SlideShare uma empresa Scribd logo
1 de 23
SECURITY MANAGEMENT
CONCEPTS AND PRINCIPLES
SECURITY & RISK MANAGEMENT
MODULE 5
DIVYA TIWARI
MEIT
TERNA ENGINEERING COLLEGE
INTRODUCTION
• Security management concepts and principles are inherent elements in a security policy and
solution deployment.
• They define the basic parameters needed for a secure environment.
• They also define the goals and objectives that both policy designers and system
implementers must achieve to create a secure solution. It is important for real-world
security professionals.
• The primary goals and objectives of security are contained within the CIA Triad, which is
the name given to the three primary security principles:
1. Confidentiality
2. Integrity
3. Availability
• A complete security solution should adequately address each of these tenets.
• Vulnerabilities and risks are also evaluated based on the threat they pose against one or
more of the CIA Triad principles.
• Thus, it is a good idea to be familiar with these principles and use them as guidelines for
judging all things related to security.
MEASURING ROI ON SECURITY
• Future security system improvements showing the return on investment (ROI) is one of the
most important tools you must show the need for system improvements.
• The return on investment calculation will compare the net benefits of a project to total
project costs.
• The benefits to a new system can be obvious- the improved safety for building occupants
and improved security for company assets.
• To prepare a ROI case for your security project the first step is to collect data to show the
costs and benefits for the proposed system.
• What are the costs of the project?
• The cost of not doing the project. What happens in the organization if you do not
implement the upgrades?
• After collecting all of the costs it is time to focus on the benefits. Benefits of a security
system upgrade can be direct or indirect.
• Once you have compiled all the cost and benefit information it is time to calculate the
return on investment.
ROI = (
𝑩𝒆𝒏𝒆𝒇𝒊𝒕 𝒂𝒇𝒕𝒆𝒓 𝑺𝒆𝒄𝒖𝒓𝒊𝒕𝒚 𝑰𝒏𝒗𝒆𝒔𝒕𝒎𝒆𝒏𝒕 −𝑪𝒐𝒔𝒕 𝒐𝒇 𝑰𝒏𝒗𝒆𝒔𝒕𝒎𝒆𝒏𝒕
𝑪𝒐𝒔𝒕 𝒐𝒇 𝑰𝒏𝒗𝒆𝒔𝒕𝒎𝒆𝒏𝒕
) x 100
SECURITY PATCH MANAGEMENT
• Security patches protect the security of devices and the data on them by applying the latest
updates that respond to the latest threats.
• In software engineering a patch refers to small adjustments to the code of software.
• Patch updates one component of the software to fix a bug or error discovered after product
release.
• Security patches address vulnerabilities in the software cybercriminals might use to gain
unauthorized access to device and data.
• Security patches for the operating system (OS) of device like Windows, iOS, Android are
crucial because an OS vulnerability can have far-reaching implications.
• For individuals and their devices, effective patch management can be as simple as turning
on automatic updates.
• Google and Apple, for example, make it easy to have smartphone manage the work of
keeping the OS and all of your apps patched to the most recent version.
• To check Android device’s security patch level, Google offers an easy online tool.
• For organizations, patch management they need to oversee a wide range of equipment,
often in different locations.
• A patch that requires time to install may also interrupt the functioning of the device, so it’s
vital to plan the timing of patches around the schedules of the people using the device.
• For systems that need to operate 24/7, patching is not an easy process.
Importance of Patch Management
1.Reduce exposure to cyberattacks
1.Avoid lost productivity
1.Protect your data
1.Protect customer data
1.Protect others on your network
PURPOSE OF INFORMATION SECURITY
MANAGEMENT
• The purpose of the information security management process is to align IT security with
business security and ensure that the confidentiality, integrity and availability of the
organization’s assets, information, data and IT services always matches the agreed needs of
the business.
• The Objectives of Information security management are:
1. Protect the interests of those relying on information.
2. Protect the systems and communications that deliver the information.
BUILDING BLOCKS OF INFORMATION
SECURITY
• Encryption: Modification of data for security reasons prior to their transmissions so that it
is not comprehensible without the decoding method.
• Cipher: Cryptographic transformation that operates on characters or bits of data.
• Cryptanalysis: Methods to break the cipher so that encrypted message can be read.
• Electronic Signature: Process that operates on a message to assure message source
authenticity, integrity and non-repudiation.
• Non-Repudiation: Methods by which the transmitted data is tagged with sender’s identity
as a proof so neither can deny the transmission.
• Steganography: Method of hiding the existence of data. The bit map images are regularly
used to transmit hidden messages.
• Identification: It is a method by which a user claims his identity to a system.
• Authentication: It is the method by which a system verifies the identity of a user or
another system.
• Accountability: It is the method by which a system tracks the actions performed by a user
or a process.
• Authorization: It is a method by which a system grants certain permissions to a user.
• Privacy: It is protection on individual data and information.
OVERVIEW OF SSE CMM
• The Systems Security Engineering Capability Maturity Model (SSE-CMM) describes
the essential characteristics of an organization’s security engineering process that must
exist to ensure good security engineering.
• The model is a standard metric for security engineering practices covering:
1. The entire life cycle, including development, operation, maintenance, and
decommissioning activities.
2. The whole organization, including management, organizational, and engineering
activities.
3. Concurrent interactions with other disciplines, such as system, software, hardware,
human factors, and test engineering; system management, operation, and
maintenance.
4. Interactions with other organizations, including acquisition, system management,
certification, accreditation, and evaluation.
• The objective of the SSE-CMM Project is to advance security engineering as a defined,
mature, and measurable discipline.
• The SSE-CMM model and appraisal methods are being developed to enable:
1. Focused investments in security engineering tools, training, process definition,
management practices, and improvements by engineering groups.
2. Capability-based assurance, that is, trustworthiness based on confidence in the
maturity of an engineering group’s security practices and processes.
3. Selection of appropriately qualified providers of security engineering through
differentiating bidders by capability levels and associated programmatic risks.
• The scope of the SSE-CMM encompasses the following:
1. The SSE-CMM addresses security engineering activities that span the entire trusted
product or secure system life cycle, including concept definition, requirements analysis,
design, development, integration, installation, operations, maintenance, and
decommissioning.
2. The SSE-CMM applies to secure product developers, secure system developers and
integrators, and organizations that provide security services and security engineering.
3. The SSE-CMM applies to all types and sizes of security engineering organizations, such
as commercial, government, and academic.
Benefits of using
SSE-CMM
To Engineering Organizations To Acquiring Organizations To Evaluation Organizations
SSE-CMM RELATIONSHIP TO OTHER
INITIATIVES
CAPABILITY LEVELS
• Capability Level 1 – Performed Informally
• Capability Level 2 – Planned and Tracked
• Capability Level 3 – Well Defined
• Capability Level 4 – Quantitatively Controlled
• Capability Level 5 – Continuously Improving
SECURITY ENGINEERING PROCESS
OVERVIEW
Security Engineering Process has three main areas
Risk
security risk process involves threats, vulnerabilities and impact
Engineering
security is an integral part of the overall engineering process
Assurance
Assurance process builds an argument establishing confidence
CONFIGURATION MANAGEMENT
• An information system infrastructure is a complex and evolving system.
• Changes to the system affect its ability to effectively enforce the security policies and
therefore protect the organization’s assets.
• The process of managing the changes to the system and its components is referred to as
configuration management.
• Configuration management is the process of identifying configuration items, controlling
their storage, controlling change to configuration items, and reporting on their status.
1. Configuration Items—Configuration items (CIs) are unique work products that are
individually controlled, tracked, and reported on.
2. CI Protection—Configuration items must be protected from unauthorized changes.
Without protection of the CIs, a configuration management system cannot function.
3. Change Control—There must exist a process by which changes to configuration items
are reviewed, approved, and controlled.
4. Status Reporting—Configuration management systems must be able to report the status
of any configuration item and its history of changes. Moreover, the reporting feature
must be capable of generating a version of the system based on the correct version of
each of the configuration items.
CONFIGURATION MANAGEMENT
FRAMEWORK
MU Exam Questions
May 2017
• Give a brief overview of the SSE-CMM maturity model. 10 marks
Dec 2017
• Explain role of configuration management in security of an organization. Give the
configuration management framework. 10 marks
May 2018
• What is security engineering? Give a brief overview of the SSE-CMM model. 10 marks
• Discuss role of Configuration Management in the security of an organization. 10 marks
Dec 2018
• Discuss role of CM in the security of an organization. 10 marks
May 2019
• Explain role of configuration management in security of an organization. Give the
configuration management framework. 10 marks
Security management concepts and principles

Mais conteúdo relacionado

Mais procurados (20)

Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Information security
Information securityInformation security
Information security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources Security
 
Physical security
Physical securityPhysical security
Physical security
 
03 cia
03 cia03 cia
03 cia
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Security policies
Security policiesSecurity policies
Security policies
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 

Semelhante a Security management concepts and principles

Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptxdotco
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...IJCSIS Research Publications
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docxoswald1horne84988
 
Security
SecuritySecurity
Securitya1aass
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentortmbainjr131
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMuhammad Asim
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsIRJET Journal
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2 Jayant Dalvi
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 

Semelhante a Security management concepts and principles (20)

Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
Security
SecuritySecurity
Security
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
E1804012536
E1804012536E1804012536
E1804012536
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 

Mais de Divya Tiwari

Digital stick by Divya & Kanti
Digital stick by Divya & KantiDigital stick by Divya & Kanti
Digital stick by Divya & KantiDivya Tiwari
 
Predicting house price
Predicting house pricePredicting house price
Predicting house priceDivya Tiwari
 
Testing strategies -2
Testing strategies -2Testing strategies -2
Testing strategies -2Divya Tiwari
 
Testing strategies part -1
Testing strategies part -1Testing strategies part -1
Testing strategies part -1Divya Tiwari
 
Performance measures
Performance measuresPerformance measures
Performance measuresDivya Tiwari
 
Programming using MPI and OpenMP
Programming using MPI and OpenMPProgramming using MPI and OpenMP
Programming using MPI and OpenMPDivya Tiwari
 
IoT applications and use cases part-2
IoT applications and use cases part-2IoT applications and use cases part-2
IoT applications and use cases part-2Divya Tiwari
 
Io t applications and use cases part-1
Io t applications and use cases part-1Io t applications and use cases part-1
Io t applications and use cases part-1Divya Tiwari
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Responsive web design with html5 and css3
Responsive web design with html5 and css3Responsive web design with html5 and css3
Responsive web design with html5 and css3Divya Tiwari
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 

Mais de Divya Tiwari (13)

Digital stick by Divya & Kanti
Digital stick by Divya & KantiDigital stick by Divya & Kanti
Digital stick by Divya & Kanti
 
Predicting house price
Predicting house pricePredicting house price
Predicting house price
 
Testing strategies -2
Testing strategies -2Testing strategies -2
Testing strategies -2
 
Testing strategies part -1
Testing strategies part -1Testing strategies part -1
Testing strategies part -1
 
Performance measures
Performance measuresPerformance measures
Performance measures
 
Programming using MPI and OpenMP
Programming using MPI and OpenMPProgramming using MPI and OpenMP
Programming using MPI and OpenMP
 
IoT applications and use cases part-2
IoT applications and use cases part-2IoT applications and use cases part-2
IoT applications and use cases part-2
 
Io t applications and use cases part-1
Io t applications and use cases part-1Io t applications and use cases part-1
Io t applications and use cases part-1
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Web services
Web servicesWeb services
Web services
 
Responsive web design with html5 and css3
Responsive web design with html5 and css3Responsive web design with html5 and css3
Responsive web design with html5 and css3
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 

Último

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Último (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

Security management concepts and principles

  • 1. SECURITY MANAGEMENT CONCEPTS AND PRINCIPLES SECURITY & RISK MANAGEMENT MODULE 5 DIVYA TIWARI MEIT TERNA ENGINEERING COLLEGE
  • 2. INTRODUCTION • Security management concepts and principles are inherent elements in a security policy and solution deployment. • They define the basic parameters needed for a secure environment. • They also define the goals and objectives that both policy designers and system implementers must achieve to create a secure solution. It is important for real-world security professionals. • The primary goals and objectives of security are contained within the CIA Triad, which is the name given to the three primary security principles: 1. Confidentiality 2. Integrity 3. Availability • A complete security solution should adequately address each of these tenets. • Vulnerabilities and risks are also evaluated based on the threat they pose against one or more of the CIA Triad principles. • Thus, it is a good idea to be familiar with these principles and use them as guidelines for judging all things related to security.
  • 3. MEASURING ROI ON SECURITY • Future security system improvements showing the return on investment (ROI) is one of the most important tools you must show the need for system improvements. • The return on investment calculation will compare the net benefits of a project to total project costs. • The benefits to a new system can be obvious- the improved safety for building occupants and improved security for company assets. • To prepare a ROI case for your security project the first step is to collect data to show the costs and benefits for the proposed system. • What are the costs of the project? • The cost of not doing the project. What happens in the organization if you do not implement the upgrades? • After collecting all of the costs it is time to focus on the benefits. Benefits of a security system upgrade can be direct or indirect.
  • 4. • Once you have compiled all the cost and benefit information it is time to calculate the return on investment. ROI = ( 𝑩𝒆𝒏𝒆𝒇𝒊𝒕 𝒂𝒇𝒕𝒆𝒓 𝑺𝒆𝒄𝒖𝒓𝒊𝒕𝒚 𝑰𝒏𝒗𝒆𝒔𝒕𝒎𝒆𝒏𝒕 −𝑪𝒐𝒔𝒕 𝒐𝒇 𝑰𝒏𝒗𝒆𝒔𝒕𝒎𝒆𝒏𝒕 𝑪𝒐𝒔𝒕 𝒐𝒇 𝑰𝒏𝒗𝒆𝒔𝒕𝒎𝒆𝒏𝒕 ) x 100
  • 5. SECURITY PATCH MANAGEMENT • Security patches protect the security of devices and the data on them by applying the latest updates that respond to the latest threats. • In software engineering a patch refers to small adjustments to the code of software. • Patch updates one component of the software to fix a bug or error discovered after product release. • Security patches address vulnerabilities in the software cybercriminals might use to gain unauthorized access to device and data. • Security patches for the operating system (OS) of device like Windows, iOS, Android are crucial because an OS vulnerability can have far-reaching implications. • For individuals and their devices, effective patch management can be as simple as turning on automatic updates. • Google and Apple, for example, make it easy to have smartphone manage the work of keeping the OS and all of your apps patched to the most recent version.
  • 6. • To check Android device’s security patch level, Google offers an easy online tool. • For organizations, patch management they need to oversee a wide range of equipment, often in different locations. • A patch that requires time to install may also interrupt the functioning of the device, so it’s vital to plan the timing of patches around the schedules of the people using the device. • For systems that need to operate 24/7, patching is not an easy process. Importance of Patch Management 1.Reduce exposure to cyberattacks 1.Avoid lost productivity 1.Protect your data 1.Protect customer data 1.Protect others on your network
  • 7. PURPOSE OF INFORMATION SECURITY MANAGEMENT • The purpose of the information security management process is to align IT security with business security and ensure that the confidentiality, integrity and availability of the organization’s assets, information, data and IT services always matches the agreed needs of the business. • The Objectives of Information security management are: 1. Protect the interests of those relying on information. 2. Protect the systems and communications that deliver the information.
  • 8. BUILDING BLOCKS OF INFORMATION SECURITY • Encryption: Modification of data for security reasons prior to their transmissions so that it is not comprehensible without the decoding method. • Cipher: Cryptographic transformation that operates on characters or bits of data. • Cryptanalysis: Methods to break the cipher so that encrypted message can be read. • Electronic Signature: Process that operates on a message to assure message source authenticity, integrity and non-repudiation. • Non-Repudiation: Methods by which the transmitted data is tagged with sender’s identity as a proof so neither can deny the transmission. • Steganography: Method of hiding the existence of data. The bit map images are regularly used to transmit hidden messages. • Identification: It is a method by which a user claims his identity to a system.
  • 9. • Authentication: It is the method by which a system verifies the identity of a user or another system. • Accountability: It is the method by which a system tracks the actions performed by a user or a process. • Authorization: It is a method by which a system grants certain permissions to a user. • Privacy: It is protection on individual data and information.
  • 10. OVERVIEW OF SSE CMM • The Systems Security Engineering Capability Maturity Model (SSE-CMM) describes the essential characteristics of an organization’s security engineering process that must exist to ensure good security engineering. • The model is a standard metric for security engineering practices covering: 1. The entire life cycle, including development, operation, maintenance, and decommissioning activities. 2. The whole organization, including management, organizational, and engineering activities. 3. Concurrent interactions with other disciplines, such as system, software, hardware, human factors, and test engineering; system management, operation, and maintenance. 4. Interactions with other organizations, including acquisition, system management, certification, accreditation, and evaluation.
  • 11. • The objective of the SSE-CMM Project is to advance security engineering as a defined, mature, and measurable discipline. • The SSE-CMM model and appraisal methods are being developed to enable: 1. Focused investments in security engineering tools, training, process definition, management practices, and improvements by engineering groups. 2. Capability-based assurance, that is, trustworthiness based on confidence in the maturity of an engineering group’s security practices and processes. 3. Selection of appropriately qualified providers of security engineering through differentiating bidders by capability levels and associated programmatic risks. • The scope of the SSE-CMM encompasses the following: 1. The SSE-CMM addresses security engineering activities that span the entire trusted product or secure system life cycle, including concept definition, requirements analysis, design, development, integration, installation, operations, maintenance, and decommissioning. 2. The SSE-CMM applies to secure product developers, secure system developers and integrators, and organizations that provide security services and security engineering.
  • 12. 3. The SSE-CMM applies to all types and sizes of security engineering organizations, such as commercial, government, and academic. Benefits of using SSE-CMM To Engineering Organizations To Acquiring Organizations To Evaluation Organizations
  • 13. SSE-CMM RELATIONSHIP TO OTHER INITIATIVES
  • 14. CAPABILITY LEVELS • Capability Level 1 – Performed Informally • Capability Level 2 – Planned and Tracked • Capability Level 3 – Well Defined • Capability Level 4 – Quantitatively Controlled • Capability Level 5 – Continuously Improving
  • 15. SECURITY ENGINEERING PROCESS OVERVIEW Security Engineering Process has three main areas
  • 16. Risk security risk process involves threats, vulnerabilities and impact
  • 17. Engineering security is an integral part of the overall engineering process
  • 18. Assurance Assurance process builds an argument establishing confidence
  • 19. CONFIGURATION MANAGEMENT • An information system infrastructure is a complex and evolving system. • Changes to the system affect its ability to effectively enforce the security policies and therefore protect the organization’s assets. • The process of managing the changes to the system and its components is referred to as configuration management. • Configuration management is the process of identifying configuration items, controlling their storage, controlling change to configuration items, and reporting on their status. 1. Configuration Items—Configuration items (CIs) are unique work products that are individually controlled, tracked, and reported on. 2. CI Protection—Configuration items must be protected from unauthorized changes. Without protection of the CIs, a configuration management system cannot function. 3. Change Control—There must exist a process by which changes to configuration items are reviewed, approved, and controlled.
  • 20. 4. Status Reporting—Configuration management systems must be able to report the status of any configuration item and its history of changes. Moreover, the reporting feature must be capable of generating a version of the system based on the correct version of each of the configuration items.
  • 22. MU Exam Questions May 2017 • Give a brief overview of the SSE-CMM maturity model. 10 marks Dec 2017 • Explain role of configuration management in security of an organization. Give the configuration management framework. 10 marks May 2018 • What is security engineering? Give a brief overview of the SSE-CMM model. 10 marks • Discuss role of Configuration Management in the security of an organization. 10 marks Dec 2018 • Discuss role of CM in the security of an organization. 10 marks May 2019 • Explain role of configuration management in security of an organization. Give the configuration management framework. 10 marks