SlideShare uma empresa Scribd logo
1 de 25
Security Policies and
Standards
Introduction
 Organization
 Collection of people working together toward a common goal
 Must have clear understanding of the rules of acceptable behavior
 Policy
 Conveys management’s intentions to its employees
 Effective security program
 Use of a formal plan to implement and manage security in the
organization
Policies,
Standards, and
Procedures
 Policy
 Set of guidelines or instructions
 Organization’s senior management implements
 Idea
 Standards
 More detailed descriptions of what must be done to comply with
policy
 Specifics and outline
 Procedures
 How to accomplish the policies and standards
Effective
Policies
 For a policy to be considered effective and legally enforceable:
 Dissemination
 Distribution of the information
 Is it in a readily available place?
 Review
 Has it been read?
 Who is reading it?
 Comprehension
 Is it understandable?
 Too confusing?
 Compliance
 Acknowledge vs. Agree
 Uniform enforcement
 How are violations being handled?
What Drives
Policy
Development?
 Mission of an organization
 Written statement of purpose of organization
 Usually Not Modified
 Vision of an organization
 Witten statement of the organization’s long-term goals
 Occasionally Modified
 Strategic planning
 Process of moving the organization toward its vision.
 Constantly Reworked to promote progress
 Security policy
 Set of rules that protects an organization’s assets
 Question:What are some security policies you are aware of?
Types of
Information
Security
Policies
 Information security policy
 Set of rules for the protection of an organization’s information
assets
 Enterprise information security policies
 General security policy
 Issue-specific security policies
 Specific technology policy
 Systems-specific security policies
 Configurations
Enterprise
Information
Security Policy
(EISP)
 Supports the mission, vision, and direction of the organization
 Sets the strategic direction, scope, and tone for all security efforts
 Executive-level document
 Drafted by organization’s chief information officer
 Expresses the security philosophy within the IT environment
 Guides the development, implementation, and management of
the security program
 Address an organization’s need to comply with laws and
regulations in two ways:
 General compliance
 Identification of specific penalties and disciplinary actions
Components
of EISP
Issue-Specific
Security Policy
(ISSP)
 Addresses specific areas of technology
 Requires frequent updates
 Contains a statement on the organization’s position on a specific
issue
 May cover:
 Use of company-owned networks and the Internet
 Use of telecommunications technologies (fax and phone)
 Use of electronic mail
 Specific minimum configurations of computers to defend against
worms and viruses
 Prohibitions against hacking or testing organization security
controls
 Home use of company-owned computer equipment
 Use of personal equipment on company networks
 Use of photocopy equipment
Components
of ISSP
Systems-
Specific Policy
(SysSP)
 Appear with the managerial guidance expected in a policy
 Include detailed technical specifications not usually found in other types of
policy documents
 Managerial Guidance SysSPs
 Guide the implementation and configuration of a specific technology
 Technical Specifications SysSPs
 General methods for implementing technical controls
 Access control lists
 Set of specifications that identifies a piece of technology’s authorized users and
includes details on the rights and privileges those users have on that technology
 Access control matrix
 Combines capability tables and ACLs
 Configuration rules
 Specific instructions entered into a security system to regulate how it reacts to the
data it receives
 Rule-based policies
 More specific to a system’s operation than ACLs
 May or may not deal with users directly
Frameworks
and Industry
Standards
 Security blueprint
 Basis for the design, selection, and implementation of all security
program elements
 Security framework
 Outline of the overall information security strategy
 Roadmap for planned changes to the organization’s information
security environment
 The ISO 27000 Series
 NIST Model
NISTSecurity
Models
 Computer Security Resource Center (CSRC) publications
 SP 800-14: Generally Accepted Principles and Practices for Securing
InformationTechnology Systems
 Lists the principles and practices to be used in the development of a
security blueprint
 SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
 Provides an overview of the capabilities and technologies of firewalls
and firewall policies
 SP 800-53 Rev. 3: Recommended Security Controls for Federal
Information Systems and Organizations
 Describes the selection and implementation of security controls for
information security to lower the possibility of successful attack from
threats
 SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in
Federal Information Systems: Building Effective Security
Assessment Plans
 Provides a systems developmental lifecycle approach to security
assessment of information systems
Other NIST
Perimeter
Defense
Publications
Benchmarking
and Best
Practices
 Best practices
 Procedures that are accepted or prescribed as being correct or most
effective
 Benchmarking
 Evaluation against a standard
 Spheres of security - Generalized foundation of a good security
framework
 Controls -Implemented between systems and the information,
between networks and the computer systems, and between the
Internet and internal networks
 Information security - Designed and implemented in three layers:
policies, people (education, training, and awareness programs), and
technology
Spheres of
Security
Security
Education,
Training, and
Awareness
Program
 Education, training, and awareness (SETA) program
 Responsibility of the CISO
 Control measure designed to reduce the incidences of accidental
security breaches by employees
 Designed to supplement the general education and training
programs
Purpose of
SETA
 The Program Elements:
 Security education
 Provide Opportunity , Inform
 TheWhy
 Security training
 Hands-on Education and Experience
 The How
 Security awareness
 Reinforce
 TheWhat
 Purpose of SETA is to enhance security by:
 Improving awareness of the need to protect system resources
 Developing skills and knowledge so computer users can perform
their jobs more securely
 Building in-depth knowledge, as needed, to design, implement, or
operate security programs for organizations and systems
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
DTCC’sOwn
Newsletter
Summary
 Policy
 Basis for all information security planning, design, and deployment
 Security team develops a design blueprint used to implement the
security program
 Implement a security education, training, and awareness (SETA)
program
 Supplement the general education and training programs

Mais conteúdo relacionado

Mais procurados

Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521Merlin Florrence
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture DesignPriyanka Aash
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 

Mais procurados (20)

Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Physical security
Physical securityPhysical security
Physical security
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Information security governance
Information security governanceInformation security governance
Information security governance
 

Semelhante a Security Policies and Standards

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docxdurantheseldine
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managGrazynaBroyles24
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Bonagiri Rajitha
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxManushiKhatri
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 

Semelhante a Security Policies and Standards (20)

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
Chapter003
Chapter003Chapter003
Chapter003
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptx
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 

Mais de primeteacher32

Mais de primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Último

Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter TerrorismNilendra Kumar
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3Ajumarkdiezmo1
 
Introduction to phyton , important topic
Introduction to phyton , important topicIntroduction to phyton , important topic
Introduction to phyton , important topicakpgenious67
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfaae4149584
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024Bruce Bennett
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量sehgh15heh
 
AI ppt introduction , advandtage pros and cons.pptx
AI ppt introduction , advandtage pros and cons.pptxAI ppt introduction , advandtage pros and cons.pptx
AI ppt introduction , advandtage pros and cons.pptxdeepakkrlkr2002
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewNilendra Kumar
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping materialnadeemcollege26
 

Último (20)

Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter Terrorism
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3A
 
Introduction to phyton , important topic
Introduction to phyton , important topicIntroduction to phyton , important topic
Introduction to phyton , important topic
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdf
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
 
AI ppt introduction , advandtage pros and cons.pptx
AI ppt introduction , advandtage pros and cons.pptxAI ppt introduction , advandtage pros and cons.pptx
AI ppt introduction , advandtage pros and cons.pptx
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
Students with Oppositional Defiant Disorder
Students with Oppositional Defiant DisorderStudents with Oppositional Defiant Disorder
Students with Oppositional Defiant Disorder
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping material
 

Security Policies and Standards

  • 2. Introduction  Organization  Collection of people working together toward a common goal  Must have clear understanding of the rules of acceptable behavior  Policy  Conveys management’s intentions to its employees  Effective security program  Use of a formal plan to implement and manage security in the organization
  • 3. Policies, Standards, and Procedures  Policy  Set of guidelines or instructions  Organization’s senior management implements  Idea  Standards  More detailed descriptions of what must be done to comply with policy  Specifics and outline  Procedures  How to accomplish the policies and standards
  • 4. Effective Policies  For a policy to be considered effective and legally enforceable:  Dissemination  Distribution of the information  Is it in a readily available place?  Review  Has it been read?  Who is reading it?  Comprehension  Is it understandable?  Too confusing?  Compliance  Acknowledge vs. Agree  Uniform enforcement  How are violations being handled?
  • 5. What Drives Policy Development?  Mission of an organization  Written statement of purpose of organization  Usually Not Modified  Vision of an organization  Witten statement of the organization’s long-term goals  Occasionally Modified  Strategic planning  Process of moving the organization toward its vision.  Constantly Reworked to promote progress  Security policy  Set of rules that protects an organization’s assets  Question:What are some security policies you are aware of?
  • 6. Types of Information Security Policies  Information security policy  Set of rules for the protection of an organization’s information assets  Enterprise information security policies  General security policy  Issue-specific security policies  Specific technology policy  Systems-specific security policies  Configurations
  • 7. Enterprise Information Security Policy (EISP)  Supports the mission, vision, and direction of the organization  Sets the strategic direction, scope, and tone for all security efforts  Executive-level document  Drafted by organization’s chief information officer  Expresses the security philosophy within the IT environment  Guides the development, implementation, and management of the security program  Address an organization’s need to comply with laws and regulations in two ways:  General compliance  Identification of specific penalties and disciplinary actions
  • 9. Issue-Specific Security Policy (ISSP)  Addresses specific areas of technology  Requires frequent updates  Contains a statement on the organization’s position on a specific issue  May cover:  Use of company-owned networks and the Internet  Use of telecommunications technologies (fax and phone)  Use of electronic mail  Specific minimum configurations of computers to defend against worms and viruses  Prohibitions against hacking or testing organization security controls  Home use of company-owned computer equipment  Use of personal equipment on company networks  Use of photocopy equipment
  • 11. Systems- Specific Policy (SysSP)  Appear with the managerial guidance expected in a policy  Include detailed technical specifications not usually found in other types of policy documents  Managerial Guidance SysSPs  Guide the implementation and configuration of a specific technology  Technical Specifications SysSPs  General methods for implementing technical controls  Access control lists  Set of specifications that identifies a piece of technology’s authorized users and includes details on the rights and privileges those users have on that technology  Access control matrix  Combines capability tables and ACLs  Configuration rules  Specific instructions entered into a security system to regulate how it reacts to the data it receives  Rule-based policies  More specific to a system’s operation than ACLs  May or may not deal with users directly
  • 12. Frameworks and Industry Standards  Security blueprint  Basis for the design, selection, and implementation of all security program elements  Security framework  Outline of the overall information security strategy  Roadmap for planned changes to the organization’s information security environment  The ISO 27000 Series  NIST Model
  • 13. NISTSecurity Models  Computer Security Resource Center (CSRC) publications  SP 800-14: Generally Accepted Principles and Practices for Securing InformationTechnology Systems  Lists the principles and practices to be used in the development of a security blueprint  SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy  Provides an overview of the capabilities and technologies of firewalls and firewall policies  SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations  Describes the selection and implementation of security controls for information security to lower the possibility of successful attack from threats  SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans  Provides a systems developmental lifecycle approach to security assessment of information systems
  • 15. Benchmarking and Best Practices  Best practices  Procedures that are accepted or prescribed as being correct or most effective  Benchmarking  Evaluation against a standard  Spheres of security - Generalized foundation of a good security framework  Controls -Implemented between systems and the information, between networks and the computer systems, and between the Internet and internal networks  Information security - Designed and implemented in three layers: policies, people (education, training, and awareness programs), and technology
  • 17. Security Education, Training, and Awareness Program  Education, training, and awareness (SETA) program  Responsibility of the CISO  Control measure designed to reduce the incidences of accidental security breaches by employees  Designed to supplement the general education and training programs
  • 18. Purpose of SETA  The Program Elements:  Security education  Provide Opportunity , Inform  TheWhy  Security training  Hands-on Education and Experience  The How  Security awareness  Reinforce  TheWhat  Purpose of SETA is to enhance security by:  Improving awareness of the need to protect system resources  Developing skills and knowledge so computer users can perform their jobs more securely  Building in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems
  • 25. Summary  Policy  Basis for all information security planning, design, and deployment  Security team develops a design blueprint used to implement the security program  Implement a security education, training, and awareness (SETA) program  Supplement the general education and training programs

Notas do Editor

  1. Security Education Investigate available courses from local institutions of higher learning or continuing education Centers of Excellence program Identifies outstanding universities that have both coursework in information security and an integrated view of information security in the institution itself 4th grade cyber security training Security Training Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely Industry training conferences and programs offered through professional agencies SETA resources Offer assistance in the form of sample topics and structures for security classes Security Awareness Designed to keep information security at the forefront of users’ minds Include newsletters, security posters, videos, bulletin boards, flyers, and trinkets