Unit 5: Security LO1: P1, P2 + M1.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Security Controls – What Works
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Introducing Computer and Network Security
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Computer Security: Principles and Practice
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Network security policy: best practices
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Information Systems Security Computer System Life Cycle Security.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
1.1 System Performance Security Module 1 Version 5.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Topic 5: Basic Security.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
CONTROLLING INFORMATION SYSTEMS
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
8 – Protecting Data and Security
Information Systems Security
CS457 Introduction to Information Security Systems
Technology and Business Continuity
Add video notes to lecture
INFORMATION SYSTEMS SECURITY AND CONTROL.
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Chapter 8 – Administering Security
Data and database administration
COMP3357 Managing Cyber Risk
Current ‘Hot Topics’ in Information Security Governance Auditing
Lecture 14: Business Information Systems - ICT Security
A Thread Relevant to all Levels of the EA Cube
Fundamentals of Information Systems
Richard Henson University of Worcester September 2016
Business Risks of Insecure Networks
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Unit 7 – Organisational Systems Security
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
LO2 - Be Able to Design IT Systems to Meet Business Needs
Keeping your data, money & reputation safe
Cyber security Policy development and implementation
Security week 1 Introductions Class website Syllabus review
Unit 5 Assignment 1 Help.
LO3 Review mechanisms to control organisational IT security
WJEC GCSE Computer Science
G061 - Network Security.
Presentation transcript:

Unit 5: Security LO1: P1, P2 + M1

Unit Introduction Security is one of the most important challenges modern organisations face. Security is about protecting organisational assets, including personnel, data, equipment and networks from attack through the use of prevention techniques in the form of vulnerability testing/security policies and detection techniques, exposing breaches in security and implementing effective responses. The aim of this unit is to provide students with knowledge of security, associated risks and how security breaches impact on business continuity. Students will examine security measures involving access authorisation, regulation of use, implementing contingency plans and devising security policies and procedures.

Assessing risks to IT security IT security risks “The wonderful thing about the Internet is that you’re connected to everyone else… The terrible thing about the Internet is that your connected to everyone else…” Dr. Vinton Cerf - co-designer of the TCP/IP protocols and the architecture of the Internet. Access to the information and services the Internet provides, comes risk. Risk of information loss, or corruption, of data theft and worse. These risks have to be mitigated with security solutions.

IT Threats A threat is an event that could exploit a vulnerability (an attack waiting to happen) and cause a negative impact on the network. Threats in the digital world typically mimic threats in the physical world. Theft, vandalism, eavesdropping are all threats that have moved from the real world into cyberspace, typically via the Internet. There are some significant differences however, in terms of the distance these attacks can be carried out, the automation involved, and the propagation(Spreading) of attack techniques.

IT security risks Risks: unauthorised use of a system unauthorised removal or copying of data or code from a system damage to or destruction of physical system assets and environment damage to or destruction of data or code inside or outside the system naturally occurring risks.

Unauthorised use of a system Software should be used only by those authorised to do so. Someone – a hacker – may access confidential data. The hacker may read the data or copy it, but do no damage to it. However, simply reading data can also cause damage to an organisation, even if that data is not deleted or altered. Obtaining personal details of an individual can lead to identity theft. If you become the victim of identity theft, you might have difficulty obtaining credit for a credit card, loan or mortgage until the confusion is resolved.

Unauthorised removal or copying of data or code from a system Someone may pass data on to another person who is not authorised to read it; this is called data theft. Data related to new products or business plans of an organisation is sensitive. If this data fell into the wrong hands, e.g. a competitor, the organisation would lose any competitive edge that secrecy would have given them. The worst-case scenario is for the data to be removed altogether. Imagine the chaos if all the personnel records of an organisation – the contact details of all employees, their pay records and details of promotions, pensions, etc. – were removed.

Damage to or destruction of physical system assets and environment Someone may damage the hardware in the ICT system. A hard disk holds a lot of data. If the disk was sabotaged, the data would become inaccessible. The hardware in an ICT system can be worth many hundreds of thousands of pounds. If any of it is damaged or stolen then it will take time to replace it. The cost of replacement is usually covered by insurance, so the main problem is the time delay in installing replacement equipment. This delay can result in lost business and, as a consequence, the organisation may lose money. Consequential loss may not be covered by insurance, so this is a ‘real’ loss. Damage to data or code Data or software should only be altered or deleted by someone who is authorised to do so. A hacker may damage – i.e. amend or delete – the data or software.

Damage to or destruction of data or code inside or outside the system Data or software should only be altered or deleted by someone who is authorised to do so. A hacker may damage – i.e. amend or delete – the data or software. Data and software may also be damaged by virus attack. More on this later

Naturally occurring risks. Human actions E.g. Human error, employee that disregards policy. Systems issues E.g. Out of date or incorrectly configured/installed anti virus and firewall, confusion over backup policy could result in accidental overwrite, poor group policy configuration, incorrect user access levels.

Organisational security Business continuance(Maintain essential functions during/after an attack) Backup/restoration of data Audits Testing procedures e.g. data, network, systems, operational impact of security breaches, WANs, intranets, wireless access systems.

Organisational security: Business continuance Training should be given so that employees know what to do, for example, if they suspect a virus attack: Who should they contact first? Should they turn their ICT system off? Employees also need to know what to do if they think their login ID is being used by someone else: Who should they inform of their fear? What methods might be used to trap the culprit? What procedures should be followed to prevent similar lapses in security in future. Organisational security: Business continuance While a security audit will identify weaknesses that ought to be addressed, and an organisation should make every effort to remedy any shortfall, there will always be a risk of a security breach. For this reason, an analysis of risks should be carried out and a contingency plan drawn up. This contingency plan should cover backup, offsite storage, data recovery procedures, access to immediate hardware replacement, plus insurance that covers replacement, loss of business and all the recovery work. Ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.

Organisational security: Backup/restoration of data Employees who are responsible for data recovery should also know the procedures to follow. The aim should be to plan ahead so that the whole system can be up and running again within a specified time- scale, e.g. 24 hours. Then, if the worst case scenario happens, disaster recovery should be as smooth as possible. The contingency plan has to be developed from a full risk analysis, so that every eventuality is taken into consideration.

Organisational security: Audits Audits could include: Review and management eg access to systems. Establishment and review of personal, corporate and technical trust. Vetting of staff. Forensic analysis of systems Use of custom forensics or existing sysadmin tools. Organisational security: Audits An organisation that is unaware of how and where security breaches might occur could soon be faced with a situation that will be costly, and could be very embarrassing. Instead, a security audit should be conducted to check what might go wrong, and to plan improvements before a hacker – or some other individual – takes advantage of the situation.

Organisational security: Testing procedures Network security: This involves looking for vulnerabilities in the network infrastructure (resources and policies). System software security: Asses weaknesses in software (operating system, database system, and other software) that are depended on. Client-side application security: Ensure that the client (browser or any such app/tool) cannot be manipulated. Server-side application security: Server code and its technologies are robust enough to fend off any intrusion.

Organisational security: Testing procedures - operational impact Costs If data is lost, costs are incurred in recovering the data. If software is corrupted, a copy should be available, but the replacement will take time and incur staff costs. Depending on how serious a breach was experienced, there may be a need to consult specialists, and this too will incur extra costs Loss of business A security breach can result in the collapse of an ICT system. The time during which normal service is not available is called downtime. Organisations that rely on an ICT system to take orders will suffer a loss of business during the downtime. Some customers will come back later, but some will not; they will already have taken their business elsewhere. If a security breach causes data loss, and it proves difficult to recover that data, then the result can be disastrous for an organisation.

Proposing a method to assess and treat IT security risks. (M1) Establish a risk management framework Outline how you would identify risks, who’s responsible, the impact to the business and how likely it is to occur. Baseline criteria, Scale of risk, Acceptable risk(Risk appetite) Identify risks Create a list of business assets such as files, media, portable devices as well as content such as Intellectual Property. Analyse risks Identify threats and vulnerabilities to each asset Evaluate risks Order security risks from high to low Select risk treatment options Define exactly who is going to implement each control, in which timeframe, with which budget, etc. Research: ISO 27001 risk assessments (ISO = International Organization for Standardization)