Principles of Information Security, Fourth Edition. Chapter 1 Introduction to Information Security

Similar documents
Guide to Network Security First Edition. Chapter One Introduction to Information Security

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Certified Information Security Manager (CISM) Course Overview

TEL2813/IS2820 Security Management

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

CCISO Blueprint v1. EC-Council

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Risk Management. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Gujarat Forensic Sciences University

Cyber Security Program

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Threat and Vulnerability Assessment Tool

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

TEL2813/IS2621 Security Management

Information Security

ISC2. Exam Questions CAP. ISC2 CAP Certified Authorization Professional. Version:Demo

INFORMATION ASSURANCE DIRECTORATE

ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER

A Practical Guide to Efficient Security Response

Business continuity management and cyber resiliency

CISM Certified Information Security Manager

Security Management Models And Practices Feb 5, 2008

Continuous protection to reduce risk and maintain production availability

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Information Technology General Control Review

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Attacks & Breaches It s not if, it s When

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,

THE TRIPWIRE NERC SOLUTION SUITE

Information Security and Cyber Security

TEL2813/IS2820 Security Management. Lecture 1 Jan 15, 2008

Adaptive & Unified Approach to Risk Management and Compliance via CCF

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

Cyber Resilience. Think18. Felicity March IBM Corporation

External Supplier Control Obligations. Cyber Security

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Sage Data Security Services Directory

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Putting It All Together:

The Center for Internet Security

align security instill confidence

The NIST Cybersecurity Framework

Achilles System Certification (ASC) from GE Digital

Information Technology Branch Organization of Cyber Security Technical Standard

Bachelor of Information Technology (Network Security)

E-guide Getting your CISSP Certification

Certified Information Systems Auditor (CISA)

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

THE POWER OF TECH-SAVVY BOARDS:

Automating the Top 20 CIS Critical Security Controls

What is Cybersecurity. in a Security Program?

Nine Steps to Smart Security for Small Businesses

Cyber Security Technologies

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Background FAST FACTS

CSE 3482 Introduction to Computer Security. Introduction to Information/Computer Security

General Framework for Secure IoT Systems

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Security and Privacy Governance Program Guidelines

RSA INCIDENT RESPONSE SERVICES

How AlienVault ICS SIEM Supports Compliance with CFATS

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Cybersecurity, safety and resilience - Airline perspective

Introduction To IS Auditing

Business Continuity Management Standards A Side-by-Side Comparison

Apex Information Security Policy

CompTIA Security+ Study Guide (SY0-501)

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

90% of data breaches are caused by software vulnerabilities.

Security Fundamentals for your Privileged Account Security Deployment

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Improving SCADA System Security

Forensics and Active Protection

Guide to Network Defense and Countermeasures Second Edition. Chapter 2 Security Policy Design: Risk Analysis

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

ALIENVAULT USM FOR AWS SOLUTION GUIDE

RUAG Cyber Security Understand Cyber. Protect Values.

RiskSense Attack Surface Validation for IoT Systems

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

Security of Information Technology Resources IT-12

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Cyber security tips and self-assessment for business

Transcription:

Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security

Introduction Information security: a well-informed sense of assurance that the information risks and controls are in balance. Jim Anderson, Inovant (2002) Security professionals must review the origins of this field to understand its impact on our understanding of information security today Principles of Information Security, Fourth Edition 2

The History of Information Security Computer security began immediately after the first mainframes were developed Groups developing code-breaking computations during World War II created the first modern computers Multiple levels of security were implemented Physical controls to limit access to sensitive military locations to authorized personnel Rudimentary in defending against physical theft, espionage, and sabotage Principles of Information Security, Fourth Edition 3

The 1970s and 80s ARPANET (Advanced Research Project Agency) grew in popularity as did its potential for misuse Fundamental problems with ARPANET security were identified No safety procedures for dial-up connections to ARPANET Nonexistent user identification and authorization to system Late 1970s: microprocessor expanded computing capabilities and security threats Principles of Information Security, Fourth Edition 4

The 1970s and 80s (cont d.) Information security began with Rand Report R-609 (paper that started the study of computer security) Scope of computer security grew from physical security to include: Safety of data Limiting unauthorized access to data Involvement of personnel from multiple levels of an organization Principles of Information Security, Fourth Edition 5

MULTICS Early focus of computer security research was a system called Multiplexed Information and Computing Service (MULTICS) First operating system created with security as its primary goal Mainframe, time-sharing OS developed in mid- 1960s by General Electric (GE), Bell Labs, and Massachusetts Institute of Technology (MIT) Several MULTICS key players created UNIX Primary purpose of UNIX was text processing Principles of Information Security, Fourth Edition 6

The 1990s Networks of computers became more common; so too did the need to interconnect networks Internet became first manifestation of a global network of networks Initially based on de facto standards In early Internet deployments, security was treated as a low priority Principles of Information Security, Fourth Edition 7

2000 to Present The Internet brings millions of computer networks into communication with each other many of them unsecured Ability to secure a computer s data influenced by the security of every computer to which it is connected Growing threat of cyber attacks has increased the need for improved security Principles of Information Security, Fourth Edition 8

What is Security? The quality or state of being secure to be free from danger A successful organization should have multiple layers of security in place: Physical security Personal security Operations security Communications security Network security Information security Principles of Information Security, Fourth Edition 9

What is Security? (cont d.) The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information Necessary tools: policy, awareness, training, education, technology C.I.A. triangle Was standard based on confidentiality, integrity, and availability Now expanded into list of critical characteristics of information Principles of Information Security, Fourth Edition 10

Figure 1-3 Components of Information Security Principles of Information Security, Fourth Edition 11

Key Information Security Concepts Access Asset Attack Control, Safeguard, or Countermeasure Exploit Exposure Loss Protection Profile or Security Posture Risk Subjects and Objects Threat Threat Agent Vulnerability Principles of Information Security, Fourth Edition 12

Figure 1-4 Information security components analogy Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition 13

Figure 1-4 Information Security Terms Principles of Information Security, Fourth Edition 14

Critical Characteristics of Information The value of information comes from the characteristics it possesses: Availability Accuracy Authenticity Confidentiality Integrity nonrepudation Principles of Information Security, Fourth Edition 15

CNSS Security Model Figure 1-6 The McCumber Cube Principles of Information Security, Fourth Edition 16

Components of an Information System Information system (IS) is entire set of components necessary to use information as a resource in the organization Software Hardware Data People Procedures Networks Principles of Information Security, Fourth Edition 17

Balancing Information Security and Access Impossible to obtain perfect security it is a process, not an absolute Security should be considered balance between protection and availability To achieve balance, level of security must allow reasonable access, yet protect against threats Principles of Information Security, Fourth Edition 18

Figure 1-6 Balancing Security and Access Figure 1-8 Balancing Information Security and Access Principles of Information Security, Fourth Edition 19

Approaches to Information Security Implementation: Bottom-Up Approach Grassroots effort: systems administrators attempt to improve security of their systems Key advantage: technical expertise of individual administrators Seldom works, as it lacks a number of critical features: Participant support Organizational staying power Principles of Information Security, Fourth Edition 20

Approaches to Information Security Implementation: Top-Down Approach Initiated by upper management Issue policy, procedures, and processes Dictate goals and expected outcomes of project Determine accountability for each required action The most successful also involve formal development strategy referred to as systems development life cycle Principles of Information Security, Fourth Edition 21

Figure 1-9 Approaches to Information Security Implementation Principles of Information Security, Fourth Edition 22

Figure 1-10 SDLC Waterfall Methodology Principles of Information Security, Fourth Edition 23

The Security Systems Development Life Cycle The same phases used in traditional SDLC may be adapted to support specialized implementation of an IS project Identification of specific threats and creating controls to counter them SecSDLC is a coherent program rather than a series of random, seemingly unconnected actions Principles of Information Security, Fourth Edition 24

Investigation Identifies process, outcomes, goals, and constraints of the project Begins with Enterprise Information Security Policy (EISP) Organizational feasibility analysis is performed Principles of Information Security, Fourth Edition 25

Analysis Documents from investigation phase are studied Analysis of existing security policies or programs, along with documented current threats and associated controls Includes analysis of relevant legal issues that could impact design of the security solution Risk management task begins Principles of Information Security, Fourth Edition 26

Logical Design Creates and develops blueprints for information security Incident response actions planned: Continuity planning Incident response Disaster recovery Feasibility analysis to determine whether project should be continued or outsourced Principles of Information Security, Fourth Edition 27

Physical Design Needed security technology is evaluated, alternatives are generated, and final design is selected At end of phase, feasibility study determines readiness of organization for project Principles of Information Security, Fourth Edition 28

Implementation Security solutions are acquired, tested, implemented, and tested again Personnel issues evaluated; specific training and education programs conducted Entire tested package is presented to management for final approval Principles of Information Security, Fourth Edition 29

Maintenance and Change Perhaps the most important phase, given the everchanging threat environment Often, repairing damage and restoring information is a constant duel with an unseen adversary Information security profile of an organization requires constant adaptation as new threats emerge and old threats evolve Principles of Information Security, Fourth Edition 30

Information Security Project Team A number of individuals who are experienced in one or more facets of required technical and nontechnical areas: Champion Team leader Security policy developers Risk assessment specialists Security professionals Systems administrators End users Principles of Information Security, Fourth Edition 31

Data Responsibilities Data owner: responsible for the security and use of a particular set of information Data custodian: responsible for storage, maintenance, and protection of information Data users: end users who work with information to perform their daily jobs supporting the mission of the organization Principles of Information Security, Fourth Edition 32