Chapter 8 – Administering Security

Slides:



Advertisements
Similar presentations
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Advertisements

Chapter 8 – Administering Security
MSIA Introduction to Information Systems Security Training and Policy Week 1 Live Session Presentation.
Security+ Guide to Network Security Fundamentals
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Introducing Computer and Network Security
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Information Systems Security Officer
23 January 2003© All rights Reserved, 2002 Understanding Facilitated Risk Analysis Process (FRAP) and Security Policies for Organizations Infocomm Security.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Computer Security: Principles and Practice
The Information Systems Audit Process
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Session 3 – Information Security Policies
Week 11 - Wednesday.  What did we talk about last time?  Exam 2  Before that:  Network security controls  Firewalls  Intrusion detection systems.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Information Systems Security Computer System Life Cycle Security.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Chapter 8 Administering Security
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Systems Security Operational Control for Information Security.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Note1 (Admi1) Overview of administering security.
Risk Assessment: Key to a successful risk management program Sixteenth National HIPAA Summit Timothy H Rearick, MBA, PMP August 22, 2008.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
National Archives and Records Administration, Preparing for the Unexpected ESSENTIAL ELEMENTS: ANALYSIS.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Chap1: Is there a Security Problem in Computing?.
Organizational Security Policies  Who can access which resources in what manner?  Security policy - high-level management document that informs all.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
CONTROLLING INFORMATION SYSTEMS
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
Disaster Recovery 2015 Indiana Statewide Payroll Conference Michael Ievoli-Client Support Specialist IV, Major Accounts September 16, 2015 Copyright ©
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
Chapter 8 – Administering Security  Security Planning  Risk Analysis  Security Policies  Physical Security.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Systems Security
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
ISSeG Integrated Site Security for Grids WP2 - Methodology
Errors, Fraud, Risk Management, and Internal Controls
A Thread Relevant to all Levels of the EA Cube
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
INFORMATION SYSTEMS SECURITY and CONTROL
Cyber security Policy development and implementation
Cybersecurity Threat Assessment
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Chapter 8 – Administering Security Security Planning Risk Analysis Security Policies Physical Security

Security Planning Policy Current state – risk analysis Requirements Recommended controls Accountability Timetable Continuing attention

Security Planning - Policy Who should be allowed access? To what system and organizational resources should access be allowed? What types of access should each user be allowed for each resource?

Security Planning - Policy What are the organization’s goals on security? Where does the responsibility for security lie? What is the organization’s commitment to security?

OCTAVE Methodology http://www.cert.org/octave/ Identify enterprise knowledge. Identify operational area knowledge. Identify staff knowledge. Establish security requirements. Map high-priority information assests to information infrastructure. Perform an infrastructure vulnerability evaluation. Conduct a multidimensional risk analysis. Develop a protection strategy.

Security Planning – Requirements of the TCSEC Security Policy – must be an explicit and well-defined security policy enforced by the system. Every subject must be uniquely and convincingly identified. Every object must be associated with a label that indicates its security level. The system must maintain complete, secure records of actions that affect security. The computing system must contain mechanisms that enforce security. The mechanisms that implement security must be protected against unauthorized change.

Security Planning Team Members Computer hardware group System administrators Systems programmers Application programmers Data entry personnel Physical security personnel Representative users

Security Planning Assuring Commitment to a Security Plan Business Continuity Plans Assess Business Impact Develop Strategy Develop Plan Incident Response Plans Advance Planning Response Team After the Incident is Resolved

Risk Analysis Risk impact - loss associated with an event risk probability – likelihood that the event will occur Risk control – degree to which we can change the outcome Risk exposure – risk impact * risk probability

Risk Analysis – risk reduction Avoid the risk Transfer the risk Assume the risk Risk leverage = [(risk exposure before reduction) – (risk exposure after reduction)] / cost of risk reduction Cannot guarantee systems are risk free Security plans must address action needed should an unexpected risk becomes a problem

Steps of a Risk Analysis Identify assets Determine vulnerabilities Estimate likelihood of exploitation Compute expected annual loss Survey applicable controls and their costs Project annual savings of control

Identify Assets Hardware Software Data People Procedures (policies, training) Documentation Supplies Infrastructure (building, power, water,…)

Determine Vulnerabilities Asset Confidentiality Integrity Availability Hardware Software Data People procedures

Determine Vulnerabilities What are the effects of unintentional errors? What are the effects of willfully malicious insiders? What are the effects of outsiders? What are the effects of natural and physical disasters?

Risk Analysis Estimate Likelihood of Exploitation Classical probability Frequency probability (simulation) Subjective probability (Delphi approach) Computer Expected Lost (look for hidden costs) Legal obligations Side effects Psychological effects

Risk Analysis Survey and Select New Controls Project Savings What Criteria Are Used for Selecting Controls? Vulnerability Assessment and Mitigation (VAM) Methodology How Do Controls Affect What They Control? Which Controls Are Best? Project Savings Do costs outweigh benefits of preventing / mitigating risks

Arguments for Risk Analysis Improve awareness Relate security mission to management objectives Identify assets, vulnerabilities, and controls Improve basis for decisions Justify expenditures for security

Arguments against Risk Analysis False sense of precision and confidence Hard to perform Immutability (filed and forgotten) Lack of accuracy “Today’s complex Internet networks cannot be made watertight…. A system administrator has to get everything right all the time; a hacker only has to find one small hole. A sysadmin has to be lucky all of the time; a hacker only has to get lucky once. It is easier to destroy than to create.” Robert Graham, lead architect of Internet Security Systems

Organizational Security Policies Who can access which resources in what manner? Security policy - high-level management document that informs all users of the goals and constraints on using a system.

Security Policies Purpose Recognize sensitive information assets Clarify security responsibilities Promote awareness for existing employees Guide new employees

Security Policies Audience Users Owners Beneficiaries Balance Among All Parties

Contents Purpose Protected Resources (what - asset list) Nature of the Protection (who and how)

Characteristics of a Good Security Policy Coverage (comprehensive) Durability Realism Usefulness

Physical Security Natural Disasters Power Loss Human Vandals Flood Fire Other Power Loss UPS; surge suppressors (line conditioners) Human Vandals Unauthorized Access and Use Theft

Physical Security Interception of Sensitive Information Dumpster Diving - Shredding Remanence (slack bits) Overwriting Magnetic Data DiskWipe Degaussing Emanation - Tempest

Contingency Planning BACKUP!!!!! OFFSITE BACKUP!!!!! Complete backup Revolving backup Selective backup OFFSITE BACKUP!!!!! Networked Storage (SAN) Cold site (shell) Hot site

A cold site is a facility with power and cooling available, in which a computing system can be installed to begin immediate operation. A hot Site is a computer facility with an installed and ready-to run computing system.