Lecture 2: Planning for Security INFORMATION SECURITY MANAGEMENT

Slides:



Advertisements
Similar presentations
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Advertisements

Information Security Policy
Information Security Policy
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Planning and Strategic Management
Management of Information Security Chapter 2: Planning for Security
TEL2813/IS2820 Security Management
Planning Ch. 5 Management A Practical Introduction
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Introduction to Information Security
Database Administration
Fundamentals of Information Systems, Second Edition
MANAGEMENT of INFORMATION SECURITY Second Edition.
Planning for Contingencies
Computer Security: Principles and Practice
Lecture 8: Risk Management Controlling Risk
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
TEL2813/IS2820 Security Management
Risk Management Vs Risk avoidance William Gillette.
Planning and Strategic Management
Planning and Strategic Management
Kinicki/Williams, Management: A Practical Introduction 3e ©2008, McGraw-Hill/Irwin Management A Practical Introduction Third Edition Angelo Kinicki & Brian.
Leaders Facilitate the Planning Process
SEC835 Database and Web application security Information Security Architecture.
Chapter 15 Database Administration and Security
Strategic Planning Process for Affiliates [Insert Chapter or State Council Name Here] © SHRM 2009 Planning Today for Tomorrow’s Challenges Presented by.
1 Introduction to Information Security. 2 Historical aspects of InfoSec Critical characteristics of information CNSS security model Systems development.
Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Planning and Strategic Management Chapter 04.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Management of Information Security, 4th Edition
NIST Special Publication Revision 1
The Challenge of IT-Business Alignment
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
McGraw-Hill© 2004 The McGraw-Hill Companies, Inc. All rights reserved.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 2 P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
17/9/2009 Nakato Ruth Chapter one Introduction and review of strategic management.
IT 499 Bachelor Capstone Week 4. Adgenda Administrative Review UNIT Four UNIT Five Project UNIT Six Preview Project Status Summary.
Security Management. Course objective The course is aimed at imparting knowledge and skill sets required to assume the overall responsibilities of administration.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Strategic Planning Workshop  Presented by: Jason P Aubee.
1 EMS Fundamentals An Introduction to the EMS Process Roadmap AASHTO EMS Workshop.
SecSDLC Chapter 2.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
Planning for Security planning.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
MANAGEMENT of INFORMATION SECURITY Second Edition.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 1 I NTRODUCTION TO THE M ANAGEMENT OF I NFORMATION S ECURITY If this is the information superhighway,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part II.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Security Policy
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Leaders Facilitate the Planning Process
MANAGEMENT of INFORMATION SECURITY Second Edition.
Chapter 16 Database Administration and Security
Managing the Planning Process
Managing the Planning Process
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Lecture 2: Planning for Security INFORMATION SECURITY MANAGEMENT You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

Outline and Review Introduction to Information Security CIA Triangle and Extensions Principles of Information Security Management Planning for Information Security

Principles of Information Security Mgmt Include the following characteristics that will be the focus of the current course (six P’s): Planning Policy Programs Protection People Project Management Chapters 2 & 3 http://csrc.nist.gov/publications/PubsTC.html

Information Security Planning Figure 2-1 Information Security and Planning Source: Course Technology/Cengage Learning

The Role of Planning Successful organizations utilize planning Planning involves Employees Management Stockholders Other outside stakeholders The physical and technological environment The political and legal environment The competitive environment

The Role of Planning (cont’d.) Strategic planning includes: Vision statement Mission statement Strategy Coordinated plans for sub units

Precursors to Planning Values Statement Establishes organizational principles Vision Statement What the organization wants to become Mission Statement what the organization does and for whom The values, vision, and mission statements together provide the foundation for planning

Strategic Planning Strategy is the basis for long-term direction Strategic planning guides organizational efforts

Planning Levels Strategic goals are translated into tasks Objectives should be SMART Strategic planning then begins a transformation from general to specific objectives

Planning Levels (cont’d.) Strategic Planning Tactical Planning Operational Planning

Planning and the CISO Elements of a strategic plan Executive summary Mission statement and vision statement Organizational profile and history Strategic issues and core values Program goals and objectives Management/operations goals and objectives Appendices (optional)

Information Security Governance Governance of information security is a strategic planning responsibility Importance has grown in recent years Information security objectives must be addressed at the highest levels of an organization's management team To be effective and offer a sustainable approach

Desired Outcomes Strategic alignment Risk management Resource management Performance measurement Value delivery

Implementing Information Security Governance Figure 2-6 General Governance Framework Source: IDEAL is a service mark of Carnegie Mellon University

Implementing Information Security Governance (cont’d.) Figure 2-7 The IDEAL model governance framework Source: IDEAL is a service mark of Carnegie Mellon University

GRC Article 1: Forrestor’s Framework Lines of Defense Stakeholder Contributions and Expectations

Planning for Information Security Implementation Source: Information Security Governance: A Call to Action

Planning For Information Security Implementation ( Implementation can begin After plan has been translated into IT and information security objectives and tactical and operational plans Methods of implementation Bottom-up Top-down

Planning For Information Security Implementation (cont’d.) Source: Course Technology/Cengage learning

Article 3: Boards must act Do boards really understand the IT security risks for their organizations? Information Governance Policy Right Policy and Framework

System Development Life Cycle A methodology for the design/implementation of an information system SecSDLC methodology is similar to SDLC

Security Systems Development Life Cycle Identification of specific threats and the risks they represent Design and implementation of specific controls to counter those threats and manage risks posed to the organization

SecSDLC: Investigation Phase begins with directive from management specifying the process, outcomes, and goals of the project and its budget Feasibility analysis Determines whether the organization has the resources and commitment to conduct a successful security analysis and design

SecSDLC: Analysis Prepare analysis of existing security policies and programs, along with known threats and current controls Analyze relevant legal issues that could affect the design of the security solution

Table 2-1 Threats to Information Security SecSDLC: Analysis Prepare analysis of existing security policies and programs, along with known threats and current controls Analyze relevant legal issues that could affect the design of the security solution Table 2-1 Threats to Information Security

Ex. Java Vulnerability Patch ….and a week later SecSDLC Analysis: Threats to Information Security Exploit Vulnerability Attack Ex. Java Vulnerability Patch ….and a week later

SecSDLC Analysis: Common Attacks Malicious code Hoaxes Back doors Password crack Brute force Dictionary Denial-of-service (DoS) and distributed denial-of-service (DDoS) Spoofing Man-in-the-middle Spam Mail bombing Sniffer Social engineering Buffer overflow Timing

SecSDLC Analysis: Risk Management Prioritize the risk posed by each category of threat Identify and assess the value of your information assets Assign a comparative risk rating or score to each specific information asset

SecSDLC: Design Design in the SecSDLC Create and develop a blueprint for security Examine and implement key policies Evaluate the technology needed to support the security blueprint Generate alternative solutions Agree upon a final design Security models may be used to guide the design process

SecSDLC: Design A critical design element of the information security program is the information security policy Management must define the types of security policy Integral part of design: SETA program Consists of: Security education, security training, and security awareness Purpose: enhance security

SecSDLC: Design Design controls and safeguards Used to protect information from attacks by threats Design controls and safeguards (Categories): Managerial controls Operational controls Technical controls

SecSDLC: Design

SecSDLC: Design Contingency planning (Chapter 3) Prepare, react and recover from circumstances that threaten the organization Types of contingency planning Incident response planning (IRP) Disaster recovery planning (DRP) Business continuity planning (BCP)

SecSDLC: Design Physical security Physical resources include Design, implementation, and maintenance of countermeasures that protect the physical resources of an organization Physical resources include People Hardware Supporting information system elements

SecSDLC: Implementation Security solutions are acquired, tested, implemented, and tested again Personnel issues are evaluated and specific training and education programs conducted

SecSDLC: Maintenance Once program is implemented, it must be: Operated Properly managed Timely (i.e. up to date using established procedures) If the program is not adjusting adequately to the changes in the internal or external environment, it may be necessary to begin the cycle again

Figure 2-11 Maintenance model SecSDLC: Maintenance Aspects of a maintenance model External monitoring Internal monitoring Planning and risk assessment Vulnerability assessment and remediation Readiness and review Vulnerability assessment Figure 2-11 Maintenance model

SecSDLC: Maintenance Security program management (Chapter 6) A formal management standard can provide some insight into the processes and procedures needed Examples include the BS7799 / ISO17799 / ISO27xxx model or the NIST models described earlier

Article 2: Dealing with GRC GRC in an increasingly complex, information-centric world Challenges Suggestions Building a GRC Platform

Summary Information security governance Planning for information security implementation Introduction to the security systems development life cycle