Download presentation
Presentation is loading. Please wait.
Published byAnnabel Ellis Modified over 8 years ago
1
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011
2
Agenda Chapter 24: Information Technology Security Management
3
INFORMATION TECHNOLOGY SECURITY MANAGEMENT
4
FISMA Federal Information Security Management Act (FISMA) – Created by National Institute of Standards and Technology (NIST) – Describes information security guidelines – Describes a risk management framework Paramount in implementing an IT security management plan – Usable by any organization
5
Figure 24.1 Specifications in the Federal Information Security Management Act.
6
International Standards Organization ISO/IEC 17799:2005 – Published by International Standards Organization and the International Electro Technical Commission (ISO/IEC) – Security guidelines and general principles Initiating, implementing, maintaining, improving – Guidance on commonly accepted goals – Best practices of control objectives and controls – Intended to meet risk assessment requirements
7
Figure 24.2 International Standards Organization best-practice areas.
8
Professional Societies The Internet Society – Organization home for groups responsible for Internet infrastructure standards Internet Engineering Task Force (IETF) Internet Architecture Board (IAB) Information Security Forum – Global nonprofit organization – Provides research into best practices and advice – Produces biannual Standard of Good Practice
9
Security Policies and Procedures Essential steps for implementing IT security management – Authorize security roles and responsibilities to various security personnel – Set rules for expected behavior from users and security role players – Set rules for business continuity plans Security policy requirements – General agreement by most personnel – Support of highest-level management This is the “teeth”
10
Example Security Policies Information Security Program Information Security Roles & Responsibilities Acceptable Use Policy (AUP) Risk Management Program Vulnerability Management Patch Management Encryption Media Disposal Asset Accountability Password Policy Remote Access Policy Log/Event Management Auditing Unique User Account Wireless Security Network Security Physical Security Business Continuity/Disaster Recovery Awareness Training
11
Security Organization Structure What are some important issues to include in a security policy? Various security-related roles – End user – Executive management – Security officer – Data/information owners – Information system auditor – Information technology personnel – Systems administrator
12
Processes: Continuity and Governance Business continuity strategy – Requires senior management commitment – Includes business impact assessment/risk analysis Focuses on business value drivers determined by main stakeholders IT security governance planning – Includes prioritization as its major function – Determines priorities among potentially conflicting interests Budget setting, resource allocation, politics
13
Processes: Rules and Regulations Consider state, national, and international rules and regulations – FISMA – HIPAA – SOX – Gramm-Leach-Bliley Act – Computer Fraud and Abuse Act – State privacy laws
14
Summary Information technology security management – Processes enable organizational structure – Technology protects IT operations and assets Security policies and procedures – Require general agreement and management support IT security processes – Part of an organization’s risk management process and business continuity strategy – Be aware of national and international rules and regulations
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.