Lecture 30 Information Security (Cont’d). Overview Organizational Structures Roles and Responsibilities Information Classification Risk Management 2.

Slides:



Advertisements
Similar presentations
TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
Advertisements

Lecture 8 Access Control (cont)
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Security Controls – What Works
ISA 562 Summer Information Security Management CISSP Topic 1 ISA 562 Internet Security Theory and Practice.
Author(s): Don M. Blumenthal, 2010 License: Unless otherwise noted, this material is made available under the terms of the Attribution – Non-commercial.
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Information Systems Security Information Security & Risk Management.
Security Management Practices Keith A. Watson, CISSP CERIAS.
Information Systems Security Officer
Risk Management.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Session 3 – Information Security Policies
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Information Technology Audit
Peer Information Security Policies: A Sampling Summer 2015.
Auditing Information Systems (AIS)
Information Security Technological Security Implementation and Privacy Protection.
Internal Auditing & Management Control ACCT 620 Otto Chang Professor of Accounting.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter Three IT Risks and Controls.
BusinessAllstars.com 1 BusinessAllstars.com Presents Copyright © 2004 by Gainbridge Associates All right reserved This material may not be used or reproduced.
Roles and Responsibilities
Security Management Practices General overview of good security management processes. Introduces topics used in several other sections.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
Slide 1 Risk Management: Identifying and Assessing Risk  “ Once we know our weakness, they cease to do us an harm” Greg Lichen.
IT Controls Global Technology Auditing Guide 1.
Chapter 9: Introduction to Internal Control Systems
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Risk Identification and Risk Assessment
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 1: Security Governance Through Principles and Policies
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
Chapter 14: Controlling and Monitoring Access. Comparing Access Control Models Comparing permissions, rights, and privileges Understanding authorization.
Chapter 5: Protecting Security of Assets. Classifying and Labeling Assets Defining sensitive data Defining classifications Defining data security requirements.
Risk Management Issues in Information Security Amanda Kershishnik COSC April 2007.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
IS3230 Access Security Unit 5 Mapping Business Challenges and Managing Human Resources Risks.
Computer Security Management
TCSEC: The Orange Book.
Access Control Model SAM-5.
Cybersecurity classification and protection of information
Domain 2 – Asset Security
Security Management Practices
IS4680 Security Auditing for Compliance
Chap IT Audit and Control
Chapter 9 Control, security and audit
Figure 11-5: Control Principles
CMGT 430 Competitive Success/snaptutorial.com
CMGT 430 Education for Service/snaptutorial.com
CMGT 430 Teaching Effectively-- snaptutorial.com.
Technology Audit Plan ----BCSY University
Adding Value Across the Board
The Role of the Information Security Officer Getting It Right
IS Risk Management Framework Overview
IS Risk Management Report (Template)
IS4680 Security Auditing for Compliance
TEL382 Greene Chapter 5.
Presentation transcript:

Lecture 30 Information Security (Cont’d)

Overview Organizational Structures Roles and Responsibilities Information Classification Risk Management 2

Organizational Structure Organization of and official responsibilities for security vary – BoD, CEO, BoD Committee – Director, Manager IT/IS Security Audit 3

Typical Org Chart 4 Board of Directors/TrusteesPresident CIO Security Director Project Security Architect Enterprise Security Architect Security AnalystSystem Auditor

Security-Oriented Org Chart 5 Board of Directors/TrusteesPresident CIO Security Director Project Security Architect Enterprise Security Architect Security Analyst System Auditor IT Audit Manager

Further Separation 6 Audit Committee Board of Directors/TrusteesPresident CIO Security Director Project Security Architect Enterprise Security Architect Security Analyst System Auditor IT Audit Manager Internal Audit

Organizational Structure Audit should be separate from implementation and operations – Independence is not compromised Responsibilities for security should be defined in job descriptions Senior management has ultimate responsibility for security Security officers/managers have functional responsibility 7

Roles and Responsibilities Best Practices: – Least Privilege – Mandatory Vacations – Job Rotation – Separation of Duties 8

Roles and Responsibilities Owners – Determine security requirements Custodians – Manage security based on requirements Users – Access as allowed by security requirements 9

Information Classification Not all information has the same value Need to evaluate value based on CIA Value determines protection level Protection levels determine procedures Labeling informs users on handling 10

Information Classification Government classifications: – Top Secret – Secret – Confidential – Sensitive but Unclassified – Unclassified 11

Information Classification Private Sector classifications: – Confidential – Private – Sensitive – Public 12

Information Classification Criteria: – Value – Age – Useful Life – Personal Association 13

Risk Management Risk Management is identifying, evaluating, and mitigating risk to an organization – It’s a cyclical, continuous process – Need to know what you have – Need to know what threats are likely – Need to know how and how well it is protected – Need to know where the gaps are 14

Identification Assets Threats – Threat-sources: man-made, natural Vulnerabilities – Weakness Controls – Safeguard 15