Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Chapter 7: Physical & Environmental Security
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
ISMS standards and control processes ISO27001 & ISO27002
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Auditing Computer Systems
Security Controls – What Works
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Computer Security: Principles and Practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Assessment Frameworks
Session 3 – Information Security Policies
Fraud Prevention and Risk Management
Introduction to Network Defense
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
Information Security Framework & Standards
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
SEC835 Database and Web application security Information Security Architecture.
Overview of Systems Audit
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Incident Management By Marc-André Léger DESS, MASc, PHD(candidate) Winter 2008.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
Presented by : Miss Vrindah Chaundee
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Note1 (Admi1) Overview of administering security.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Information Security in Laurier Grant Li Wilfrid Laurier University.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Information Security Management Goes Global
Information Systems Security
Risk management.
Lecture 09 Network Security Management through the ISMS
Errors, Fraud, Risk Management, and Internal Controls
Information Security Awareness
Information Security based on International Standard ISO 27001
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
INFORMATION SYSTEMS SECURITY and CONTROL
Cybersecurity Threat Assessment
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information Technology Government of India Phone No :

INFORMATION SECURITY Generating information for the organization involves various components, processes and persons.

Prime things for the organization information processes are  People  Data center  Servers  Storage devices  Software  OS  Application software  Network INFORMATION SECURITY

Information that can exist in many forms  Data stored on computers  Transmitted Across Networks  Print Outs  Written on a Paper  Sent by Fax  Stored on Disks INFORMATION SECURITY

Information security is the protection against the loss/damage of information and preservation with Confidentiality Integrity Availability INFORMATION SECURITY

Information asset An information asset is a body of information, defined and managed as a single unit so it can be understood, shared, protected and exploited effectively. Information assets have certain value.

Value of asset Each organization has its own asset valuation scale (e.g. ‘high’, ‘medium’, ‘low’ etc.) The value expresses the potential impact and damage to the business from a loss of - Confidentiality - Integrity - Availability Values associated with breach of legislation

Dependent on loss/damage - Financial loss - Loss of sales/market share - Service availability & disruption to operations - Processing capability & productivity - Damage to image and reputation Value of asset

Vulnerabilities  Vulnerabilities are weaknesses associated organization’s assets.  Vulnerabilities may be identified in following areas  Processes and procedures  Personnel  Physical environment  Information system configuration  Hardware, software or communications equipment  Dependence on external parties

Threats Threats are anything that could cause damage/harm/loss to assets Threats can be accidental or deliberate Assets are subject to many kinds of threats which exploit vulnerabilities associated with them

Security Risk A security risk is the potential that a given threat will exploit vulnerabilities to cause loos/damage to asset. It is a function of the impact of the undesirable event and the probability the event occurred.

Information assets Security Safeguarding the accuracy and completeness of information and processing methods Confidentiality Ensuring that information is accessible only to those authorized to have access Ensuring that authorized users have access to information and associated assets when required Threats Security Risks Vulnerabilities INFORMATION SECURITY Integrity Availability

Threats & Vulnerabilities : Human Resources Security VulnerabilitiesThreats Unsupervised workTheft Insufficient security trainingOperational support staff error Poorly documented softwareOperational support staff error Lack of monitoring mechanismUse of facilities in unauthorised way Lack of policies for correct use of internet/ Use of facilities in unauthorised way

Threats & Vulnerabilities : Physical Security VulnerabilitiesThreats Unprotected storageTheft Unstable power gridPower fluctuation Lack of physical protection of buildingTheft Susceptibility to voltagePower fluctuation Susceptibility to temperature variationTemperature extremes Location in flood susceptible areaFlooding

Risk Assessment Assessment of threats to, impacts on and vulnerabilities of assets and the likelihood of their occurrence It produces an estimate of the risk to an asset at a given point in time.

Risk is function of asset value, Threat value and Vulnerability value R=f(A,T,V) R = Risk Value T = Threat Value A = Asset ValueV = Vulnerability Value Organization is free to chose the function ‘f’ as long as the out put of Risk Assessment is relevant. Risk Assessment Sometimes threats and vulnerabilities are commonly called as Security concern and assessed as single entry S(S c /S I /S A )

Security control Measures to Prevent, Detect or Reduce the Risk Effective security generally requires combinations of the following : detection Correction deterrencerecovery Preventionmonitoring Limitationawareness

Information Security Management Information security that can be achieved through technical means is limited Security also depends on people, policies, processes and procedures Resources are not unlimited It is not a once off exercise but an ongoing activity

Steps involved in establishing security management system for the organization Listing of information assets and categorization Identifying vulnerabilities Identifying threats Valuate threats Valuate vulnerabilities Valuate production policies Determine threat loss Arrival risk factors Select controls

Security Policy Organization of Information Security Asset Management Human Resource Security Physical & environmental security Communications & operations management Info. Systems Acquisition development & maintenance Access control Information Security Incident Management Business Continuity Management Compliance Security frame work

How to Select Controls Baseline controls ⁻ Gap analysis o Controls not or partially in place, but needed ⁻ Legal and business requirements Risk assessment controls ₋ Selected to reduce specific risks ₋ Aiming at identified security problems o Threats, vulnerabilities, assets protection, insurance etc.

Selection of Control Objectives and Controls Review the risk and identify control options The selection of controls should be made to bring down the risk to acceptable level The selection of controls should be cost effective

Implementing the controls A plan of implantation should be developed containing ‒Priorities (input from risk assessment) ‒Implementing schedule ‒The budget needed ‒Responsibilities ‒Necessary training activities

Setting of objectives and controls Example Physical and environmental security Secure areas Objective: To prevent unauthorized physical access, damage and interference to the organization’s premises and information. Physical security perimeterControl Security perimeters (barriers such as walls, card controlled entry gates or manned reception desks) shall be used to protect areas that contain information and information processing facilities. Physical entry controlsControl Secure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed access. Securing offices, room and facilities Control Physical security for offices, room and facilities shall be designed and applied.

Protecting against external and environmental threats Controls Physical protection against damage from fire, flood, earthquake, explosion, civil unrest and other forms of natural or natural or man-made disaster shall be designed and applied. Working in secure areasControls Physical protection and guidelines for working in secure areas shall be designed and applied. Public access, delivery and loading areas Controls Access points such as delivery and loading areas and other points where unauthorized persons may enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access. Setting of objectives and controls Example

ISMS is That part of overall management system based on a business risk approach to - Establish - Implement - Operate - Monitor - Review - Maintain & Improve

- ISO/IEC : A Specification ( Specifies requirements for implementing, operating, monitoring, reviewing, maintaining & improving, a documented ISMS) - Specifies the requirements of implementing of Security control, customised to the needs of individual organisation of part thereof. - Used as a basis for certification - ISO/IEC : 2005 ( Originally ISO/IEC : 2005) - A code of practice for Information Security management - Provides best practice guidance ISMS Standards

A.5 Security Policy A.6 Organization of Information Security A.7 Asset Management A.8 Human Resource Security A.9 Physical & environmental security A.10 Communications & operations management A.12 Info. Systems Acquisition development & maintenance A.11 Access control A.13 Information Security Incident Management A.14 Business Continuity Management A.15 Compliance Security Control Clauses of ISO 27001

Effective Implementation of ISMS Management Commitment Organisation Resources Focus on Prevention Training Communication Participation System Review

THANK YOU