Download presentation
Presentation is loading. Please wait.
Published byOctavia Spencer Modified over 9 years ago
1
Security Administration
2
Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1
3
Security Involves: Technical controls Administrative controls Physical controls
4
Major Chapter Topics Planning Risk analysis Policy Physical security
5
Security Plan Written document that describes how an organization will address its security needs
6
What Should a Security Plan Do? Identify what (vulnerabilities, threats, and risks) Specify how they will be handled (controls) Specify who will handle them Specify when they will be handled (timetable)
7
Issues Listed in Text Policy Current state Requirements Recommended controls Accountability Timetable Continuing attention (updates)
8
OCTAVE Operationally Critical Threat, Asset, and Vulnerability Evaluation Developed at Carnegie Mellon CERT Coordination Center First published in 1999
9
The OCTAVE Approach Self-directed Focused on risks to information assets Focused on practice-based mitigation Best practices from CERT/CC, NIST, laws and regulations (e.g., HIPPA), etc. Participation by both business and IT personnel
10
Different Scales OCTAVE – large organizations OCTAVE-S – small organizations
11
OCTAVE Steps 1. Identify enterprise knowledge 2. Identify operational area knowledge 3. Identify staff knowledge 4. Create threat profiles 5. Identify key components 6. Evaluate selected components 7. Conduct a risk analysis 8. Develop a protection strategy
12
Common Criteria (CC) Framework for evaluation of IT systems International effort United States United Kingdom France Germany The Netherlands Canada
13
Business Continuity Plan Plan for management of situations which are Catastrophic Long-lasting A single such incident can put a company out of business (even if handled well) Identify essential assets and functions
14
Incident Response Plan Plan for management of security incidents May not be catastrophic May not be long-lasting Many incidents will have minor impact on operations
15
Risk Analysis Risks closely related to threats Risk analysis attempts to quantify and measure problems associated with threats Many approaches to risk analysis have been developed
16
Quantifying Risk Risk probability How likely is the risk? Risk impact How much do we lose? Risk control Can the risk be avoided?
17
Risk Exposure Probability of Risk X Risk Impact Risk Impact – $100,000 Risk Probability – 0.5 Risk Exposure – $50,000
18
Risk Leverage (Exposure Before – Exposure After)/ Risk Control Cost Original Risk Exposure – $ 50,000 Cost of Control – $100 Revised Risk Exposure – $20,000 Risk Leverage – 300 (note: dimensionless)
19
Risk Analysis Steps Identify assets Determine vulnerabilities Estimate likelihood of exploitation Compute expected annual loss Survey applicable controls and their costs Project annual savings of control
20
Difficulties of Risk Analysis Probabilities hard to estimate Historical data Experts Delphi approach Some costs hard to quantify
21
Risk Analysis Approaches Many risk analysis approaches Usual common features: Checklists Organizational matrices Specification of procedures No dominant approach
22
Security Policy A written document describing goals for and constraints on a system Who can access what resources in what manner? High level management document Should not change often
23
Policy Considerations Stakeholders (beneficiaries) Users Owners Resources
24
Security Procedures/Guidelines Describe how security policy will be implemented More frequent changes than policy
25
Physical Security Protection that does not involve the system as a system Independent of Hardware Software Data
26
Possible Problems Natural disasters Floods Fires Power loss Human vandals Interception of sensitive information
27
Physical Security Controls Backups Backups!!!
28
Natural Disasters Careful building design System placement Fire extinguishers
29
Power Loss Uninterruptible power supply Surge suppressor
30
Human Vandals Guards Locks Authentication Reduced portability Theft detection
31
Information Interception Shredding Overwriting magnetic data Degaussing Destroy magnetic fields Tempest Prevent or control magnetic emanations
32
Contingency Plans Backup Offsite backup Networked storage Cold site Hot site
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.