Policies CIT 380: Securing Computer SystemsSlide #1.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
HIPAA Security Standards What’s happening in your office?
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
Information Security Policies and Standards
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Introducing Computer and Network Security
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Computer Security: Principles and Practice
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
New Data Regulation Law 201 CMR TJX Video.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Policies CIT 380: Securing Computer SystemsSlide #1.
Appendix C: Designing an Operations Framework to Manage Security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Note1 (Admi1) Overview of administering security.
Policies CIT 380: Securing Computer SystemsSlide #1.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Information Security tools for records managers Frank Rankin.
Risk Assessment and Risk Management James Taylor COSC 316 Spring 2008.
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Security Standard: “reasonable security”
Chapter 3: IRS and FTC Data Security Rules
Unit 7 – Organisational Systems Security
I have many checklists: how do I get started with cyber security?
Security week 1 Introductions Class website Syllabus review
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
School of Medicine Orientation Information Security Training
Presentation transcript:

Policies CIT 380: Securing Computer SystemsSlide #1

 epolicy.pdf epolicy.pdf CIT 380: Securing Computer Systems2

 Confidentiality  Integrity  Availability CIT 380: Securing Computer Systems3

 Keeping information secret  Bank records  Medical records  Student records  Personally identifiable information CIT 380: Securing Computer Systems4

 Accuracy and reliability of information  You are charged correctly for a purchase  Your bank balance is correct  You register for the correct class CIT 380: Securing Computer Systems5

 Reliable and timely access  is accessible  Can access airline reservation system CIT 380: Securing Computer Systems6

 National Defense  Confidentiality  Banking  Integrity CIT 380: Securing Computer Systems7

1. Planning to address security needs. 2. Risk assessment. 3. Crafting policies to reflect risks and needs. 4. Implementing security. 5. Audit and incident response. CIT 380: Securing Computer SystemsSlide #8

 Security professionals generally don’t refer to a computer system as being “secure” or “unsecure.”  Trust – level of confidence that a computer system will behave as expected. CIT 380: Securing Computer Systems9

1. Identify assets and their value 2. Identify risk to assets 3. Calculate risk CIT 380: Securing Computer Systems10

1. What assets are you trying to protect? 2. What are the risks to those assets? 3. How well does each potential security solution mitigate those risks? 4. What other risks does the security solutions impose on me? 5. What costs and trade-offs do the security solutions create? CIT 380: Securing Computer SystemsSlide #11

 Home computer system  Laptop  E-commerce web server  NKU computer systems CIT 380: Securing Computer Systems12

Tangibles  Computers  Data  Backups  Printouts  Software media  HR records Intangibles  Privacy  Passwords  Reputation  Goodwill  Performance CIT 380: Securing Computer SystemsSlide #13

 Home computer system  Laptop  E-commerce web server  NKU computer systems CIT 380: Securing Computer Systems14

 Loss of key personnel  Loss of key vendor or service provider  Loss of power  Loss of phone / network  Theft of laptops, USB keys, backups  Introduction of malware  Hardware failure  Software bugs  Network attacks CIT 380: Securing Computer SystemsSlide #15

 Cost-Benefit Analysis  Cost of Loss  Probability of Loss  Cost of Prevention  Levels of importance  High, Medium, Low  Best Practices CIT 380: Securing Computer Systems16

Cost of a Loss  Direct cost of lost hardware.  Cost of idle labor during outage.  Cost of time to recover.  Cost to reputation. Probability of a Loss  Insurance/power companies have some stats.  Records of past experience. Cost of Prevention  Remember that most risks cannot be eliminated. CIT 380: Securing Computer SystemsSlide #17

Update your risks regularly  Business, technology changes alter risks. Too many risks to defend against.  Rank risks to decide which ones to mitigate.  Insure against some risks.  Accept other risks. CIT 380: Securing Computer SystemsSlide #18

 Risk Analysis is difficult and uncertain.  Follow best practices or due care  Firewall require as insurance co. due care.  Update patches, anti-virus.  Organizations differ in what they need.  Combine best practices + risk analysis. CIT 380: Securing Computer SystemsSlide #19

 Security is not free.  MBA’s understand cost and benefits  MBA’s mistrust technology CIT 380: Securing Computer Systems20

 Policy helps to define what you consider to be valuable, and it specifies which steps should be taken to safeguard those assets. CIT 380: Securing Computer Systems21

1. What is being protected 2. Who is responsible 3. Provides ground on which to interpret and resolve later conflicts. CIT 380: Securing Computer Systems22

 Should be general and change little over time.  How does the NKU Acceptable Use Policy for Technology Resources meet these roles? CIT 380: Securing Computer SystemsSlide #23

Security policy partitions system states into:  Authorized (secure) ▪ These are states the system is allowed to enter.  Unauthorized (nonsecure) ▪ If the system enters any of these states, it’s a security violation. Secure system  Starts in authorized state.  Never enters unauthorized state. CIT 380: Securing Computer SystemsSlide #24

Security Policy  Statement that divides system into authorized and unauthorized states. Mechanism  Entity or procedure that enforces some part of a security policy. CIT 380: Securing Computer SystemsSlide #25

 Assign an owner  Be positive  People respond better to do than don’t.  Remember that employees are people too  They will make mistakes  They value privacy  Concentrate on education  Standards for training and retraining CIT 380: Securing Computer Systems26

 Privacy  Change control  Employment agreement, ethics  Internet acceptable use  Remote access  Outsourcing  Access control  Data classification CIT 380: Securing Computer Systems27

 Codify successful security practices  Standards for backups  Standard anti-virus product throughout the organization  Encryption algorithm  Platform independent  Metric to determine if met CIT 380: Securing Computer Systems28

 Interpret standards for a particular environment.  Recommendations  Follow tested procedures or best practices  Window Server backups CIT 380: Securing Computer Systems29

 HIPAA  Medical Privacy - National Standards to Protect the Privacy of Personal Health Information  Sarbanes Oxley  Protecting of financial and accounting information  Federal Information Security Management Act (FISMA)  IT controls and auditing CIT 380: Securing Computer Systems30

 Have authority commensurate with responsibility  Spaf’s first principle of security administration:  If you have responsibility for security, but have no authority to set rules or punish violators, your own role in the organization is to take the blame when something big goes wrong. CIT 380: Securing Computer Systems31

 Be sure to know you security perimeter  Laptops and PDAs  Wireless networks  Computer used at home  Portable media ▪ Flash drives, CDs, DVDs CIT 380: Securing Computer Systems32

 Perimeter defines what is within your control.  Historically  Within walls of building or fences of campus.  Within router that connects to ISP.  Modern perimeters are more complex  Laptops, PDAs.  USB keys, CDs, DVDs, portable HDs.  Wireless networks.  Home PCs that connect to your network. CIT 380: Securing Computer SystemsSlide #33

1. Decide how important security is for your site. 2. Involve and educate your user community. 3. Devise a plan for making and storing backups of your system data. 4. Stay inquisitive and suspicious. CIT 380: Securing Computer Systems34

 Formulating policy is not enough by itself. It is important to determine regularly if the policy is being applied correctly, and if the policy is correct and sufficient. CIT 380: Securing Computer Systems35

 Audit your systems and personnel regularly.  Audit failures may result from  Personnel shortcomings ▪ Insufficient education or overwork  Material shortcomings ▪ Insufficient resources or maintenance  Organizational shortcomings ▪ Lack of authority, conflicting responsibilities  Policy shortcomings ▪ Unforeseen risks, missing or conflicting policies CIT 380: Securing Computer SystemsSlide #36

 In-house staff  Full-time or part-time consultants  Choosing a vendor ▪ “Reformed hacker” CIT 380: Securing Computer Systems37

 Policy divides system into  Authorized (secure) states.  Unauthorized (insecure) states.  Policy vs Mechanism  Policy: describes what security is.  Mechanism: how security policy is enforced.  Written policy and enforced policy will differ.  Compliance audits look for those differences.  Security Perimeter  Describes what is within your control.  Defense in depth: defend perimeter and inside. CIT 380: Securing Computer SystemsSlide #38

1. Matt Bishop, Introduction to Computer Security, Addison-Wesley, Simson Garfinkel, Gene Spafford, and Alan Schwartz, Practical UNIX and Internet Security, 3/e O’Reilly, NKU, Acceptable Use Policy, eusepolicy.pdf, eusepolicy.pdf 4. SANS, SANS Security Policy Project, CIT 380: Securing Computer SystemsSlide #39