The Business of Security Chapter 4. Building a Business Case A business exists to satisfy business objectives –Security programs are there to support.

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
IT Security Policy Framework
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
1 Continuity Planning for transportation agencies.
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Business Continuity Planning and Disaster Recovery Planning
Systems Analysis and Design 9th Edition
Security Controls – What Works
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Developing a Records & Information Retention & Disposition Program:
General Security Principles and Practices Chapter 3.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Information Systems Security Officer
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Computer Security: Principles and Practice
Disaster Recovery Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Guide to Disaster Recovery
Business Crisis and Continuity Management (BCCM) Class Session
Services Tailored Around You® Business Contingency Planning Overview July 2013.
The Business of Security
Course Overview Course Requirements Knowledge and Skills Student Expectations.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
David N. Wozei Systems Administrator, IT Auditor.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
Departmental Disaster Readiness By John Hardcastle Emergency Services Coordinator Palm Springs Fire Department.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Developing Plans and Procedures
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Systems Analysis and Design 8 th Edition Chapter 2 Analyzing the Business Case.
Disaster Recovery and Business Continuity Planning.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
9 th ACG Cross-Training Seminar Precautionary Measures during Outbreak of SARS (2003) Hong Kong Securities Clearing Company Limited 5 th July 2007 – Kuala.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Information Security IBK3IBV01 College 1 Paul J. Cornelisse / George Pluimakers.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Business Continuity Planning 101
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Peggy M. Jackson, DPA, CPCU Peg Jackson & Associates
IS4680 Security Auditing for Compliance
Paul T. Smith Davis Wright Tremaine LLP
Unit 7 – Organisational Systems Security
CompTIA Security+ Study Guide (SY0-401)
Business Impact Analysis
Continuity of Operations Planning
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Introduction to the PACS Security
Presentation transcript:

The Business of Security Chapter 4

Building a Business Case A business exists to satisfy business objectives –Security programs are there to support this primary goal The first step to building a case is to understand the business objectives Security efforts must be described in relation to organization’s mission Use quantitative and qualitative analysis to justify security measures

Business Continuity Planning A business continuity plan (BCP) describes how a business will continue operations in the face of risk Vulnerability assessment determines which risks merit attention –Risk = Threat X Vulnerability A quadrant map is a good tool for vulnerability assessment

Vulnerability Assessment

Implementing Controls Four techniques used to manage risks identified in vulnerability assessment –Risk avoidance, mitigation, acceptance, transference (from Chapter 1) BCP team must determine exactly how these strategies will be applied to each of the risks identified Not all risks can be handled with technical approaches, some may require education & training or external expertise for example

Maintaining the Plan BCP is a living document Changes in the environment, the business, and in current technologies will induce new risks BCP should be flexible and comprehensive enough to absorb changes However, periodic review and updating of the BCP will be required

Disaster Recovery Planning Disaster recovery planning is used to prepare for continuing an organization’s operations when they are interrupted due to a crisis A Disaster Recovery Plan (DRP) is the document describing the recovery plan Goals of a DRP –Resume operations at an alternate facility as necessary –Provide for extended operation at the alternate facility –Prepare for transition back to the the primary facility when possible

Selecting the Team Who should be on a disaster recovery team? –Important to cover critical departments and missions within the organization –Size of the organization will dictate size of team –In a larger organization, planning and implementation teams can be different –DRP responsibilities are usually secondary to the team members’ primary roles within the organization

Building the Plan The DRP should describe the processes to follow in the event of disaster –Should detail the responsibilities of all individuals involved in the plan –Should detail resources needed, including financial, manpower, hardware, and software Selection of at least one alternate facility is a primary challenge –The greater the required capabilities, the more expensive it will be

Disaster Recover Facilities Hot site –Contains all hardware, software, and data required. Capable of taking over production immediately Warm site –Contains most hardware and software required, does not maintain live copies of data. Capable of taking over production within hours or days. Cold site –Contains basic power, telecommunications, and support systems. Does not maintain hardware, software, and data. Capable of taking over production within weeks or months.

Creative Disaster Recovery Nontraditional arrangements for disaster recovery are possible and may be suitable for a particular organization Geographically dispersed organizations might consider mobile facilities –Trailers, mobile homes, air-transportable units –Don’t keep them all in one place Mutual assistance agreements –Share costs with other organizations –Care must be taken in maintaining confidentiality of data

Training DRP team members need training to prepare for responsibilities under the plan Initial training –Comprehensive training takes place when individuals are placed on the team Refresher training –Periodic training to update and refresh team members’ skills and readiness Length, frequency, and scope of DRP training must be customized to each individual’s responsibilities

Testing Checklist review –Simplest, least labor-intensive form of testing –Each individual has a checklist of responsibilities under the DRP –During testing, each individual reviews his/her checklist –Can be done as a group or individually Tabletop exercise –Test facilitator describe a specific disaster scenario –DRP team members verbally walk through their responses to the scenario –Scenarios can be disseminated at the test or in advance

Testing (continued) Soft test (parallel test) –DRP team members are given a disaster scenario and respond by activating the recovery facility –Recovery facility works in parallel with main facility, does not take responsibility for full operation –A more comprehensive test, also a more expensive test Hard test (full-interruption test) –Used only rarely in mission critical situations, too disruptive and expensive –Involves full transfer of control to alternative facility and back

Implementing the Plan When a plan must be implemented, the situation is going to be chaotic Plan must define actions of first responders, whoever they might be –All employees should know what to do if they witness an event that might signal a need for disaster recovery The authority to declare a disaster situation should be carefully allocated –Possibly to multiple people

Maintaining the Plan The disaster recovery team’s membership, procedures, and tools will change over time The team should rely heavily on checklists to avoid panic and chaos –Checklists must be up-to-date The DRP should be continually tested and evaluated with lessons learned debriefings

Data Classification Provides users with a way to stratify sensitive information Provides a system for applying safeguards appropriate to the level of confidentiality required Prerequisites for access to classified data are –Security clearance –Need to know Government and private industry have similar classification systems

Security Clearances Obtaining a security clearance depends on the level and the organization –It can sometimes involve rigorous background checks, polygraphs, and agreements about disclosure of sensitive information Security clearances can be granted at various levels Usually clearance is tied to essential activities of an individual’s current job

Need to Know Need to know is often required in addition to security clearance in order to access sensitive information Security clearance offers access to broad categories of information, need to know restricts access to the actual information required for a specific task Security clearance is normally enforced by a central security office Need to know is normally enforced by the custodians of the information

Classification Systems Normally government classification systems are more restrictive and bureaucratic than industry systems U.S. Government Classifications –Top Secret, Secret, Confidential, Sensitive but Unclassified (For Official Use Only), and Unclassified Common Industry Classifications –Trade Secret, Company Confidential/Proprietary, Unclassified –Trade secrets are often not protected by patents or copyrights, employees must understand legal obligation to not disclose information

Security Ethics Security professionals often have access to highly confidential information –Must exhibit high degree of ethical standards ISC 2 is a professional organization for security personnel –International Information Systems Security Certification Consortium –Has developed a Code of Ethics for information security professionals –Four very general canons

Monitoring Security professionals are often entrusted with monitoring an organization’s internal and external activity The ethics of handling information gathered during the process of monitoring requires a high degree of discretion and professionalism Who watches the watchers? –Ensure that the monitors themselves handle information appropriately

Computer Security Law A number of laws have an effect on the security industry including –Electronic Communications Privacy Act (ECPA) –USA Patriot Act –Children’s Online Privacy Protection Act (COPPA) –Health Insurance Portability and Accountability Act (HIPAA) –Gramm-Leach-Bliley Act –European Union Directive on Data Privacy

Summary Security professionals must work within the limits of the resources and business objectives of their organization to build a business case for security A Business Continuity Plan (BCP) is a document that deals with keeping a organization functioning in the face of risk Developing a BCP requires vulnerability assessment, control implementation, and plan maintenance

Summary A Disaster Recovery Plan (DRP) deals with keeping a business functioning when some event interrupts the organization’s normal operations A DRP requires –An alternate facility where operations can be moved –A team of trained individuals who can facilitate the move –An up-to-date plan for accomplishing the transition –Ongoing maintenance, training, and testing

Summary In organizations with sensitive information, data classification systems are often used –Individuals require security clearance and need to know to access classified data Security professionals may have access to highly confidential information and must exhibit ethical behavior Information security and privacy is subject to a number of laws and regulations –Security professionals must be aware of responsibilities and obligations under these laws