Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
DHS, National Cyber Security Division Overview
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
Information Security Policies and Standards
Lecture 10 Security and Control.
02/12/00 E-Business Architecture
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
(Geneva, Switzerland, September 2014)
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Stephen S. Yau CSE , Fall Security Strategies.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
Introduction to Network Defense
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Joseph Ferracin Director IT Security Solutions Managing Security.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
I MPLEMENTING IT S ECURITY FOR S MALL AND M EDIUM E NTERPRISES Short Presentation by Subhash Uppalapati. - Edgar R. Weippl and Markus Klemen.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Hurdles in implementation of cyber security in India.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Security Matters V.T. Raja, Ph.D., Oregon State University.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Securing Information Systems
Securing Information Systems
Information Security Program
Cybersecurity - What’s Next? June 2017
Securing Information Systems
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University

Discussion Questions Identify some reasons why cyber attacks have been on the rise? What is your opinion about government, academic institutions and industry collaborating to provide cyber security solutions? What do you think should be management’s role in information security?

Imperative Need for Secure Communication Reported Security Incidents up to 1995 Source: CERT.ORG

Reported Security Incidents 1995 – 2003 Source:

What is Management’s role? Management ties everything together Responsibility Ownership Technology Infrastructure Organization Management Security is a Mindset, not a service. It must be a part of all decisions and implementations.

Why cyber attacks have been on the rise? Worldwide diffusion of Internet –Adversaries of unknown origin and intent distributed worldwide Hackers, virus writers Criminal groups, terrorists Disgruntled current or former employees Foreign intelligence services, information warfare by foreign militaries and governments Corporate espionage

Why cyber attacks have been on the rise? Hacking tools readily available on Internet (Scores of hacker publications, bulletin boards and web sites dealing with “hacking tips”). Extensive partnering network –More difficult to define boundaries of IS –Java applets – enhances interaction with customers and suppliers –this technology capability requires programs created by external entities to run on organization’s machines –not possible to determine the full impact of each and every applet prior to running it

Why cyber attacks have been on the rise? Lack of good security policy –Lax attitude towards security account of a dismissed employee not deleted after employee has left organization Protecting content during transmission – but not after transmission –George Mason University »Moved from SSN to SID – ID theft of 30,000 SSN –Bank of America (backup tapes lost) –Intrusion detection logs not maintained –Virus signature files/security patches not updated

Why cyber attacks have been on the rise? Organizational characteristics –Lack of structure –Business environment –Culture –Lack of Standard Operating Procedures –Lack of Education, Training, and Awareness –Lack of understanding/appreciation of technology –Lack of leadership from senior management

Three Cornerstones: Technology Have an understanding/appreciation of technology –Firewalls –IDS/IPS systems –Antivirus/Security Patches –Symmetric and Public Key Cryptography towards confidentiality, authentication, integrity and non- repudiation –Secure servers –VPNs –Evaluation of potential technology acquisitions based on their impact on security

Three Cornerstones: Organization Organizational characteristics – typically under the control of organization –Structure –Business environment –Culture –Policies and Responses –Standard Operating Procedures –Education, Training, and Awareness

Three Cornerstones: Critical Infrastructure Infrastructure that are so vital that their damage or destruction would have a debilitating impact on the physical or economic security of the country –Telecommunications –Banking –Energy

Why should government/academic institutions/industry collaborate? In each other’s interest CI in large part is owned by the private sector, used by both private and public sectors, and protected in large part by public sector. Need to discuss problems and exchange ideas and solutions to cyber attacks/misuse Resource/cost/information sharing Opportunity to play a role in the evolution of “best practices” Help shape legal and government policies in areas of mutual concerns; Appropriate guidance for rapid additional protection measures

CERT Source: / /

What does CERT do?

What is Management’s role? Management ties everything together Responsibility Ownership Technology Infrastructure Organization Management Security is a Mindset, not a service. It must be a part of all decisions and implementations.

Management’s Role in Information Security Total/Perfect security is a myth Critical Asset Identification Initial Risk Assessment Risk Assessment as a continuous process Creating a security team Initiate and actively participate in planning/ design/documentation/testing of security policy Initiate and actively participate in planning/ design/documentation/testing of recovery/response policy

Management’s Role in Information Security Actively involved in establishing standard operating procedures Developing and maintaining an appropriate organizational culture Ensure employees are educated and trained regarding importance of following security policy Have an understanding of what each security tool proposed by IT team can do or cannot do

Management’s Role in Information Security Have a good control environment –Physical controls –Data/Content control –Implementation control (outsourcing) –Operations/Administrative Control –Application Controls specific to individual system components/applications (e.g., Limiting attachments)

Management’s Role in Information Security Recognize that security is a socio- technical issue Recognize that security requires an end- to-end view of business processes Achieve a balanced approach to security – one that does not solely focus on technological solutions Recognize that security rests on three cornerstones