SlideShare a Scribd company logo
1 of 19
Welingkar’s Distance Learning Division
I.T. for Management
CHAPTER-18
Information Security
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
IT Security, Control, Audit & governance
Information is Power is a very old adage in the IT sector.
In today’s world information is being increasingly
viewed as an Asset which has real value & is to be
protected
Accumulating information was once done more for
Statutory purposes. Today sophisticated data
warehouses are hold what may be considered as “gold
mine” of knowledge & data mining tools are available to
extract the right information at right time
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
Objectives of IT Security Management
The purpose of IT Security Management is to ensure:
• Confidentiality: Restricting access to right people for
the right purpose
• Integrity: Correctness& validity of information stored
or processed
• Availability: Ensuring information is available to
authorized persons
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
In almost every large enterprise, the physical and IT
security departments operate independently of
each other. They are generally unaware of the
strengths and weaknesses of one another's
practices, the liabilities of operating independently,
and the benefits of integrated security
management.
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
Physical Security and IT Security
Physical security focuses on the protection of physical
assets, personnel and facility structures. This involves
managing the flow of individuals and assets into, out of, and
within a facility. IT security focuses on the protection of
information resources, primarily computer and telephone
systems and their data networks. This involves managing the
flow of information into, out of, and within a facility’s IT
systems, including human access to information systems and
their networks. Clearly these two are separate domains.
Why should they be integrated?
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
Physical Security and IT Security a Management Issue
The question above accurately reflects the thoughts of most security
practitioners as they approach this subject. How is the question
misleading? To lean on a common idiom, it focuses on the trees rather
than the forest.
It is the management of physical and IT security that must be
integrated. No one is going to integrate a brick wall and a database.
However, the management of who is allowed inside the wall and inside
the database must be integrated, or there will be gaps in the
organization’s security. Figure 1 below illustrates the concept of
integrated security management. Whenever you hear or read the
phrase “integration of physical and IT security,” think “integration of
physical and IT security management” and you’ll be on the right track.
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
While it is true that many of the physical and IT security
processes and procedures must be integrated at the
technology level, it is not the technology that defines the
integration. The business processes and procedures define
it; the technology implements it. That's why the first step in
integrating physical and IT security is an examination of
security-related business requirements and the physical and
IT security processes that support them. The integration of
the business processes will determine where integration of
physical security and IT technology is required
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
We Learn – A Continuous Learning Forum
Types of control Examples
Physical
control
Doors & Lock, Security gates, raised floors, double
doors, ups system
IT related Password, Directory services, Firewall, antivirus
Application server, Hot standby server, backup of
software
Document
related
Correct labeling, version control, copies of key
documents
Application
Specific
Data validation so that correct data only accepted
Length, Range, Code checked
Process related checks
Output controls
Welingkar’s Distance Learning Division
Information Security Standards
BS 7799 Standard
The subject of IT security is therefore not one of merely putting
appropriate control measures
A process approach whereby the information security has
• Defined organizational policy
• Backed by management commitment
• Necessary resources, Defined procedures
• Appropriate control objectives
• Suitable control measures
• Recording & reviewing incidences
• Continuous improvement of security process
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security Standards
BS 7799 Standard
The BS7799 is a British standard which addresses precisely this aspect.
It provides a comprehensive framework within which an organization
can set up an effective Information Security Management System(ISMS)
More specifically some of controls objectives which it describes include
following
• Management of ISMS
• Physical security
• Information processing
• Access to information to IT employees, outsourced vendors
• Access from remote location
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security Standards
BS 7799 Standard
To implement the BS7799 standard an organization must take
following steps.
Define Information security policy
Organization & its management must demonstrate its
commitment to information There must be formal reviews
related with security incidents
Risk assessment. The organization must conduct risk assessment.
This will help to identify the more important sources of risk. It
would select from the following strategies
Risk avoidance, Migration, Insurance or transfer Assumption of
risk Cont…..
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security Standards
BS 7799 Standard
• Based on the strategy decided for each risk asset combination
it will select appropriate control to manage the risk.
• For instance to prevent unauthorized entry it may provide
smart card or biometric entry
• The organization would have also identified detailed
procedure for implementing and monitoring ,defined roles
various controls, Dos & don’t to all employees
• Finally process needs to be sustained & continuously
evaluated
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security Standards
Business Continuity Planning (BCP)
Availability is one of the key elements in the information
security. Failure in IT for e.g incidents like power failure, Virus
attack can be disastrous
Organizations such as the stock exchange or a bank works
on a Central data center. BCP outlines:
The Objective of plan in event of disaster
The resources
Priorities assigned for Business continuity
Procedures to follow in the event of disaster
Communication to outsider
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security Standards
Business Continuity Planning (BCP)
The BCP ensures that certain critical business functions continue
despite a disaster
The BCP also can be viewed from point of 3 stages
• Pre-disaster
• During the disaster
• Post disaster
Thus each procedure should cover these three stages
Disaster Recovery is a set of plans to enable an organization to
come back to normalcy
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security Standards
Business Continuity Planning (BCP)
Disaster Recovery
The time frame within which the recovery must happen
is a matter of practicality & organizations policy.
Solutions used for BCP
We Learn – A Continuous Learning Forum
Hard disk crash RAID Arrays Mirror disk
SAN/NAS solution
Complete data center crippled Hot remote site e.g. NSE has a hot site at
Pune, which take over if Mumbai center fails
Telecom/ISP crashes Have a leased line from more than one ISP
Welingkar’s Distance Learning Division
Information Security Standards
Business Continuity Planning (BCP)
The choice of solution depends upon the perceived
impact of the disaster on business continuity
Most of the times the BCP/DR misses out on Mock Drills
This can be best done thru simulation by generating a
disaster conditions thereby enabling & training people
to understand individual role at the time of disaster &
specific actions to be taken
We Learn – A Continuous Learning Forum
Welingkar’s Distance Learning Division
Information Security
End of Chapter 18
We Learn – A Continuous Learning Forum

More Related Content

What's hot

Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards ComplianceDr. Prashant Vats
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Security policy and standards
Security policy and standardsSecurity policy and standards
Security policy and standardsWilson Musyoka
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Types & Fundamentals of Information System
Types & Fundamentals of Information SystemTypes & Fundamentals of Information System
Types & Fundamentals of Information SystemAwais Mansoor Chohan
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 

What's hot (20)

Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Security policy and standards
Security policy and standardsSecurity policy and standards
Security policy and standards
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
8. operations security
8. operations security8. operations security
8. operations security
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Types & Fundamentals of Information System
Types & Fundamentals of Information SystemTypes & Fundamentals of Information System
Types & Fundamentals of Information System
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Information security
Information securityInformation security
Information security
 

Viewers also liked

NComputing - A brief overview
NComputing - A brief overviewNComputing - A brief overview
NComputing - A brief overviewNkosinathi Lungu
 
Project ISR- May 15, 2016
Project ISR- May 15, 2016Project ISR- May 15, 2016
Project ISR- May 15, 2016Ravindra Thapa
 
За лучший офис риэлторской компании. Конкурс «Грани успеха - 2010».
За лучший офис риэлторской компании. Конкурс «Грани успеха - 2010». За лучший офис риэлторской компании. Конкурс «Грани успеха - 2010».
За лучший офис риэлторской компании. Конкурс «Грани успеха - 2010». metrosphera
 
Why School Should Use Linux
Why School Should Use LinuxWhy School Should Use Linux
Why School Should Use LinuxMohammedSharafi
 
Paula Howard - Professional Persona Project
Paula Howard - Professional Persona ProjectPaula Howard - Professional Persona Project
Paula Howard - Professional Persona ProjectPaula‎ Howard
 
Inkt op het scherm
Inkt op het schermInkt op het scherm
Inkt op het schermFARO
 
Ist.Santo Domingo
Ist.Santo DomingoIst.Santo Domingo
Ist.Santo Domingojuan cherre
 
Dietary Issues in Primary Care
Dietary Issues in Primary CareDietary Issues in Primary Care
Dietary Issues in Primary CareDiane Williams
 
Fel Flyer F11
Fel Flyer F11Fel Flyer F11
Fel Flyer F11chitlesh
 
Retail summit 2017 01-acomware-klega
Retail summit 2017 01-acomware-klegaRetail summit 2017 01-acomware-klega
Retail summit 2017 01-acomware-klegaACOMWARE s.r.o.
 
Stop the Ridiculous Practice of Food & Beverage Minimums
Stop the Ridiculous Practice of Food & Beverage MinimumsStop the Ridiculous Practice of Food & Beverage Minimums
Stop the Ridiculous Practice of Food & Beverage MinimumsCG Mark
 
Availability & access of e resources in au
Availability & access of e resources in auAvailability & access of e resources in au
Availability & access of e resources in auKishor Satpathy
 
Internet raffaella valluzzi
Internet raffaella valluzziInternet raffaella valluzzi
Internet raffaella valluzzimarianavigato0
 
Wikiconference 2016 talk Burgstaller
Wikiconference 2016 talk BurgstallerWikiconference 2016 talk Burgstaller
Wikiconference 2016 talk Burgstallersebotic
 

Viewers also liked (19)

I.T project challenges
I.T project challengesI.T project challenges
I.T project challenges
 
NComputing - A brief overview
NComputing - A brief overviewNComputing - A brief overview
NComputing - A brief overview
 
Project ISR- May 15, 2016
Project ISR- May 15, 2016Project ISR- May 15, 2016
Project ISR- May 15, 2016
 
За лучший офис риэлторской компании. Конкурс «Грани успеха - 2010».
За лучший офис риэлторской компании. Конкурс «Грани успеха - 2010». За лучший офис риэлторской компании. Конкурс «Грани успеха - 2010».
За лучший офис риэлторской компании. Конкурс «Грани успеха - 2010».
 
Why School Should Use Linux
Why School Should Use LinuxWhy School Should Use Linux
Why School Should Use Linux
 
Paula Howard - Professional Persona Project
Paula Howard - Professional Persona ProjectPaula Howard - Professional Persona Project
Paula Howard - Professional Persona Project
 
Inkt op het scherm
Inkt op het schermInkt op het scherm
Inkt op het scherm
 
Action movie
Action movieAction movie
Action movie
 
Ist.Santo Domingo
Ist.Santo DomingoIst.Santo Domingo
Ist.Santo Domingo
 
Dietary Issues in Primary Care
Dietary Issues in Primary CareDietary Issues in Primary Care
Dietary Issues in Primary Care
 
slideshare
slideshareslideshare
slideshare
 
Fel Flyer F11
Fel Flyer F11Fel Flyer F11
Fel Flyer F11
 
Zing
ZingZing
Zing
 
Retail summit 2017 01-acomware-klega
Retail summit 2017 01-acomware-klegaRetail summit 2017 01-acomware-klega
Retail summit 2017 01-acomware-klega
 
Extensiones
ExtensionesExtensiones
Extensiones
 
Stop the Ridiculous Practice of Food & Beverage Minimums
Stop the Ridiculous Practice of Food & Beverage MinimumsStop the Ridiculous Practice of Food & Beverage Minimums
Stop the Ridiculous Practice of Food & Beverage Minimums
 
Availability & access of e resources in au
Availability & access of e resources in auAvailability & access of e resources in au
Availability & access of e resources in au
 
Internet raffaella valluzzi
Internet raffaella valluzziInternet raffaella valluzzi
Internet raffaella valluzzi
 
Wikiconference 2016 talk Burgstaller
Wikiconference 2016 talk BurgstallerWikiconference 2016 talk Burgstaller
Wikiconference 2016 talk Burgstaller
 

Similar to Information Security - I.T Project Management

CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Md Shaifullar Rabbi
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysislearfield
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1Anne Starr
 

Similar to Information Security - I.T Project Management (20)

Information Security
Information SecurityInformation Security
Information Security
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Topic11
Topic11Topic11
Topic11
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Role management
Role managementRole management
Role management
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 

More from We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program.

More from We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program. (20)

PGDM in Supply Chain Management
PGDM in Supply Chain ManagementPGDM in Supply Chain Management
PGDM in Supply Chain Management
 
PGDM in Rural & Agribusiness Management
PGDM in Rural & Agribusiness ManagementPGDM in Rural & Agribusiness Management
PGDM in Rural & Agribusiness Management
 
PGDM in E-Commerce Management
PGDM in E-Commerce ManagementPGDM in E-Commerce Management
PGDM in E-Commerce Management
 
PGDM in Service Excellence
PGDM in Service ExcellencePGDM in Service Excellence
PGDM in Service Excellence
 
PGDM in International Management
PGDM in International ManagementPGDM in International Management
PGDM in International Management
 
PGDM in IT Project Management
PGDM in IT Project ManagementPGDM in IT Project Management
PGDM in IT Project Management
 
Distance Learning PGDM in E-Business Management
Distance Learning PGDM in E-Business ManagementDistance Learning PGDM in E-Business Management
Distance Learning PGDM in E-Business Management
 
Distance Learning PGDM in Business Administration
Distance Learning PGDM in Business AdministrationDistance Learning PGDM in Business Administration
Distance Learning PGDM in Business Administration
 
PGDM in Finance Management
PGDM in Finance ManagementPGDM in Finance Management
PGDM in Finance Management
 
PGDM in Marketing Management
PGDM in Marketing ManagementPGDM in Marketing Management
PGDM in Marketing Management
 
PGDM in Operation Management
PGDM in Operation ManagementPGDM in Operation Management
PGDM in Operation Management
 
Marketing Management
Marketing ManagementMarketing Management
Marketing Management
 
PGDM in Media & Advertising
PGDM in Media & AdvertisingPGDM in Media & Advertising
PGDM in Media & Advertising
 
We School HR Management
We School HR ManagementWe School HR Management
We School HR Management
 
WE SCHOOL TRAVEL & TOURISM MANAGEMENT
WE SCHOOL TRAVEL & TOURISM MANAGEMENTWE SCHOOL TRAVEL & TOURISM MANAGEMENT
WE SCHOOL TRAVEL & TOURISM MANAGEMENT
 
Personal budgeting
Personal budgetingPersonal budgeting
Personal budgeting
 
Maintaining the financial health of businesses through financial accounting
Maintaining the financial health of businesses through financial accountingMaintaining the financial health of businesses through financial accounting
Maintaining the financial health of businesses through financial accounting
 
Asset Management Case Sstudy
Asset Management  Case SstudyAsset Management  Case Sstudy
Asset Management Case Sstudy
 
Team management’ scored on the football
Team management’ scored on the footballTeam management’ scored on the football
Team management’ scored on the football
 
Mc donalds Recruitment Case Study
Mc donalds Recruitment Case StudyMc donalds Recruitment Case Study
Mc donalds Recruitment Case Study
 

Recently uploaded

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 

Recently uploaded (20)

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 

Information Security - I.T Project Management

  • 1. Welingkar’s Distance Learning Division I.T. for Management CHAPTER-18 Information Security We Learn – A Continuous Learning Forum
  • 2. Welingkar’s Distance Learning Division Information Security IT Security, Control, Audit & governance Information is Power is a very old adage in the IT sector. In today’s world information is being increasingly viewed as an Asset which has real value & is to be protected Accumulating information was once done more for Statutory purposes. Today sophisticated data warehouses are hold what may be considered as “gold mine” of knowledge & data mining tools are available to extract the right information at right time We Learn – A Continuous Learning Forum
  • 3. Welingkar’s Distance Learning Division Information Security Objectives of IT Security Management The purpose of IT Security Management is to ensure: • Confidentiality: Restricting access to right people for the right purpose • Integrity: Correctness& validity of information stored or processed • Availability: Ensuring information is available to authorized persons We Learn – A Continuous Learning Forum
  • 4. Welingkar’s Distance Learning Division Information Security In almost every large enterprise, the physical and IT security departments operate independently of each other. They are generally unaware of the strengths and weaknesses of one another's practices, the liabilities of operating independently, and the benefits of integrated security management. We Learn – A Continuous Learning Forum
  • 5. Welingkar’s Distance Learning Division Information Security Physical Security and IT Security Physical security focuses on the protection of physical assets, personnel and facility structures. This involves managing the flow of individuals and assets into, out of, and within a facility. IT security focuses on the protection of information resources, primarily computer and telephone systems and their data networks. This involves managing the flow of information into, out of, and within a facility’s IT systems, including human access to information systems and their networks. Clearly these two are separate domains. Why should they be integrated? We Learn – A Continuous Learning Forum
  • 6. Welingkar’s Distance Learning Division Information Security Physical Security and IT Security a Management Issue The question above accurately reflects the thoughts of most security practitioners as they approach this subject. How is the question misleading? To lean on a common idiom, it focuses on the trees rather than the forest. It is the management of physical and IT security that must be integrated. No one is going to integrate a brick wall and a database. However, the management of who is allowed inside the wall and inside the database must be integrated, or there will be gaps in the organization’s security. Figure 1 below illustrates the concept of integrated security management. Whenever you hear or read the phrase “integration of physical and IT security,” think “integration of physical and IT security management” and you’ll be on the right track. We Learn – A Continuous Learning Forum
  • 7. Welingkar’s Distance Learning Division Information Security We Learn – A Continuous Learning Forum
  • 8. Welingkar’s Distance Learning Division Information Security While it is true that many of the physical and IT security processes and procedures must be integrated at the technology level, it is not the technology that defines the integration. The business processes and procedures define it; the technology implements it. That's why the first step in integrating physical and IT security is an examination of security-related business requirements and the physical and IT security processes that support them. The integration of the business processes will determine where integration of physical security and IT technology is required We Learn – A Continuous Learning Forum
  • 9. Welingkar’s Distance Learning Division Information Security We Learn – A Continuous Learning Forum
  • 10. Welingkar’s Distance Learning Division Information Security We Learn – A Continuous Learning Forum Types of control Examples Physical control Doors & Lock, Security gates, raised floors, double doors, ups system IT related Password, Directory services, Firewall, antivirus Application server, Hot standby server, backup of software Document related Correct labeling, version control, copies of key documents Application Specific Data validation so that correct data only accepted Length, Range, Code checked Process related checks Output controls
  • 11. Welingkar’s Distance Learning Division Information Security Standards BS 7799 Standard The subject of IT security is therefore not one of merely putting appropriate control measures A process approach whereby the information security has • Defined organizational policy • Backed by management commitment • Necessary resources, Defined procedures • Appropriate control objectives • Suitable control measures • Recording & reviewing incidences • Continuous improvement of security process We Learn – A Continuous Learning Forum
  • 12. Welingkar’s Distance Learning Division Information Security Standards BS 7799 Standard The BS7799 is a British standard which addresses precisely this aspect. It provides a comprehensive framework within which an organization can set up an effective Information Security Management System(ISMS) More specifically some of controls objectives which it describes include following • Management of ISMS • Physical security • Information processing • Access to information to IT employees, outsourced vendors • Access from remote location We Learn – A Continuous Learning Forum
  • 13. Welingkar’s Distance Learning Division Information Security Standards BS 7799 Standard To implement the BS7799 standard an organization must take following steps. Define Information security policy Organization & its management must demonstrate its commitment to information There must be formal reviews related with security incidents Risk assessment. The organization must conduct risk assessment. This will help to identify the more important sources of risk. It would select from the following strategies Risk avoidance, Migration, Insurance or transfer Assumption of risk Cont….. We Learn – A Continuous Learning Forum
  • 14. Welingkar’s Distance Learning Division Information Security Standards BS 7799 Standard • Based on the strategy decided for each risk asset combination it will select appropriate control to manage the risk. • For instance to prevent unauthorized entry it may provide smart card or biometric entry • The organization would have also identified detailed procedure for implementing and monitoring ,defined roles various controls, Dos & don’t to all employees • Finally process needs to be sustained & continuously evaluated We Learn – A Continuous Learning Forum
  • 15. Welingkar’s Distance Learning Division Information Security Standards Business Continuity Planning (BCP) Availability is one of the key elements in the information security. Failure in IT for e.g incidents like power failure, Virus attack can be disastrous Organizations such as the stock exchange or a bank works on a Central data center. BCP outlines: The Objective of plan in event of disaster The resources Priorities assigned for Business continuity Procedures to follow in the event of disaster Communication to outsider We Learn – A Continuous Learning Forum
  • 16. Welingkar’s Distance Learning Division Information Security Standards Business Continuity Planning (BCP) The BCP ensures that certain critical business functions continue despite a disaster The BCP also can be viewed from point of 3 stages • Pre-disaster • During the disaster • Post disaster Thus each procedure should cover these three stages Disaster Recovery is a set of plans to enable an organization to come back to normalcy We Learn – A Continuous Learning Forum
  • 17. Welingkar’s Distance Learning Division Information Security Standards Business Continuity Planning (BCP) Disaster Recovery The time frame within which the recovery must happen is a matter of practicality & organizations policy. Solutions used for BCP We Learn – A Continuous Learning Forum Hard disk crash RAID Arrays Mirror disk SAN/NAS solution Complete data center crippled Hot remote site e.g. NSE has a hot site at Pune, which take over if Mumbai center fails Telecom/ISP crashes Have a leased line from more than one ISP
  • 18. Welingkar’s Distance Learning Division Information Security Standards Business Continuity Planning (BCP) The choice of solution depends upon the perceived impact of the disaster on business continuity Most of the times the BCP/DR misses out on Mock Drills This can be best done thru simulation by generating a disaster conditions thereby enabling & training people to understand individual role at the time of disaster & specific actions to be taken We Learn – A Continuous Learning Forum
  • 19. Welingkar’s Distance Learning Division Information Security End of Chapter 18 We Learn – A Continuous Learning Forum