IS4550 Security Policies and Implementation

Slides:



Advertisements
Similar presentations
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Advertisements

Systems Availability and Business Continuity Chapter Four Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Visual 3.1 Unified Command Unit 3: Unified Command.
Emergency Plan GENERAL AWARENESS TRAINING. Aim To provide staff with an overview of the school emergency plan.
Data Classification & Privacy Inventory Workshop
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Emergency Plan SCHOOL EMERGENCY MANAGEMENT TEAM (SEMT) TRAINING.
Information Systems Controls for System Reliability -Information Security-
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Incident Response Updated 03/20/2015
© 2012 IBM Corporation Rational Insight | Back to Basis Series Documents and Record Control Liu Xue Ning.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Unit 6 Personnel Roles and Responsibilities & Safety Program Development and Management Chapter 9 and 10.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Navigating SQL Server Lesson 3. Skills Matrix Graphical User Interface (GUI) Management Tools SQL Server Management Studio SQL Server Configuration Manager.
Audit Planning Process
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Chapter 8 – Administering Security  Security Planning  Risk Analysis  Security Policies  Physical Security.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS.
Community of Practice K Lead Project Team: الالتزامالتحفيز التفكير المؤسسي المرونةالتميزالشراكةالاستقامة.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Tool Support for Testing
IS4680 Security Auditing for Compliance
Computer Security Incidents
Purpose Review and discuss the IT Policy and Procedure for Incident Handling and Response. Topics Incident Management Policy Incident Response Procedure.
WSU IT Risk Assessment Process
Fusion Center ITS security and Privacy Operations Joe Thomas
IS4550 Security Policies and Implementation
Project Management Processes
IS4550 Security Policies and Implementation Unit 7 Risk Management
TechStambha PMP Certification Training
IS4680 Security Auditing for Compliance
ServiceNow Implementation Knowledge Management
Forensics Week 11.
IS4550 Security Policies and Implementation
IS3440 Linux Security Unit 3 User Account Management
IS4680 Security Auditing for Compliance
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
IS4550 Security Policies and Implementation
CIS 333 RANK Education for Service-- cis333rank.com.
IS4550 Security Policies and Implementation Unit 5 User Policies
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
IS4550 Security Policies and Implementation
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Computer Security Incidents
IS-700.A: National Incident Management System, An Introduction
Project Management Processes
Chapter 1: The Database Environment
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
Overview of Individual Student Systems
Manage Business Continuity Introductory Brief
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Process and Procedure Documentation
Security Policies and Implementation Issues
Presentation transcript:

IS4550 Security Policies and Implementation Unit 8 Incident Response Team Policies

Class Agenda 8/4/16 Lesson Covers Chapter 12 Learning Objectives 12/3/2018 Class Agenda 8/4/16 Lesson Covers Chapter 12 Learning Objectives Lesson Presentation and Discussions. Discussion on Assignments. Discussion on Lab Activities. Break Times as per School Regulations. Try to read the text book before class. (c) ITT Educational Services, Inc.

Learning Objective Describe the different information security systems (ISS) policies associated with incident response teams (IRT).

Key Concepts Incident response policies Team members associated with incident response Emergency services related to IRT Policies specific to incident response support services Policies associated with handling the media and what to disclose

EXPLORE: CONCEPTS

What is an incident? Any event that violate organization security policies. Example: Unauthorized access of computers Sever clashing Data stolen or deleted from a database System compromised internally or externally.

Incident Classification Malicious code attacks Denial of service (DoS) Unauthorized access/theft Network reconnaissance probe

EXPLORE: ROLES

Roles and Responsibilities Users - May have supporting role in IRT as data owner representatives System Administrators - The subject matter experts (SMEs) chosen for each incident response effort will vary depending upon the type of incident and affected system(s)

Roles and Responsibilities (Continued) Information Security Personnel - These team members may also have specialized forensic skills needed to collect and analyze evidence Management - Ultimately, management is held accountable for the outcome of the incident response effort

Roles and Responsibilities (Continued) IRT Manager - This individual makes all the final calls on how to respond to an incident, they are the interface with management IRT Coordinator - They act as the official scribe of the team. All activity flows through this person who maintains the official records of the team

EXPLORE: CONTEXT

Incident Response Support Services This is a broad category to mean any team that supports the organization’s information technology (IT) and business processes The helpdesk for example would be a support services team During an incident, the helpdesk may be in direct contact with the customer who is impacted by the attack

Incident Response Support Services (Continued) The helpdesk, at that point, becomes a channel of information on the incident It’s vital that the helpdesk during an incident is providing a script of key talking points about the incident

Best Practices in Incident Response The effectiveness of the IRT and its related policies needs to be measured The measurement should be published annually with a comparison to prior years

Best Practices in Incident Response (Continued) The measurements should include the goals in the IRT charter, plus additional analytics to indicate the reduction of risk to the organization, such as: Number of incidents Number of repeat incidents Time to contain per incident Financial impact to the organization

Summary In this presentation, the following were covered: Incident classifications Roles and responsibilities associated with incident response team policies Incident support services Best practices to create an incident response team policies

Unit 7 Assignment Discussion 8.1 Support Services Assignment 8.3 Create an Incident Response Policy

Unit 8 Lab Activities Lab is in the lab manual on line Lab 8.2 Craft a Security or Computer Incident Response Policy – CIRT Response Team Reading assignment: Read chapter 12