IS4550 Security Policies and Implementation Unit 7 Risk Management

Slides:



Advertisements
Similar presentations
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Advertisements

CIP Cyber Security – Security Management Controls
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Chapter 5: Asset Classification
Auditing Computer Systems
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Information Asset Classification
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Security Awareness Norfolk State University Policies.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
David N. Wozei Systems Administrator, IT Auditor.
1 Copyright © 2014 M. E. Kabay. All rights reserved. CSH5 Chapter 67 “Developing Classification Policies for Data” Karthik Raman & Kevin Beets Classification.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Information Systems Security Operational Control for Information Security.
Cyber Security & Fraud – The impact on small businesses.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
ISO/IEC 27001:2013 Annex A.8 Asset management
Chapter 8 Auditing in an E-commerce Environment
Internal Sales Policy and Procedure Updates. Agenda o Policy o Procedures o Roles & Responsibilities o Definitions o Questions & Answers anytime during.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
IS3220 Information Technology Infrastructure Security
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Business Continuity Planning 101
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
Learn Your Information Security Management System
Data Security Policies
Computer Security Fundamentals
Business Continuity Plan Training
Domain 2 – Asset Security
IS4680 Security Auditing for Compliance
Managing the IT Function
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Technology Audit Plan ----BCSY University
IS4550 Security Policies and Implementation
IS4550 Security Policies and Implementation Unit 5 User Policies
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Week Ten – IT Audit Reporting
IS4680 Security Auditing for Compliance
TEL382 Greene Chapter 5.
IS4680 Security Auditing for Compliance
TRINITY UNIVERSITY HOSPITAL
Government Data Practices & Open Meeting Law Overview
Chapter 13 Enterprise Computing
Internal Audit Who? What? When? How? Why? In brief . . .
Security Policies and Implementation Issues
Presentation transcript:

IS4550 Security Policies and Implementation Unit 7 Risk Management

Class Agenda 7/28/16 Lesson Covers Chapter 11 Learning Objectives 6/27/2018 Class Agenda 7/28/16 Lesson Covers Chapter 11 Learning Objectives Lesson Presentation and Discussions. Discussion on Assignments. Discussion on Lab Activities. Break Times as per School Regulations. Try to read the text book before class. (c) ITT Educational Services, Inc.

Learning Objective Describe the different information security systems (ISS) policies associated with risk management.

Key Concepts Business risks related to information systems Risks associated with the selected business model, and describe policies related to business impact analysis (BIA) Policies specific to risk assessment, business impact analysis (BIA), and business continuity planning (BCP) Policies connected with disaster recovery planning (DRP) Differences between public and private examples of risk management policies

Group discussion. What is data classification an why is it important? Different between Risk Management and risk assessment? What is meant by Business Impact Analysis (BIA), Business Continuity Plan (BCP), and Disaster Recovery Plan (DRP)

EXPLORE: CONCEPTS

Military Classification Scheme The U.S. military classification scheme is defined in National Security Information document Executive Order (EO) 12356. Top Secret—Data that the unauthorized disclosure would reasonably expect to cause grave damage to the national security Secret—Data that the unauthorized disclosure would reasonably expect to cause serious damage to the national security Confidential—Data that the unauthorized disclosure would reasonably expect to cause damage to the national security

Military Classification Scheme (Continued) This type of data has two classification levels: Sensitive but unclassified—Confidential data not subject to release under the Freedom of Information Act Unclassified—Data available to the public

Risk Management Policies Risk avoidance is primarily a business decision, however differences between public and private are clear: Public organizations cannot avoid high risk, such as police departments Private organizations can avoid risk with strategic decisions as to where to place their data centers, out of storm paths

Risk Management Policies (Continued) The power to choose what risk to accept is the main difference between public and private organizations

EXPLORE: ROLES

Roles and Responsibilities Risk Manager Manages risk, creates the BIA Auditor Conducts Assurance functions relating to data classification policies, assists in the BIA Data Owners Own the data responsible for data creation, access, use, transmission, classification process, develops data retention, disposal policies

Roles and Responsibilities (Continued) Information Technology (IT) Management Develops BCP, DRP, works with data owners to determine what data needs to be backed-up based on data classification process, storage Security Manager Supports BCP, DRP process allocates full-time employees (FTEs) to be part of teams set up to confer BCP, DRP realities Senior Management Supports policy creation functions, BCP and DRP effort, and allocates funding

EXPLORE: CONTEXT

Data Handling Policies Policies, Standards, and Procedures must be defined regarding data during: Creation—During creation, data must be classified. That could be simply placing the data within a common storage area Access—Access to data is governed by security policies. Special guidance is provided on separation of duties (SoD) Use—Use of data includes protecting and labeling information properly after its access Transmission—Data must be transmitted in accordance with policies and standards

Data Handling Policies (Continued) Storage—Storage devices of data must be approved. This ensures that access to the device is secured and properly controlled Physical Transport—Transport of data must be approved. This ensures that the data leaves the confines of the private network and is protected and tracked Destruction—Destruction of data is sometimes called “disposal.” When an asset reaches its end of life, it must be destroyed in a controlled procedure

EXPLORE: RATIONALE

BIA, BCP, and DRP Policies BIA Policies - The BIA is used to develop business continuity plans to minimize losses BCP Policies - The BCP policies outline the guidance for building a plan such as key assumptions, accountabilities, and frequency of testing

BIA, BCP, and DRP Policies (Continued) DRP Policies - The policies and documentation needed for an organization to recover their IT assets such as software, data, and hardware during a disaster

Summary In this presentation, the following were covered: Data classification based on military scheme Risk management policies for private and public sector Roles and responsibilities associated with risk management policies Data handling policies BIA, DRP, and BCP policies

Unit 7 Assignment Discussion 7.1 Business Impact Analysis (BIA), Business Continuity Plan (BCP), and Disaster Recovery Plan (DRP) Assignment 7.3 Risk Management in a Business Model

Unit 7 Lab Activities Lab is in the lab manual on line Lab 6.2 Identify Necessary Policies for Business Continuity - BIA & Recovery Time Objectives Reading assignment: Read chapter 11