Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.

Slides:



Advertisements
Similar presentations
PhoenixPro Procurement. technology. contracts. projects.
Advertisements

Security and Personnel
Security Controls – What Works
ISA 562 Summer Information Security Management CISSP Topic 1 ISA 562 Internet Security Theory and Practice.
Author(s): Don M. Blumenthal, 2010 License: Unless otherwise noted, this material is made available under the terms of the Attribution – Non-commercial.
Information Security Policies and Standards
Security Management Practices Keith A. Watson, CISSP CERIAS.
Unit # 3: Information Security and Risk Management
Introduction to Information Security
By: Ashwin Vignesh Madhu
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
Managing Risk in Information Systems Strategies for Mitigating Risk
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Chapter 11.  The board is ultimately responsible for risk management  Oversee strategic risks, operational risks, and financial risks  Many federal.
Complying With The Federal Information Security Act (FISMA)
Information Technology Audit
Peer Information Security Policies: A Sampling Summer 2015.
AUDITING INFORMATION SYSTEMS SECURITY. AUDIT OF LOGICAL ACCESS USE OF TECHNIQUES FOR TESTING SECURITY USE OF INVESTIGATION TECHNIQUES.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Auditing Information Systems (AIS)
Lecture 30 Information Security (Cont’d). Overview Organizational Structures Roles and Responsibilities Information Classification Risk Management 2.
Information Security and Risk Management
Information Management Evolution Corrective Services NSW Peter Konstantin, Director Information Management
Internal Auditing & Management Control ACCT 620 Otto Chang Professor of Accounting.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 5 Tom Olzak, MBA, CISSP.
Chapter Three IT Risks and Controls.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Architecture
Internal Audit’s Role in Compliance Laurisa Riggan, CPA, CHE Children’s Mercy Hospitals and Clinics September 26, 2000.
Roles and Responsibilities
Implementing and Auditing Ethics Programs
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
IT Controls Global Technology Auditing Guide 1.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
S3: Understanding the Business. Session objective To explain why understanding of the business of the entity is important for the auditor To explain why.
SecSDLC Chapter 2.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Chapter 1: Security Governance Through Principles and Policies
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 4: Security Management.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Primary Steps for Achieving ISO Certification.
Information Systems Security
On-Line Meeting 2 October 25, 2016.
Risk management.
Information Security Principles and Practices
Cybersecurity classification and protection of information
Security Management Practices
IS4680 Security Auditing for Compliance
Chap IT Audit and Control
Chapter 9 Control, security and audit
CMGT 431 Competitive Success/snaptutorial.com
CMGT 431 STUDY Education for Service- -cmgt431study.com.
IT Development Initiative: Status and Next Steps
IS4550 Security Policies and Implementation
IS Risk Management Framework Overview
IS Risk Management Report (Template)
IS4680 Security Auditing for Compliance
Data Governance & Management Skills and Experience
Chapter 1 Key Security Terms.
Security Policies and Implementation Issues
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3

13-2 3/10/ :48 Outline 0 Security Management 0 Security Administration and Supporting Controls 0 Organizational Security Model 0 Information Risk Management 0 Risk Analysis 0 Policies, Standards, Baselines, Guidelines, Procedures 0 Information Classification 0 Layers of Responsibility 0 Security Awareness and Training

13-3 3/10/ :48 Security Management 0 Security Management Responsibilities 0 Top-Down approach to security

13-4 3/10/ :48 Security Administration and Supporting Controls 0 Fundamental principles of security -CIA 0 Security definitions -Threats, Vulnerabilities, Risk, Countermeasures/safeguard 0 Security through obscurity

13-5 3/10/ :48 Organizational Security Model 0 Security Program Components 0 Security Frameworks 0 Security Governance 0 Security Program Development

13-6 3/10/ :48 Information Risk Management 0 Who really understands risk management? 0 Information Risk Management Policy 0 The Risk Management Team

13-7 3/10/ :48 Risk Analysis 0 Risk Analysis Team 0 Risk Ownership 0 The value of information and assets 0 Costs that make up the value 0 Identifying Threats 0 Failure and Fault Analysis 0 Quantitative Risk Analysis 0 Qualitative Risk Analysis 0 Protection Mechanisms

13-8 3/10/ :48 Policies, Standards, Baselines, Guidelines, Procedures 0 Security Policy 0 Standards 0 Baselines 0 Guidelines 0 Procedures 0 Implementation

13-9 3/10/ :48 Information Classification 0 Private Business vs. Military Classification 0 Classification Controls

/10/ :48 Layers of Responsibility 0 Board of Directors 0 Executive Management 0 Chief Information Officer 0 Chief Security Officer 0 IS Security Steering Committee 0 Audit Committee 0 Data Owner 0 Data Custodian 0 System Owner 0 Security Administrator 0 Security Analyst 0 Application Owner 0 Supervisor 0 Change Control Analyst 0 Data Analyst 0 Process Owner 0 Solution Provider 0 User 0 Product Line Manager 0 Auditor 0 Other: HR, Hiring Practices, Termination

/10/ :48 Security Awareness and Training 0 Different Types of Security Awareness and Training 0 Evaluating the Program 0 Specialized Security Training