ Study Guide (SY0-401)
Unit 5 Introduction to Networking
Section 2.1 Section 2.2 Identify hardware
Unit 5 Introduction to Networking
ISSeG Integrated Site Security for Grids WP2 - Methodology
Transfer of data in ICT systems
Chapter 1 Introduction to Computers
Local Area Networks, 3rd Edition David A. Stamper
Wide Area Network.
Networks and Connecting to the Internet
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
Computer Basics Section 2.1 YOU WILL LEARN TO… Identify hardware
CompTIA Security+ Study Guide (SY0-401)
Network Basics Extended Learning Module E
Faiza Iqbal Mobile Networks Faiza Iqbal EC-425 Mobile Networks Lab 1.
Managing Information Systems and Communications Technology
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
ICT II Unit 5 Networking.
County HIPAA Review All Rights Reserved 2002.
How Computers Work.
Networks 1 Key Revision Points.
ICT II Lesson 23 Networking.
Unit 2 Introduction to Networking
EUT 122 Skills and Technology in Communication
Computer Peripheral Devices - Definition, Examples & Types
Digital Literacy 1.00 Computer Basics
Copyright 2005 Prentice- Hall, Inc.
Chapter One Introduction to Computer Networks and Data Communications
Ministry of Education Capacity Development Center
Presentation transcript:

CYSM Business Diagrams Dr. Thanos Karantjias Dr. Spyros Papastergiou 1

Risk Assessment Service Risk Assessment Administration Calendar Management Configure Organizational Structure Configure Risk Assessment Elements 2 Topics

Administrator Organizational Calendar Management Configure Organization Structure Risk Assessment Administration Type of UserS Main Functions Configure Risk Assessment Elements 3 Slides 4, 5 Slide 6 Slide 7

Organizational Calendar Management Calendar Management (Apply Standards) Main Options Add New Risk Assessment View Completed Risk Assessments Apply Standards Invite Involved Departments Define applied Sections (ISO27001) Define Level of appliance (ISPS) Define applied Subsections Slide st Level Activities 2 nd Level Activities Statement of Applicability

Organizational Calendar Management Calendar Management (Invite Involved Departments) Main Options Add New Risk Assessment View Completed Risk Assessments Apply Standards Invite Involved Departments Slide 4 5 Definition Departments / Third Parties (names) Applied Managers (names) Applied Employees (names) 1 st Level Activities 2 nd Level Activities Organizational CHART

Configure Organizational Structure Configure Organizational Structure (Add/Edit/Delete Entities, Configure Entities) Main Options Configure Internal Departments Configure Third Trusted Parties Add / Edit / Delete Entities (Deps & TTPs) Entity Configuration 6 Entity – (Sub)Section Relation Weight of Entity on (Sub)Section Add / Edit / Delete Entity Managers Add / Edit / Delete Entity Employees Weight of Personnel on (Sub)Section 1 st Level Activities 2 nd Level Activities View

Configure Risk Assessment Elements Configure Risk Assessment Elements (Configure List of Assets’ Categories, Threats, Vulnerabilities, Countermeasures) Main Options (Configure Assets)* Configure Vulnerabilities Configure AllView 7 Map Assets to Assets’ Categories Map list of Vulnerabilities to Threats 1 st Level Activities 2 nd Level Activities Configure Threats Configure Countermeasures Configure Assets’ Categories Add / Edit / Delete Map Threats to Standard (Sub)Sections* Map Vulnerabilities to Standard (Sub)Sections* Map Countermeasures to Standard (Sub)Sections* Define a Scale of appliance on Countermeasure Map list of Threats to Assets’ Categories Map list of Countermeasures to Vulnerabilities

Administrator Evaluated Infrastructure Risk Assessment Administration Type of UserS Main Functions 8 Physical Port FacilityICT Port Facility Physical & ICT Port Facility Business Processes & Activities Identification of Assets

Administrator/User Identification of Assets Risk Assessment Administration Type of UserS Main Functions 9 Identification of Human Assets Definition of Physical Infrastructure Identification of Software Identification of Network Assets Identification of Physical Assets Identification of Hardware Assets Identification of Information Slide 14 Slide 13 Slide 12 Slide 11 Slide 10

Identification of Physical Assets Risk Assessment Administration Main elements 10 External environment (etc. Homes of the personnel, premises of another organization) Premises (etc. buildings, terminal) Zones (etc. Offices, secure zone) Telecommunications services and equipment (etc. Telephone line) Services and means (sources and wiring) required for providing power(etc. Low voltage power supply) Correlation of Physical Assets

Identification of Hardware Assets Risk Assessment Administration Main elements 11 Transportable equipment (etc. laptop, tablet PDA) Fixed equipment (etc. server, workstation) Processing peripherals (etc. Printer, removable disc drive) Computer Hardware(etc. case, motherboard, memory, graphic cards) Electronic medium (etc. tape, memory key, CD ROM, floppy disc, back-up cartridge) Correlation of Hardware Assets Correlation with Physical Assets

Identification of Network Assets Risk Assessment Administration Main elements 12 Medium and supports (PSTN, Ethernet, GigabitEthernet, cable, fibre, WiFi , BlueTooth, FireWire) Passive or active relay (etc. Bridge, router, hub, switch, automatic exchange) Communication interface (etc. Wifi, GPRS, Ethernet adaptor) Correlation of Network Assets Correlation with Hardware Assets

Identification of Software Assets Risk Assessment Administration Main elements 13 Operating system Virtual Server (etc. server) Cyber Physical System (etc. process control systems, distributed robotics) Package software or standard software (etc. Data base management software, Webserver software) Standard business application (etc. Accounts software) Correlation of Software Assets Correlation with Hardware Assets

Identification of Information Assets Risk Assessment Administration Main elements 14 Hardcopies Digital Correlation with Hardware Assets Correlation with Software Assets Correlation with Hardware Assets Correlation with Physical Assets

Administrator/User For each asset Risk Assessment Administration Type of UserS Main Functions 15 Identification of existing countermeasures Calculation of the asset value Confidentiality Estimation of likelihood of occurrence of a threat IntegrityAvailability

Risk Assessment Procedure 16 Phase 1: Set the boundaries of RA Phase 2: Asset Identification Phase 3: Threat Analysis Phase 4: Vulnerability Analysis Phase 5: Generate RA results

Risk Assessment Procedure (Phase 1: Set the boundaries of RA) 17 Information Security Officer Define Service(s) to be assessed Define Standard(s) (and areas) to be applied Define Department(s) to be invited Define involved Employees

Risk Assessment Procedure (Phase 2: Asset Identification) 18 All invited users Identify Assets Categorize Assets Set the impact (value) of Assets Define assets’ correlation and dependency

Risk Assessment Procedure (Phase 3: Threat Analysis) 19 All invited users For each identified Asset, identify its threats Based on threat’s appearance sequence, identify threat level Based on Assets’ dependency, threat level will be inherited Configure inheritance and dependencies Transparent System function

Risk Assessment Procedure (Phase 4: Vulnerability Analysis) 20 All invited users For each identified Threat, identify its applied countermeasures Based on countermeasures’ identification, define Vulnerability level Based on Assets’ dependency and threat definition, vulnerability level will be inherited Configure inheritance and dependencies Transparent System function

Risk Assessment Procedure (Phase 5: Generate RA results) 21 Information Security Officer Apply CYSM methodology Generate RA results Export RA Results in various formats Get (and Publish) RA results Transparent System function

Design – CYSM main site 22 Logo Main Menu Home / Digital Library / Collaboration Suite / Help / Contact Home -> Template? Content? Digital Library -> Template? Collaboration Suite -> Template? Help -> Template? Content (e.g. videos)? Contact -> Template?

Design – CYSM port site 23 Logo Main Menu Home / Digital Library / Collaboration Suite / Services / Help / Contact / Administration (Language -> Translation?) Home -> Template? Content? Digital Library -> Template? Collaboration Suite -> Template? Services -> Template? Help -> Template? Content (e.g. videos)? Contact -> Template? Administration -> Template?