Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

The International Security Standard
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Effective Design of Trusted Information Systems Luděk Novák,
IT Security Evaluation By Sandeep Joshi
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
1 Information Security Standards Gary Gaskell © 2001.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Stephen S. Yau CSE , Fall Evaluating Systems for Functionality and Assurance.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
The Information Systems Audit Process
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Information Systems Controls for System Reliability -Information Security-
Fraud Prevention and Risk Management
Complying With The Federal Information Security Act (FISMA)
Internal Auditing and Outsourcing
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Gurpreet Dhillon Virginia Commonwealth University
Principles of Information System Security: Text and Cases
Information Security Framework & Standards
SEC835 Database and Web application security Information Security Architecture.
ISA 562 Internet Security Theory & Practice
NIST Special Publication Revision 1
Chapter Three IT Risks and Controls.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Challenges in Infosecurity Practices at IT Organizations
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Advanced Accounting Information Systems Day 20 Control and Security Frameworks October 9, 2009.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
Certification and Accreditation CS Syllabus Ms Jocelyne Farah Mr Clinton Campbell.
CMSC : Common Criteria for Computer/IT Systems
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
Enterprise Cybersecurity Strategy
SecSDLC Chapter 2.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
2/20/2016 Leveraging IT Governance and COBIT Chip Council, PhD, CGEIT, CISM, CISA Matt Schmidt, MS, CISSP, CISA Adjunct Professors, University of Minnesota.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Chapter 1: Security Governance Through Principles and Policies
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
The NIST Special Publications for Security Management By: Waylon Coulter.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Dr. Yeffry Handoko Putra, M.T
Risk management.
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Chapter Three Objectives
Presentation transcript:

Security Standards and Threat Evaluation

Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification and accreditation

IT Governance A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes.

C & A The certification and accreditation (C&A) process focuses on federal IT systems processing, storing, and transmitting sensitive information, the associated tasks and subtasks, security controls, and verification techniques and procedures, have been broadly defined so as to be universally applicable to all types of IT systems, including national security or intelligence systems, if so directed by appropriate authorities.

Standards in Assessing Risk  Need a way to measure risk consistently  Need to cover multiple geographies  Needs to scale  Newly forming  Teaching

Methodologies  A Body of Practices, procedures and rules used by those who engage in an inquiry  Can include multiple frameworks  Overall approach used to measure something  Repeatable  Utilizes standards

Standards  Something that is widely recognized or employed, especially because of its excellence  An acknowledged measure of comparison for qualitative or quantitative value  Many different types of standards- even for the same elements needing to be measured

Framework  A set of assumptions, concepts, values and practices that constitutes a way of viewing reality  Building block for crafting approach  Encapsulates elements for performing a task  Acts as a guide- details can be plugged in for specific tasks

Standards  CoBit  ISO17999  Common Criteria  NIST

COBIT  Control Objectives for Information and related Technology  Framework, Standard or Good practice?  Includes: –Maturity models –Critical Success factors –Key Goal Indicators –Key Performance Indicators

COBIT COBIT is structured around four main fields of management implying 34 processes of management associated with information technology: 1.Planning and organization 2.Acquisition and implementation 3.Delivery and Support 4.Monitoring

ISO17999  “A detailed security Standard”  Ten major sections: –Business Continuity Planning –System Access Control –System Development and Maintenance –Physical and Environmental Security –Compliance –Personnel Security –Security organization –Computer and Network Management –Asset Classification –Security Policy

ISO17999  Most widely recognized security standard  Based on BS7799, last published in May 1999  Comprehensive security control objectives  UK based standard

SSECMM CIA Triad  Defines the “triad” as the following items:  Confidentiality  Integrity  Availability  Accountability  Privacy  Assurance

Common Criteria  Developed from TCSEC standard in 1980’s (Orange book)  International Standard  ISO took ITSEC (UK) TCSEC and CTCPEC (Canada) and combined them into CC (1996)  NIAP –National Information Assurance Partnership –

Common Criteria  11 Functionality Classes: –Audit –Cryptographic Support –Communications –User Data Protection –Identification and Authentication –Security Management –Privacy –TOE Security functions –Resource utilization –TOE Access –Trusted Paths

Threat Approach

Threat Evaluation  Evaluation of level of threat to an asset  Based on: –Visibility, inherent weakness, location, personal/business values  Method: –Determine threats to assets (and their importance) –Determine cost of countermeasures –Implement countermeasures to reduce threat

Threats  Activity that represents possible danger  Can come in different forms  Can come from different places  Can’t protect from all threats  Protect against most likely or most worrisome such as: –Business mission –Data (integrity, confidentiality, availability)

Vulnerability Assessment  Evaluation of weakness in asset  Based on: –Known published weakness –Perceived / studied weakness –Assessed threats  Method: –Determined threats relevant to asset –Determined vulnerability to those threats –Determine vulnerability to theoretical threats –Fortify / accept vulnerabilities