Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
The International Security Standard
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
ITEC 6324 Health Insurance Portability and Accountability (HIPAA) Act of 1996 Instructor: Dr. E. Crowley Name: Victor Wong Date: 2 Sept
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Security Controls – What Works
Information Security Policies and Standards
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Computer Security: Principles and Practice
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Session 3 – Information Security Policies
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
HIPAA PRIVACY AND SECURITY AWARENESS.
HIPAA COMPLIANCE WITH DELL
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
1 User Policy (slides from Michael Ee and Julia Gideon)
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Archival Workshop on Ingest, Identification, and Certification Standards Certification (Best Practices) Checklist Does the archive have a written plan.
Working with HIT Systems
NIST / URAC / WEDi Health Care Security Workgroup Presented by: Andrew Melczer, Ph.D. Illinois State Medical Society.
DGS Recommendations to the Governor’s Task Force on Contracting & Procurement Review Report Overview August 12, 2002.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIPAA Security Final Rule Overview
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Security and Ethics Safeguards and Codes of Conduct.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Introduction to the Federal Defense Acquisition Regulation
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
HIPAA Security Standards Final Rule
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Introduction to the PACS Security
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management

Copyright © Center for Systems Security and Information Assurance Lesson Objectives Define security management Explain in basic terms the function of an organization’s security policy List the reasons an organization would implement a security policy Define security standards and explain the different types of standards Explain the role of standards organizations. Match the standards organization with its role in the Information Security field

Copyright © Center for Systems Security and Information Assurance Introduction Security management entails the identification of an organization’s information assets and the development, documentation, and implementation of policies, standards, procedures and guidelines that ensure confidentiality, integrity, and availability.

Copyright © Center for Systems Security and Information Assurance Organization Policies A policy may be defined as 'An agreed approach in theoretical form, which has been agreed to and/or ratified by, a governing body, and which defines direction and degrees of freedom for action.'

Copyright © Center for Systems Security and Information Assurance What is a Security Policy? Informs users and staff members of the need and the responsibility to protect the organization’s technology and critical information. Defines “acceptable use” (based upon the acceptable risk) of all electronic media within an organization.

Copyright © Center for Systems Security and Information Assurance Security Policies Rules and practices an organization uses for its information resources:  management  protection  allocation Policies and procedures provide a baseline to:  security plans  contingency plans  procurement plans

Copyright © Center for Systems Security and Information Assurance Why a Security Policy? 1.Describes in detail acceptable network activity and penalties for misuse 2.Provides a forum for identifying and clarifying security goals, priorities and objectives to the organization and its members. 3.Illustrates to each employee how they are responsible for helping to maintain a secure environment. 4.Defines responsibilities and the scope of information security in an organization. 5.Provides a legal instrument in the case of litigation

Copyright © Center for Systems Security and Information Assurance Why a Security Policy? 6.Provides a good foundation for conducting security audits 7.Establishes a critical asset identifying potential vulnerabilities 8.Provides a reference for incident response handling 9.Communicates organization culture, core values, and ethics 10.Establishes acceptance and conformity

Copyright © Center for Systems Security and Information Assurance Management Support Without management supporting security policies, they might as well be non-existent Security policies and security in general start off at the bottom of the typical executive’s priority list A serious security incident or an exceptional sales pitch by the information security professionals help to gain the support of management

Copyright © Center for Systems Security and Information Assurance Types of Security Policies Acceptable Encryption Policy Acceptable Use Policy Analog/ISDN Line Policy Anti-Virus Policy Application Service Provider Policy Application Service Provider Standards Acquisition Assessment Policy

Copyright © Center for Systems Security and Information Assurance Types of Security Policies Audit Vulnerability Scanning Policy Automatically Forwarded Policy Database Credentials Coding Policy Dial-in Access Policy DMZ Lab Security Policy Policy

Copyright © Center for Systems Security and Information Assurance Helpful Security Policy Links !!!!Read the following documents!!! Policy_Primer.pdf templates.htm

Copyright © Center for Systems Security and Information Assurance Security Standards Specify uniform use of specific technologies, parameters, or procedures. Specify a uniform use of specific technologies, parameters or processes to be used to secure systems. Contain mandatory statements which can be measured.

Copyright © Center for Systems Security and Information Assurance Security Standards Example The Privacy HIPAA Standards requires that "a covered entity must have in place appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information" (CMS, "HIPAA Administrative Simplification - Privacy", Section (c)(1)

Copyright © Center for Systems Security and Information Assurance Types of Security Standards Open versus Proprietary Dejure (by law) versus Defacto

Copyright © Center for Systems Security and Information Assurance Security Standards Evolve

Copyright © Center for Systems Security and Information Assurance Security Standards Organizations Government statues (federal, state and local) Standards organizations (NIST, ISO, IEEE) Industry requirements (HIPAA, GLB, TIA/EIA) Manufacture requirements (Cisco, Microsoft) Internal requirements

Copyright © Center for Systems Security and Information Assurance ISO Description Most widely recognized security standard—the first version was published in December 2000 Comprehensive in its coverage of security issues Contains a substantial number of control requirements Compliance and certification for even for the most security conscious of organizations can be daunting

Copyright © Center for Systems Security and Information Assurance Government Cryptography Standards

Copyright © Center for Systems Security and Information Assurance Example Government Standards: Incident Reporting Computer Security Incident Handling Guide NIST Special Publication , from National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce. A 148-page report describing guidelines for responding to denial-of-service attacks; malicious code, including viruses, worms and Trojan horses; unauthorized access; inappropriate use by authorized users, and incidents incorporating various types of security breaches.

Copyright © Center for Systems Security and Information Assurance Security Guidelines Address intentions and allow for interpretation Recommendations or best practices Similar to STANDARDS (not mandated actions) Assist users, administrators and others in effectively interpreting and implementing the security policy Data Security and Classification Guidelines

Copyright © Center for Systems Security and Information Assurance Security Procedures The operational processes required to implement institutional security policy Operating practices can be formal or informal, specific to a department or applicable across the entire institution Detailed steps or instructions to be followed by users, system administrators, and others to accomplish a particular security-related task Assist in complying with security policy, standards and guidelines

Copyright © Center for Systems Security and Information Assurance More Examples Policy - All State of Illinois employee mailboxes must be protected by a username/password Standard - The username must follow existing standards and the password must be 8 characters long and have an alpha/numeric combination Procedure – Setting the administrative properties of the mailbox to require a username and password be set. Auditing the passwords for appropriate password complexity

Copyright © Center for Systems Security and Information Assurance Plan, DO, Check, Act

Copyright © Center for Systems Security and Information Assurance Hyperlinks to Federal Laws Federal Computer Intrusion Laws National Information Infrastructure Protection Act of 1995National Information Infrastructure Protection Act of 1995 Fraud and Related Activity in Connection with ComputersFraud and Related Activity in Connection with Computers The Digital Millennium Copyright Act Software Piracy and the Law The Computer Fraud and Abuse Act of 1986

Copyright © Center for Systems Security and Information Assurance Hyperlinks to Federal Laws Electronic Communications Privacy Act Privacy Act of 1974 Communications Act of 1934 Family Educational Rights and Privacy Act of 1974Family Educational Rights and Privacy Act of 1974 CAN-SPAM Act of 2003 United States Copyright Office