University of Minho School of Engineering Algoritmi Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Chapter 10 Accounting Information Systems and Internal Controls
Control and Accounting Information Systems
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
The Islamic University of Gaza
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
OASIS Reference Model for Service Oriented Architecture 1.0
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
University of Minho School of Engineering Computer Science and Technology Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24.
University of Minho School of Engineering Algoritmi Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011 Introduction.
University of Minho School of Engineering Centre Algoritmi Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering ALGORITMI Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011 Introduction.
University of Minho School of Engineering Center Algoritmi Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering R&D Centre ALGORITMI / Department of Information Systems Uma Escola a Reinventar o Futuro – Semana da Escola.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering Algoritmi Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering Computer Science and Technology Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
By: Ashwin Vignesh Madhu
A Framework for Marketing Management
Information Security Incident Management Process
Geneva, Switzerland, 14 November 2014 Data Protection for Public Cloud (International Standard ISO 27018) Stéphane Guilloteau Engineer Expert, Orange Labs.
SOX & ISO Protect your data and be ready to be audited!!!
Information Systems Controls for System Reliability -Information Security-
Fraud Prevention and Risk Management
Information Technology Audit
SEC835 Database and Web application security Information Security Architecture.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Evolving IT Framework Standards (Compliance and IT)
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Ethics, Fraud, and Internal Control Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
COMPETING WITH INFORMATION TECHNOLOGY
Information Systems Security Operational Control for Information Security.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved CHAPTER 5 Organizational Structures that Support Strategic Initiatives.
ITIL Drivers for Government Scott Spencer Vice President, Program Management, GTSI.
Information Security What is Information Security?
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Chap1: Is there a Security Problem in Computing?.
SecSDLC Chapter 2.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
1. Internal control system
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Primary Steps for Achieving ISO Certification.
Chapter 1 Market-Oriented Perspectives Underlie Successful Corporate, Business, and Marketing Strategies.
Principles Identified - UK DfT -
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Approaches to Defining Risk
Integrated Management System and Certification
Unit 1.6 Systems security Lesson 2
Information Security Risk Management
IS4680 Security Auditing for Compliance
Chapter 1 Key Security Terms.
Presentation transcript:

University of Minho School of Engineering Algoritmi Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011 TERESA PEREIRA* Supervisors: Henrique Santos * A CONCEPTUAL FRAMEWORK TO SUPPORT INFORMATION SYSTEM SECURITY MANAGEMENT Problem Statement Context Technology evolution Rapid growth and availability of new services to facilitate accessibility, e.g., cloud computing services Why Increasingly dependency on the IS performance Ensure daily operational activities Promote competition New businesses opportunities IS Security management become a fundamental principle for businesses performance Brings unexpected risks, compromising the organization activity => organizations need a proper information security management Example Business Objective: Reduce cost of sales Business Process: Online ordering for customers Order made by customer online Receip of products confirmed by supplier and entered “manually” in to suppliers ERP system Access provide to third parties that provide delivery services of product Systems that support the business process Online Portal Risk: Hacking online portal Risk: Spoofing website Risk: Man in the middle attacks Risk: Data entry error Risk: Theft of data Risk: Loss of power Risk: Misuse of system by third party Risk: Malware infection from Risk: Unauthorised deletion of orders ERP System Sales and marketing function has an objective to reduce cost of sales. A key business process to help achieve this to provide an online ordering capability. The online ordering process is dependent on systems to collect orders, confirm customers transaction and to engage a local third party to deliver the product. This business process is exposed to a wide range of risk types. Source: Reporting information risk. ISF, 2010 A proper ISM must allow organizations to: Protect its valued/critical asset; Identify their vulnerabilities; Identify the threats and attacks; Evaluate/examine security procedures in use; Mitigate the risk. Research question : A conceptual model based on hierarchical concepts structured in an ontology can improve Information System Security Management ? Research Plan Research the main ISM models (COBIT, ITIL, OCTAVE and derived) Development of an ontology Security concepts are defined accordingly the established security standards ISO/IEC_JTC1. Development of a framework based on a conceptual model defined within information security domain. Evaluate the improvements of the ISM process based on a formal model Survey with expertise's in the area Ontology Conceptual Model Incident - A single or series of unwanted or unexpected events that might have significant probability to compromise the information system security. (Security) Event - An identified occurrence of a particular set of circumstances that changed the status of the information system security. Asset- Any resource that has value and importance to the owner of the organization. Figure 1: Concepts and relationships defined in the conceptual framework CIA - The information properties to be ensured. Vulnerability - Represents any weakness of the system. Attack - A sequence of actions executed by some agent (automatic or manual) that explore any vulnerability and produce one or more security events. Threat - Represents the types of dangers against a given set of properties (security properties). The attributes defined in this concept follow the Pfleeger approach [2]. Control - A mechanisms used to detect an incident or an event, to protect an asset and their security properties, to reduce a threat and to detect or prevent the effects of an attack. Figure 2: Print screen of the developed framework Conclusions Non existence of high level conceptual model for ISM prevents the adoption of Information Security practices. The ontology based approach firm up and unify the concepts and terminology in the security information domain, based on the ISO/IEC_JCT1 standards; Formal model based on a Information Security standard promote a more efficient ISM implementation. Ontology formalization in OWL will promote interoperability among different knowledge representation systems; References 1.ISO/IEC_JTC1 (2005). ISO/IEC FDIS Information technology — Security techniques — Information security management systems — Requirements. Geneva, Switzerland, ISO copyright office. 2.Pfleeger, Charles, P., Pfleeger, Shari, L. (2007) Security in Computing, 4th ed., Prentice Hall PTR.