COMP3371 Cyber Security Richard Henson University of Worcester October 2015.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
Guide to Network Defense and Countermeasures Second Edition
Buying Better Outcomes Workshop 4 Equalities and Contract Management If you do not take it seriously, why should the supplier?
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Jeff Williams Information Security Officer CSU, Sacramento
Security Controls – What Works
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Payment Card Industry (PCI) Data Security Standard
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Introduction to Payment Card Industry Data Security Standard
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
COMP3123 Network and Internet Security Richard Henson University of Worcester September 2011.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
COMP1321 Networks in Organisations Richard Henson March 2014.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
Working with HIT Systems
COMP1321 Digital Infrastructure Richard Henson University of Worcester December 2012.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
Richard Henson University of Worcester February 2017
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Internet Payment.
COMP3357 Managing Cyber Risk
Session 11 Other Assurance Services
Current ‘Hot Topics’ in Information Security Governance Auditing
General Data Protection Regulations: what you really need to know
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
IS4680 Security Auditing for Compliance
General Data Protection Regulation
Richard Henson University of Worcester February 2018
Contact Center Security Strategies
COMP1321 Digital Infrastructure
COMP3357 Managing Cyber Risk
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

COMP3371 Cyber Security Richard Henson University of Worcester October 2015

Week 2 – Strategies for securing data held within digital systems n Objectives:  Understand principles of maintaining data confidentiality, privacy, integrity, availability  Apply a security strategy in terms of denial of access to unauthorised services and information  Explain that total security is a myth; people are people, and computer technology is constantly evolving…

Typical organisational approaches n Outsource n In-house… guru n In-house… committee

Outsource/Offshore  Buy in the services of a third party from outside the organisation to “look after security”.  This may be on the back of a general strategy to outsource IT »usually involves managing data and/or processes remotely »outsource… usually still in the UK »offshore… usually outside the UK

Seek an in-house solution… guru  Appoint someone internally or from outside »look after (information) security… n development of policy, usually by consensus e.g. via stakeholder committee »annual audit »manage a budget

Seek an in-house solution… committee  Senior manager chairs a group consisting of key stakeholders »agree a set of procedures »designated employees should take ownership; ensure these are adhered to »meet at regular intervals as a matter of organisational policy

How would you set up an Information Security policy? n BREAK!!! n And discussion again in groups  why outsource?  how could it be done internally »Who would be the “stakeholders”?

Relative Merits of using a Third Party … n Advantages:  pass responsibility on to someone else (?!)  pay someone a flat annual fee; easily budgeted n Disadvantages:  Data Controller still has DP Act responsibility…  may also pass control to someone else…  third party may be looking after many other clients…

Appointing a “security tzar” with Information Security budget n Will this work, as a single solution? n Is Information Security just an IT spending problem? n Groups again… discuss…

“Middle Manager” Solution n Will this work, as a single solution? n Again… groups

Answers (to each) n 1. Of course not!!!  organisation still has responsibility!! n 2. Of course not!!!  this is a people problem…  data integrity errors  leaving data on physical devices that can be taken by a third party

If this was just about technology, would that make any difference? n Over to you again…

If this WAS just about IT, would that make any difference? n It is true that, at considerable effort and expense…  a computer network can be made completely secure at a particular point in time n BUT THEN the following day, a new security threat may be launched onto the Internet from any one of over 2 billion potential sources…  quite a challenge?

The Changing Threat… n A good outsourcer will have time and resources to keep up with the reality of many new threats each day  should be on top of this problem… n But merely employing a “security supremo” to buy, install, configure security devices won’t solve the problem  securing data must be ONGOING…  supremo must put procedures into place to deal with a continuing problem… »and company must make sure everybody knows about them…

Security as a “Process” n Security cannot ever be “done”  a new threat may be being planned today, and rolled out tomorrow… n Could make the most secure network suddenly very vulnerable!

Managing Information Security as a Process n First step…  identify all systems that carry information and decide what controls are in place to protect them  test those controls for potential security breaches  identify what has been forgotten »secure as appropriate through further controls n Next step:  once secure, develop a strategy to MANAGE this process over time...  implement that strategy

Information Security Management n Implement a set of agreed procedures to protect data  administered at organisational level  acknowledge the iterative nature of information security & agree on rate of iteration n Appoint someone with institutional responsibility  realistic budget that takes into account the resource and human cost… »may use a third-party outsourcer to provide advice, expertise, implement procedures, but at least they are in control of the policy-making »even better…. develop an Information Security Management System (ISMS)

The Costs of securing data n Hardware/software cost  fixed and easily determined n Human resource cost  cost of Information Security supremo  cost the organisation of using staff to implement and enforce data security procedures »more difficult to quantify  cost of testing/retraining employees

Costs of Securing Data n Isolated LAN, with no internet connectivity  no need to worry about data in and data out via the Internet  less stringent procedures may be needed/enforced  employees could still mess up or steal data n LAN connected to the Internet:  “secret” data? highly rigorous procedures, implemented frequently – very expensive  no real secrets (political or commercial) more infrequent cycle, less exhaustive procedures »much cheaper…

The Costs of Data Breach? n Groups again…

The Costs of Data Breach n People not able to work… n Organisation not able to communicate effectively with customers… n Embarrassment of reporting in the media  loss of reputation n Fines, etc., by FSA or ICO n Fall in stock market price n Increase in insurance premiums n Not getting future contracts…

Information Security Procedures n In groups again, discuss:  possible procedures the organisation could set up…  how expensive such procedures might be to implement…

The ISMS - Making an Information System secure n As ever, the success of rules and procedures depends on  people  how they are managed… n In practice, standards developed based on the concept of an ISMS (Information Security Management System)

Developing an ISMS n Each organisation is different! n Original ISO27001 standard for an ISMS identified 133 possible controls  how many of these are actually needed depends on the organisational processes  each control not used »non-use needs to be justified

An ISMS that is “fit for purpose” n Each organisation is different! n ISO27001 standard for an ISMS has identified over 100 possible controls  how many of these are actually needed depends on the organisational processes n ISMS needs to knowledge all aspects of how data is managed  requires an understanding of processes  and identification of where that data may need have security controls n Organisations need to undergo process analysis and risk assessment to determine where controls are needed  no point spending money on controls where they are not needed…

An Alternative Approach to Security Controls: PCI DSS n System devised by Credit Card Companies (i.e. banks…) n Guidelines for a number of years… n Now with v3 a sting in the tail for the SME  heavy fines possible  can be refused business merchant facilities… n Will affect small businesses WORLDWIDE selling online directly to consumers

Requirements for PCI DSS compliance? (1) n 12 controls  Install and maintain a firewall configuration to protect cardholder data  Do not use vendor-supplied defaults for system passwords and other security parameters  Protect stored cardholder data  Encrypt transmission of cardholder data across open, public networks  Use and regularly update anti-virus software or programs

What is needed for PCI DSS compliance? (2)  Develop and maintain secure systems and applications  Restrict access to cardholder data by business need-to- know  Assign a unique ID to each person with computer access  Track and monitor all access to network resources and cardholder data  Regularly test security systems and processes  Maintain a policy that addresses information security for employees and contractors

PCI DSS issues n Is it realistic? n Is it essential? n How can it be policed? n Discussion in groups…

IASME & Cyber Essentials n IASME uses principles of ISMS and 100+ controls… but more SME friendly n Cyber Essentials uses only 5 controls… but all essentially technical  Cyber Essentials now a minimum for government contracts  Useful starting point? No IS policy!

Policy in Action: The Client-Server Model n Excellent way to centralise organisational resources  client can still hold resources »a lot (workstation) »not much (thin client) n Microsoft model: called a domain

Request and response 1.All network users use clients 2.Client requests information… 2. Server processes the request, sends a response back to the client

A Domain in action… (Today’s practical)

The next sessions will explore… a) theoretical aspects related to the technical implementation of information security b) the setting up policies, procedures controls and systems to manage information security