CSE 4482: Computer Security Management: Assessment and Forensics

Slides:



Advertisements
Similar presentations
St. Louis Public Schools Human Resources Support for District Improvement Initiatives (Note: The bullets beneath each initiative indicate actions taken.
Advertisements

Work-based learning Click on the speaker on each slide to learn more!
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Introduction When implementing information security, there are many human resource issues that must be addressed Positioning and naming of the security.
MANAGEMENT of INFORMATION SECURITY Second Edition.
1 ITC358 ICT Management and Information Security Chapter 11 P ERSONNEL AND S ECURITY I’ll take fifty percent efficiency to get one hundred percent loyalty.
Security and Personnel
Termination Decisions and Meetings Training for Supervisors
INFORMATION SECURITY MANAGEMENT L ECTURE 10: P ERSONNEL & S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Security Controls – What Works
Information Security Policies and Standards
ISOTURE: A Model for Volunteer Management
Principles of Information Security, 3rd Edition2 Introduction  When implementing information security, there are many human resource issues that must.
General Security Principles and Practices Chapter 3.
SECURITY CONSIDERATIONS FOR COMPUTER PERSONNEL Tom Richards, Steve Guynes and Wayne Spence April 12, 2010.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Information Systems Security Officer
Stephen S. Yau 1CSE Fall 2006 Personnel Security.
Security and Personnel
© 2010 Cengage Learning. Atomic Dog is a trademark used herein under license. All rights reserved. Chapter 4 Analyzing Jobs.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Interviewing – Guidance on Appropriate Questions Reviewed April 2013.
Session 3 – Information Security Policies
Careers in IT Farrokh Alemi, Ph.D.. Course on Project Management Credit.
Standards and Guidelines for Quality Assurance in the European
Principles of Information Security, 2nd Edition2 Learning Objectives Upon completion of this material, you should be able to:  Understand where and how.
Computer Security: Principles and Practice
United States Fire Administration Chief Officer Training Curriculum Human Resource Development Module 6: Managing the Workforce.
Management of Information Security, 4th Edition
Principles of Information Security, Fourth Edition
Internal Auditing and Outsourcing
18/21/20151 Instructor: Suprakash Datta (datta[at]cse.yorku.ca) ext Lectures: Tues (CB 122), 7–10 PM Office hours: Wed 3-5 pm (CSEB 3043), or by.
1 Chapter 6 Employee testing and selection. Selecting Employees  Selection: └ The process of choosing from among available applicants the individuals.
Personnel and Security. Objectives Upon completion of this chapter, you should be able to: –Identify the skills and requirements for information security.
Principles of Information Security, Fifth Edition
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
HIPAA PRIVACY AND SECURITY AWARENESS.
How to attract and retain the best people in the Civil Service Albania perspective Fatmir Demneri Director Training Institute of Public Administration.
Principle of Management
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 11 P ERSONNEL AND S ECURITY I’ll take fifty percent efficiency to get one hundred percent loyalty.
CHAPTER 1 Managing Human Resources
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Human Factors.
Introduction to Security
Information Systems Security Operational Control for Information Security.
Slide 1  ‘I will take fifty percent efficiency to get hundred percent loyalty” Samuel Goldwyn.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
McGraw-Hill ©2009 The McGraw-Hill Companies, Inc. All rights reserved. Insert cover image so horizontal lines in cover design line up with gold horizontal.
Placing Information Security within an Organization
Recruitment, Selection and Induction
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
MANAGEMENT of INFORMATION SECURITY Second Edition.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 11 P ERSONNEL AND S ECURITY I’ll take fifty percent efficiency to get one hundred percent loyalty.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Managing Information Security Personnel By Christopher Boehm.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
MANAGING HUMAN RESOURCES
Clinical Engineering Lecture (3).
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Presentation transcript:

CSE 4482: Computer Security Management: Assessment and Forensics Instructor: Suprakash Datta (datta[at]cse.yorku.ca) ext 77875 Lectures: Tues (CB 122), 7–10 PM Office hours: Wed 3-5 pm (CSEB 3043), or by appointment. Textbooks: 1. "Management of Information Security", M. E. Whitman, H. J. Mattord, Nelson Education / CENGAGE Learning, 2011, 3rd Edition 2. "Guide to Computer Forensics and Investigations", B. Nelson, A. Phillips, F. Enfinger, C. Steuart, Nelson Education / CENGAGE Learning, 2010, 4th Edition. 4/15/2017 1

Ch 11: Personnel Security Upon completion of this chapter, you should be able to: Identify the skills and requirements for information security positions List the various information security professional certifications, and identify which skills are encompassed by each Discuss and implement information security constraints on the general hiring processes Explain the role of information security in employee terminations Describe the security practices used to control employee behavior and prevent misuse of information Management of Information Security, 3rd ed. 2

Maintaining a secure environment Introduction Maintaining a secure environment Requires that the InfoSec department be carefully structured and staffed with appropriately credentialed personnel Proper procedures must be integrated into all human resources activities Including hiring, training, promotion, and termination practices Management of Information Security, 3rd ed. 3

Staffing the Security Function Selecting an effective mix of information security personnel Requires consideration of several criteria Some are within the control of the organization Others are not Supply and demand for personnel with critical information security skills When demand rises quickly, initial supply often fails to meet it As demand becomes known, professionals enter the job market or refocus their job skills to gain the required skills, experience, and credentials Management of Information Security, 3rd ed. 4

Staffing the Security Function- II To move the InfoSec discipline forward, managers should: Learn more about the requirements and qualifications for information security positions and relevant IT positions Learn more about information security budgetary and personnel needs Grant the information security function (and CISO) an appropriate level of influence and prestige Management of Information Security, 3rd ed. 5

Qualifications and Requirements information security professionals should Understand how organizations are structured and operated Recognize that InfoSec is a management task that cannot be handled with technology alone Work well with people and communicate effectively using both written and verbal communication Acknowledge the role of policy in guiding security efforts Understand the essential role of information security education and training Helps make users part of the solution, rather than part of the problem Management of Information Security, 3rd ed. 6

Qualifications and Requirements- II information security professionals should…contd Perceive the threats facing an organization Understand how these threats can become attacks, and safeguard the organization Understanding how to apply technical controls Demonstrated familiarity with the mainstream information technologies Including DOS, Windows, Linux, and UNIX Understanding of IT and InfoSec terminology and concepts Management of Information Security, 3rd ed. 7

Entering the Information Security Profession Many InfoSec professionals enter the field After careers in law enforcement or the military Or careers in other IT areas, such as networking, programming, database administration, or systems administration Organizations can foster greater professionalism By clearly defining their expectations and establishing explicit position descriptions Management of Information Security, 3rd ed. 8

Entering the Information Security Profession (cont’d.) Figure 11-1 Information security career paths Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 9

Information Security Positions Types of Information security positions Definers provide the policies, guidelines, and standards People who consult, do risk assessment and develop the product and technical architectures Senior people with a broad knowledge, but not a lot of depth Builders are the real techies, who create and install security solutions Those that administer the security tools, the security monitoring function, and the people who continuously improve the processes Where all the day-to-day, hard work is done Management of Information Security, 3rd ed. 10

Information Security Positions (cont’d.) Figure 11-2 Possible information security positions and reporting relationships Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 11

Information Security Positions (cont’d.) Chief Information Security Officer (CISO) Typically considered the top information security officer in the organization Usually not an executive-level position Frequently reports to the CIO Business managers first and technologists second They must be conversant in all areas of information security Including technology, planning, and policy Management of Information Security, 3rd ed. 12

Information Security Positions (cont’d.) Certified Information Systems Security Professional (CISSP) Most common qualification for the CISO A graduate degree in criminal justice, business, technology, or another related field is usually required for the CISO CISO candidates should have experience in security management, planning, policy, and budgets Management of Information Security, 3rd ed. 13

Information Security Positions (cont’d.) Security Manager It is not uncommon for a security manager to have a CISSP Should have experience in traditional business activities, including budgeting, project management, personnel management, hiring and firing Must be able to draft middle- and lower-level policies, as well as standards and guidelines Several types exist, and the people tend to be much more specialized than CISOs Management of Information Security, 3rd ed. 14

Information Security Positions (cont’d.) Security technicians Technically qualified individuals who configure firewalls and IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that security technology is properly implemented Typical information security entry-level position, albeit a technical one Management of Information Security, 3rd ed. 15

Information Security Positions (cont’d.) Technical qualifications and position requirements for a security technician vary Organizations typically prefer expert, certified, proficient technicians Job requirements usually includes some level of experience with a particular hardware and software package Experience using the technology is usually required Management of Information Security, 3rd ed. 16

Information Security Professional Credentials Many organizations rely on professional certifications To ascertain the level of proficiency Many certification programs are relatively new Certifying bodies work to educate their constituent communities on the value and qualifications of their certificate recipients Employers struggle to match certifications to position requirements Potential information security workers try to determine which certification programs will help in the job market Management of Information Security, 3rd ed. 17

Employment Policies and Practices Management should integrate solid information security concepts Across all of the organization’s employment policies and practices Including information security responsibilities into every employee’s job description and subsequent performance reviews Can make an entire organization take information security more seriously Management of Information Security, 3rd ed. 18

Hiring From an information security perspective, hiring employees is laden with potential security pitfalls Information security considerations should become part of the hiring process Security checks Conduct a background check before extending an offer Management of Information Security, 3rd ed. 19

Common background checks Identity checks: personal identity validation Education and credential checks: institutions attended, degrees and certifications earned, and certification status Previous employment verification: where candidates worked, why they left, what they did, and for how long Reference checks: validity of references and integrity of reference sources Worker’s compensation history: claims Motor vehicle records: driving records, suspensions, and other items noted in the applicant’s public record Management of Information Security, 3rd ed. 20

Common background checks - II Drug history: drug screening and drug usage, past and present Medical history: current and previous medical conditions, usually associated with physical capability to perform the work in the specified position Credit history: credit problems, financial problems, and bankruptcy Civil court history: involvement as the plaintiff or defendant in civil suits Criminal court history: criminal background, arrests, convictions, and time served

Contracts and Employment Once a candidate has accepted a job offer The employment contract becomes an important security instrument It is important to have these contracts and agreements in place at the time of the hire Management of Information Security, 3rd ed. 22

Security as Part of Performance Evaluation Organizations should incorporate information security components into employee performance evaluations To heighten information security awareness and change workplace behavior, Employees pay close attention to job performance evaluations Including information security tasks in them will motivate employees to take more care when performing these tasks Management of Information Security, 3rd ed. 23

Termination Issues When an employee leaves an organization, the following tasks must be performed: Disable access to the organization’s systems Return all removable media Hard drives must be secured File cabinet and door locks must be changed Keycard access must be revoked Personal effects must be removed Escort the former employee from the premises Management of Information Security, 3rd ed. 24

Termination Issues (cont’d.) Many organizations conduct an exit interview To remind the employee of any contractual obligations Such as nondisclosure agreements To obtain feedback on the employee’s tenure in the organization Methods for handling employee outprocessing: hostile and friendly Management of Information Security, 3rd ed. 25

Hostile departure Security cuts off all logical and keycard access before the employee is terminated The employee reports for work, and is escorted to the supervisor’s office to receive the bad news The individual is then escorted from the workplace and informed that his or her personal property will be forwarded, or is escorted to his/her personal area to collect personal effects (s)he is asked to surrender all keys, keycards, and other organizational identification and access devices, PDAs, pagers, cell phones, and all remaining company property, then escorted from the building Management of Information Security, 3rd ed. 26

The employee can come and go at will Friendly departure The employee may have tendered notice well in advance of the actual departure date Difficult for security to maintain positive control over the employee’s access and information usage Employee accounts are usually allowed to continue, with a new expiration date The employee can come and go at will Usually collects any belongings and leaves without escort, dropping off all organizational property before departing Management of Information Security, 3rd ed. 27

Termination Issues (cont’d.) In either circumstance: Offices and information used by departing employees must be inventoried, their files stored or destroyed, and all property returned to organizational stores Departing employees may have collected and taken home information or assets that could be valuable in their future jobs Scrutinizing system logs may allow an organization to determine whether a breach of policy or a loss of information has occurred Management of Information Security, 3rd ed. 28

Monitoring and controlling employees To minimize their opportunities to misuse information Separation of duties is used to make it difficult for an individual to violate information security and breach the confidentiality, integrity, or availability of information Two-man control requires that two individuals review and approve each other’s work before the task is considered complete Management of Information Security, 3rd ed. 29

Figure 11-5 Personnel security controls Personnel Security Practices (cont’d.) Figure 11-5 Personnel security controls Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 30

Monitoring and controlling employees II Job rotation is another control used to prevent personnel from misusing information assets Requires that every employee be able to perform the work of at least one other employee Task rotation Multiple people can perform critical tasks Job rotation and task rotation ensure each employee’s actions can be knowledgeably reviewed by another employee Mandatory employee vacation: lets the organization perform a detailed reviews Management of Information Security, 3rd ed. 31

Limiting access to information Minimizes opportunities for employee misuse Employees should be able to access only the information they need, and only for the period required to perform their tasks This idea is referred to as the principle of least privilege Ensures that no unnecessary access to data occurs If all employees can access all the organization’s data all the time, it is almost certain that abuses will occur Management of Information Security, 3rd ed. 32

Security of Personnel and Personal Data Organizations are required by law to protect sensitive or personal employee information Examples: employee addresses, phone numbers, SIN, medical conditions, names/addresses of family members Responsibility extends to customers, patients, and anyone with whom the organization has business relationships Management of Information Security, 3rd ed. 33

Security of Personnel and Personal Data (cont’d.) Personnel data is no different than other data that information security is expected to protect But more regulations cover its protection Information security procedures should ensure that this data receives at least the same level of protection as the other important data in the organization Management of Information Security, 3rd ed. 34

Security Considerations for Nonemployees Contract employees Professional contractors may require access to all areas of the organization to do their jobs Service contractors usually need access only to specific facilities Should not be allowed to wander freely In a secure facility, all service contractors are escorted from room to room, and into and out of the facility Management of Information Security, 3rd ed. 35

Security Considerations for Nonemployees (cont’d.) Consultants Have their own security requirements and contractual obligations Should be handled like contract employees Special requirements, such as information or facility access requirements, should be integrated into the contract before facility access is granted Protecting your information may not be their number one priority Apply the principle of least privilege Management of Information Security, 3rd ed. 36

Security Considerations for Nonemployees (cont’d.) Business partners Strategic alliances with other organizations to exchange information, integrate systems, or enjoy some other mutual advantage A prior agreement must specify the levels of exposure that both organizations are willing to tolerate Security and technology consultants must be prescreened, escorted, and subjected to nondisclosure agreements Management of Information Security, 3rd ed. 37

Staffing the security function Summary Introduction Staffing the security function Information security professional credentials Employment policies and practices Management of Information Security, 3rd ed. 38