SlideShare uma empresa Scribd logo
1 de 33
IS Security Management
                4/18/2013
The Elephant in the Server
Room

• Absolute security
  is a myth.
• IS managers take
  the blame.
Risk Management
• Risk management: process of identifying
  and controlling risks facing an organization
• Risk identification: process of examining
  an organization’s current information
  technology security situation
• Risk control: applying controls to reduce
  risks to an organizations data and
  information systems                         3
Components of Risk
Management
                                 Risk Management




   Risk Identification                             Risk Control
   Risk Assessment
   is the documented result
    of the risk identification
             process                         Selecting Strategy
  Inventorying Assets
                                             Justifying Controls
   Classifying Assets
  Identifying Threats
    & Vulnerabilities
An Overview of Risk
Management
• Know yourself
  – Understand the technology and systems in your
    organization
• Know the enemy
  – Identify, examine, understand threats
• Role of Communities of Interest
  – Information Security
  – Management and Users
  – Information Technology
                                                    5
Risk Identification
• Assets are targets of various threats
  and threat agents
• Risk management involves identifying
  organization’s assets and identifying
  threats/vulnerabilities
• Risk identification begins with identifying
  organization’s assets and assessing
  their value                                   6
7
Asset Identification and
Valuation
• List all elements of
  an organization’s
  system.
• Classify and
  categorize assets.

                           8
Table 4-1 - Categorizing
             Components & Valuation
              Asset Identification
Traditional System   SecSDLC and risk management system components
Components


People               Employee                Trusted employees
                                             Other staff

                     Non-employees           People at trusted organizations / Strangers


Procedures           Procedures              IT & business standards procedures
                                             IT & business standards procedures

Data                 Information             Transmission, Processing, Storage


Software             Software                Applications, Operating systems, Security
                                             components

Hardware             System devices and      Systems and peripherals
                     peripherals             Security devices

                     Networking components   Intranet components
                                             Internet or DMZ components
Data / People /
Procedural Assets
• Human resources, documentation, and
  data information assets are more
  difficult to identify
• People with knowledge, experience,
  and good judgment should be assigned
  this task
• These assets should be recorded using
  reliable data-handling process          10
Hardware / Software /
Network Assets
•   Name (device or program name)
•   IP address
•   Media access control (MAC) address
•   Element type – server, desktop, etc.
    Device Class, Device OS, Device
    Capacity


                                           11
Hardware / Software /
Network Assets
•   serial number
•   manufacturer name; model/part number
•   software versions
•   physical or logical location
•   Software version, update revision
Information Asset
Classification
• Many organizations have data
  classification schemes (e.g.,
  confidential, internal, public data)
• Classification must be specific enough
  to allow determination of priority
• Comprehensive – all info fits in list
  somewhere
• Mutually exclusive – fits in one place
                                           13
Information Asset
 Valuation
• What is most critical to
  organization’s success?
• What generates the most revenue?
• What generates the most profit?
• What would be most expensive to
  replace?
Information Asset
 Valuation (continued)
• What would be most expensive to
  protect?
• What would be most embarrassing
  or cause the greatest liability is
  revealed?
Figure 4-3 – Example
Worksheet




                       16
Listing Assets in Order of
Importance
• Weighted factor analysis
• Each info asset assigned score for each
  critical factor (0.1 to 1.0)
• Each critical factor is assigned a weight (1-
  100)
• Multiply and add
Table 4-2 – Example
Weighted Factor Analysis




         CPSC375@UTC/CS    18
Data Classification and
Management
• Information owners responsible for
  classifying their information assets
• Information classifications must be
  reviewed periodically
• Most organizations do not need detailed
  level of classification used by military or
  federal agencies.
Data Classification and
Management
• Organizations may need to classify
  data to provide protection
  – Public
  – For official use only
  – Sensitive
  – classified

                  CPSC375@UTC/CS       20
Data Classification and
Management
• Assign classification to all data
• Grant access to data based on
  classification and need
• Devise some method of managing data
  relative to classification



                CPSC375@UTC/CS          21
Security Clearances
• Security clearance structure: each data
  user assigned a single level of
  authorization indicating classification level
• Before accessing specific set of data,
  employee must meet need-to-know
  requirement
• Extra level of protection ensures
  information confidentiality is maintained
Potential Threats
Threat                            Example
Acts of human error or failure    Accidents, employee mistakes
Compromises to intellectual       Piracy, copyright infringement
property
Deliberate acts of espionage or   Unauthorized access and/or data
trespass                          collection
Deliberate acts of information    Blackmail or information
extortion                         disclosure
Deliberate acts of theft          Illegal confiscation of equipment
                                  or information

Deliberate acts of sabotage or    Destruction of systems or
vandalism                         information
Potential Threats
Categories of Threat                    Examples
Deliberate acts of software attacks     Viruses, worms, macros, denial-of-
                                        service
Forces of nature                        Fire, flood, earthquake, lightning

Deviations in quality of service        ISP, power, WAN service issues from
                                        service providers
Technical hardware failures or errors   Equipment failure

Technical software failures or errors   Bugs, code problems, unknown
                                        loopholes
Technological obsolescence              Antiquated or outdated technologies


                                                                             24
Threat Assessment
• Which threats present a danger to an
  organization’s assets?
• Which threats represent the most
  danger?
• How much would it cost to recover?
• Which threat requires the greatest
  expenditure to prevent?
                                     25
Vulnerability
Identification
• Identify each asset and each threat it
  faces
• Create a list of vulnerabilities
• Examine how each of the threats are
  likely to be perpetrated
Risk Assessment

• Risk assessment evaluates the
  relative risk for each vulnerability

• Assigns a risk rating or score to
  each information asset


                                         27
Risk Assessment
     likelihood of occurrence
                 *
  value of the information asset
                  -
         percent mitigated
                 +
             uncertainty
Probability Computation
• Assign number between 0.1 – 1
• Data is available for some factors
  – Likelihood of fire
  – Likelihood of receiving infected email
  – Number of network attacks


                                             29
Valuation of Information
Assets
Using info from asset identification
assign weighted score for the value.
  – 1 -100
  – 100 – stop company operations
  – May use broad categories
  – NIST has some predefined
                                       30
Risk Control Strategies
• Apply safeguards that eliminate or reduce
  residual risks (avoidance)
• Transfer the risk to other areas or outside
  entities (transference)
• Reduce the impact should the vulnerability be
  exploited (mitigation)
• Understand the consequences and accept the
  risk without control or mitigation (acceptance)

                                                    31
Mitigation
• When a vulnerability can be
  exploited -- apply layered
  protections, architectural designs,
  and administrative controls
• When attacker’s cost is less than
  potential gain -- apply protection to
  increase attackers costs
• When potential loss is substantial --
  redesign, new architecture, controls
Conclusion
“The goal of information security is not
to bring residual risk to zero; it is to
bring residual risk into line with an
organization’s comfort zone or risk
appetite”


                                           33

Mais conteúdo relacionado

Mais procurados

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...PECB
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Security and management
Security and managementSecurity and management
Security and managementArtiSolanki5
 
Information security
Information security Information security
Information security razendar79
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Human resources security
Human resources securityHuman resources security
Human resources securityCAS
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 

Mais procurados (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Security and management
Security and managementSecurity and management
Security and management
 
Information security
Information security Information security
Information security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
8. operations security
8. operations security8. operations security
8. operations security
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Information Security
Information SecurityInformation Security
Information Security
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 

Semelhante a MIS: Information Security Management

Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowkCura_Relativity
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxAbraraw Zerfu
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Knoldus Inc.
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxbakhtinasiriav
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaSee You Rise Holdings
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management ProgramTripwire
 

Semelhante a MIS: Information Security Management (20)

Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
ISAA PPt
ISAA PPtISAA PPt
ISAA PPt
 
Ch 1 assets
Ch 1 assetsCh 1 assets
Ch 1 assets
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptx
 
Intro.ppt
Intro.pptIntro.ppt
Intro.ppt
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
internet securityand cyber law Unit3 1
internet securityand  cyber law Unit3 1internet securityand  cyber law Unit3 1
internet securityand cyber law Unit3 1
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 

Mais de Jonathan Coleman

Mais de Jonathan Coleman (15)

MIS: Business Intelligence
MIS: Business IntelligenceMIS: Business Intelligence
MIS: Business Intelligence
 
MIS: Information Systems Development
MIS: Information Systems DevelopmentMIS: Information Systems Development
MIS: Information Systems Development
 
MIS: Information Systems Management
MIS: Information Systems ManagementMIS: Information Systems Management
MIS: Information Systems Management
 
MIS: Project Management Systems
MIS: Project Management SystemsMIS: Project Management Systems
MIS: Project Management Systems
 
MIS: Business Process Modeling (BPMN)
MIS: Business Process Modeling (BPMN)MIS: Business Process Modeling (BPMN)
MIS: Business Process Modeling (BPMN)
 
Online Branding
Online BrandingOnline Branding
Online Branding
 
Networks
NetworksNetworks
Networks
 
Business Internet
Business InternetBusiness Internet
Business Internet
 
Global Information Systems
Global Information SystemsGlobal Information Systems
Global Information Systems
 
Organizational Strategy
Organizational StrategyOrganizational Strategy
Organizational Strategy
 
Mis And You
Mis And YouMis And You
Mis And You
 
Database Management
Database ManagementDatabase Management
Database Management
 
Business processes
Business processesBusiness processes
Business processes
 
Hardware Systems
Hardware SystemsHardware Systems
Hardware Systems
 
Careers in MIS
Careers in MISCareers in MIS
Careers in MIS
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

MIS: Information Security Management

  • 2. The Elephant in the Server Room • Absolute security is a myth. • IS managers take the blame.
  • 3. Risk Management • Risk management: process of identifying and controlling risks facing an organization • Risk identification: process of examining an organization’s current information technology security situation • Risk control: applying controls to reduce risks to an organizations data and information systems 3
  • 4. Components of Risk Management Risk Management Risk Identification Risk Control Risk Assessment is the documented result of the risk identification process Selecting Strategy Inventorying Assets Justifying Controls Classifying Assets Identifying Threats & Vulnerabilities
  • 5. An Overview of Risk Management • Know yourself – Understand the technology and systems in your organization • Know the enemy – Identify, examine, understand threats • Role of Communities of Interest – Information Security – Management and Users – Information Technology 5
  • 6. Risk Identification • Assets are targets of various threats and threat agents • Risk management involves identifying organization’s assets and identifying threats/vulnerabilities • Risk identification begins with identifying organization’s assets and assessing their value 6
  • 7. 7
  • 8. Asset Identification and Valuation • List all elements of an organization’s system. • Classify and categorize assets. 8
  • 9. Table 4-1 - Categorizing Components & Valuation Asset Identification Traditional System SecSDLC and risk management system components Components People Employee Trusted employees Other staff Non-employees People at trusted organizations / Strangers Procedures Procedures IT & business standards procedures IT & business standards procedures Data Information Transmission, Processing, Storage Software Software Applications, Operating systems, Security components Hardware System devices and Systems and peripherals peripherals Security devices Networking components Intranet components Internet or DMZ components
  • 10. Data / People / Procedural Assets • Human resources, documentation, and data information assets are more difficult to identify • People with knowledge, experience, and good judgment should be assigned this task • These assets should be recorded using reliable data-handling process 10
  • 11. Hardware / Software / Network Assets • Name (device or program name) • IP address • Media access control (MAC) address • Element type – server, desktop, etc. Device Class, Device OS, Device Capacity 11
  • 12. Hardware / Software / Network Assets • serial number • manufacturer name; model/part number • software versions • physical or logical location • Software version, update revision
  • 13. Information Asset Classification • Many organizations have data classification schemes (e.g., confidential, internal, public data) • Classification must be specific enough to allow determination of priority • Comprehensive – all info fits in list somewhere • Mutually exclusive – fits in one place 13
  • 14. Information Asset Valuation • What is most critical to organization’s success? • What generates the most revenue? • What generates the most profit? • What would be most expensive to replace?
  • 15. Information Asset Valuation (continued) • What would be most expensive to protect? • What would be most embarrassing or cause the greatest liability is revealed?
  • 16. Figure 4-3 – Example Worksheet 16
  • 17. Listing Assets in Order of Importance • Weighted factor analysis • Each info asset assigned score for each critical factor (0.1 to 1.0) • Each critical factor is assigned a weight (1- 100) • Multiply and add
  • 18. Table 4-2 – Example Weighted Factor Analysis CPSC375@UTC/CS 18
  • 19. Data Classification and Management • Information owners responsible for classifying their information assets • Information classifications must be reviewed periodically • Most organizations do not need detailed level of classification used by military or federal agencies.
  • 20. Data Classification and Management • Organizations may need to classify data to provide protection – Public – For official use only – Sensitive – classified CPSC375@UTC/CS 20
  • 21. Data Classification and Management • Assign classification to all data • Grant access to data based on classification and need • Devise some method of managing data relative to classification CPSC375@UTC/CS 21
  • 22. Security Clearances • Security clearance structure: each data user assigned a single level of authorization indicating classification level • Before accessing specific set of data, employee must meet need-to-know requirement • Extra level of protection ensures information confidentiality is maintained
  • 23. Potential Threats Threat Example Acts of human error or failure Accidents, employee mistakes Compromises to intellectual Piracy, copyright infringement property Deliberate acts of espionage or Unauthorized access and/or data trespass collection Deliberate acts of information Blackmail or information extortion disclosure Deliberate acts of theft Illegal confiscation of equipment or information Deliberate acts of sabotage or Destruction of systems or vandalism information
  • 24. Potential Threats Categories of Threat Examples Deliberate acts of software attacks Viruses, worms, macros, denial-of- service Forces of nature Fire, flood, earthquake, lightning Deviations in quality of service ISP, power, WAN service issues from service providers Technical hardware failures or errors Equipment failure Technical software failures or errors Bugs, code problems, unknown loopholes Technological obsolescence Antiquated or outdated technologies 24
  • 25. Threat Assessment • Which threats present a danger to an organization’s assets? • Which threats represent the most danger? • How much would it cost to recover? • Which threat requires the greatest expenditure to prevent? 25
  • 26. Vulnerability Identification • Identify each asset and each threat it faces • Create a list of vulnerabilities • Examine how each of the threats are likely to be perpetrated
  • 27. Risk Assessment • Risk assessment evaluates the relative risk for each vulnerability • Assigns a risk rating or score to each information asset 27
  • 28. Risk Assessment likelihood of occurrence * value of the information asset - percent mitigated + uncertainty
  • 29. Probability Computation • Assign number between 0.1 – 1 • Data is available for some factors – Likelihood of fire – Likelihood of receiving infected email – Number of network attacks 29
  • 30. Valuation of Information Assets Using info from asset identification assign weighted score for the value. – 1 -100 – 100 – stop company operations – May use broad categories – NIST has some predefined 30
  • 31. Risk Control Strategies • Apply safeguards that eliminate or reduce residual risks (avoidance) • Transfer the risk to other areas or outside entities (transference) • Reduce the impact should the vulnerability be exploited (mitigation) • Understand the consequences and accept the risk without control or mitigation (acceptance) 31
  • 32. Mitigation • When a vulnerability can be exploited -- apply layered protections, architectural designs, and administrative controls • When attacker’s cost is less than potential gain -- apply protection to increase attackers costs • When potential loss is substantial -- redesign, new architecture, controls
  • 33. Conclusion “The goal of information security is not to bring residual risk to zero; it is to bring residual risk into line with an organization’s comfort zone or risk appetite” 33