Security Management in Practice

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Information Technology – Guidelines for the Management of IT Security
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Chapter 10 Accounting Information Systems and Internal Controls
Lecture 1: Overview modified from slides of Lawrie Brown.
Overview and Introduction
Computer Security: Principles and Practice
Computer Security: Principles and Practice
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
Chapter 3-Auditing Computer-based Information Systems.
Networks ∙ Services ∙ People Mark Johnston SIG ISM - Copenhagen Changing GÉANT’s Security Future GÉANT Feb 22, 2016 CNOO – Head of IIS Fotis.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Articulate the major security risks and legal compliance issues for a Fire and Rescue Service. Identify and justify technical controls for securing remote.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Headquarters U.S. Air Force
Information ITIL Technology Infrastructure Library ITIL.
CS457 Introduction to Information Security Systems
An Overview on Risk Management
Internal Control Principles
On-Line Meeting 2 October 25, 2016.
Information Security, Theory and Practice.
Design for Security Pepper.
Lecture 09 Network Security Management through the ISMS
Information Security.
CS 450/650 Fundamentals of Integrated Computer Security
Chapter Three Objectives
Information Security Awareness
INTRODUCTION TO ISO 9001:2015 FOR IMPLEMENTATION Varinder Kumar CISA, ISO27001 LA, ISO 9001 LA, ITIL, CEH, MEPGP IT, Certificate course in PII & Privacy.
Information Security based on International Standard ISO 27001
Welcome to the CSBM workshop: Managing office services
Vision Facilitation Template
Computer and Network Security
Security Protection Goals
Internal control - the IA perspective
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT
Mitigation Principles PROPOSAL OICA/CLEPA
Information Security Risk Management
Sustainability Corporations, Capital Markets and Global Economy.
Cyber security Policy development and implementation
PUBLIC SECTOR FINANCIAL CONTROL OF THE REPUBLIC OF LITHUANIA
Session 5: Securing Home Networks Conclusions & Recommendations
Cybersecurity Threat Assessment
Welcome to the CSBM operational workshop:
Contents Introduction/Contacts Description Of Module (& LOs)
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Performance improvement observations
Good practices for risk assessment and control activities
Prevent training guidance and resources February 2019
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

Security Management in Practice

Contact Dr. Phil Legg Phil.Legg@uwe.ac.uk Room 2Q17 (available for meetings Tuesdays, Wednesdays, Fridays, but please book via e-mail 24 hours ahead).

Module Delivery and Assessment One hour lecture session Two hour workshop session Research-based activities (individual and group) to support course content and further learning. Assessment: Project-based assessment: Report (75%) and Presentation (25%)

Evaluate the significance of security laws and regulations Learning Outcomes Understand the significance of ISO and other standards in the specification of a Information Security Management System Analyse the range of real world security issues that face commercial organisations and Institutes Evaluate the significance of security laws and regulations Propose an ISMS for a real organisation, using recognised methods and to an internationally recognised standard Reflect on the process of specifying an ISMS, justifying methods used and /or proposing alternatives

Module Schedule Blackboard content will be available Attendance for lectures and seminars will be monitored.

Recommended Text Information Security Management Principles. (Second edition), Andy Taylor, David Alexander, Amada Finch, David Sutton. Information Security: The Complete Reference (Second Edition), Mark Rhodes-Ousley.

Introduction to Security Management

Introduction What is Security, and why is it important? How can we effectively manage Security? What is Security Management? What is it that we are trying to secure?

What is Security? Security is not a single aspect Security is a process. Three D’s of security: Defense Detection Deterrence

Why is Security important? Personal and organisational security: Protection of property (tangible security). Hardware systems, assets, products, buildings. Protection of information (intangible security). Knowledge, data, intellectual property.

What is Security Management? Need to allow access only when authorized and necessary. Need to prevent access when unauthorized. How do we ensure that this is actually the case?

Information Technology Governance Guidelines for effective, efficient and acceptable use of information and communication technology within their organisation. Strategic planning for IT in line with the vision and mission of the organisation Oversight and monitoring of all IT-activity. An IT decision-making model.

Information Security Concepts Information Security (IS). Preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved. (ISO 27001) Information Assurance (IA). The confidence that information systems will protect the information they carry and will function as they need to, when they need to, under the control of legitimate users. (UK Cabinet Office)

Information Security Principles Confidentiality. The property that information is not made available or disclosed to unauthorised individuals, entities or processes. Integrity. The property of safeguarding the accuracy and completeness of assets. Availability. The property of being accessible and usable upon demand by an authorised entity. Asset. Anything that has value to the organisation, its business operations and its continuity.

Managing Security = Managing Risk Identify Risk Management Life Cycle Monitor Analyse Treat

PDCA (Plan-Do-Check-Act) Risk Management Life Cycle Act Do Check

Information Security Principles Threat. A potential cause of an incident that may result in harm to a system or organisation. Vulnerability. A weakness of an asset or group of assets that can be exploited by one or more threats. Risk. The potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organisation. Impact. The result of an information security incident, caused by a threat, which affects assets.

Information Security Challenges The effect of the rapidly changing business environment. Balancing cost and impact of security with the reduction in risk. Security as an enabler of progress by reducing the cost of the loss, corruption, non-availability or unauthorised release of information. The role of information security in combating hi-tech (and other) crime.

What are the three D’s of information security? Quiz What are the three D’s of information security? Defense Detection Deterrence

What is the CIA model of information security? Quiz What is the CIA model of information security? Confidentiality Integrity Availability

Recap What is security and how do we manage this? Managing security is about managing risk. IT governance – an organisational decision-making model. Information security models (PDCA) and key concepts