Cyber Security
Cyber Security
Shah
Roll no: 28
Subject: Cyber Security
Assignment 2
Q. 1 Discuss the various security management practices used for Information and network
security.
Answer:
Security management practices used for Information Security:
Practice 1: Recognize Information Resources as Essential Organizational assets that must
be protected
In particular, senior executive recognition of information security risks and interest in
taking steps to understand and manage these risks were the most important factors in
prompting development of more formal information security programs. Such high-level
interest helped ensure that information security was taken seriously at lower organizational
levels and that security specialists had the resources needed to implement an effective
program.
This contrasts with the view expressed to us by numerous federal managers and
security experts that many top federal officials have not recognized the indispensable
nature of electronic data and automated systems to their program operations. As a result,
security-related activities intended to protect these resources do not receive the resources
and attention that they merit.
In some cases, senior management's interest had been generated by an incident that
starkly illustrated the organization's information security vulnerabilities, even though no
damage may have actually occurred. In other cases, incidents at other organizations had
served as a "wake-up call." Two organizations noted that significant interest on the part of
the board of directors was an important factor in their organizations' attention to
information security. However, security managers at many of the organizations told us that
their chief executive officers or other very senior executives had an ongoing interest in
information technology and security, which translated into an organization wide emphasis
on these areas.
Although the emphasis on security generally emanated from top officials, security
specialists at lower levels nurtured this emphasis by keeping them abreast of emerging
security issues, educating managers at all levels, and by emphasizing the related business
risks to their own organizations.
Practice 2: Develop Practical Risk Assessment Procedures That Link
The organizations we studied had tried or were exploring various risk assessment
methodologies, ranging from very informal discussions of risk to fairly complex methods
involving the use of specialized software tools. However, the organizations that were the
most satisfied with their risk assessment procedures were those that had defined a
relatively simple process that could be adapted to various organizational units and involved
a mix of individuals with knowledge of business operations and technical aspects of the
organization's systems and security controls.
Such procedures provided a relatively quick and consistent means of exploring risk
with business managers, selecting cost-effective controls, and documenting conclusions and
business managers' acceptance of final determinations regarding what controls were
needed and what risks could be tolerated. With similar objectives in mind, the utility
company had developed a streamlined risk assessment process that brought together
business managers and technical experts to discuss risk factors and mitigating controls.
"Holding business managers accountable and changing the security staff's role from
enforcement to service has been a major paradigm shift for the entire company." -Security
manager at a major equipment manufacturer
Accordingly, security specialists had assumed the role of educators, advisors, and
facilitators who helped ensure that business managers were aware of risks and of control
techniques that had been or could be implemented to mitigate the risks. For several of the
organizations, these roles represented a dramatic reversal from past years, when security
personnel were viewed as rigid, sometimes overly protective enforcers who often did not
adequately consider the effect of security controls on business operations.
Such attention is important for all types of internal controls, but it is especially
important for security over computerized information, because, as mentioned previously,
the factors that affect computer security are constantly changing in today's dynamic
environment. Such changing factors include threats, systems technologies and
configurations, known vulnerabilities in existing software, the level of reliance on
automated systems and electronic data, and the sensitivity of such operations and data.
Unlike many federal agencies, the central groups we studied had defined budgets,
which gave them the ability to plan and set goals for their organization's information
security program. At a minimum, these budgets covered central staff salaries and training
and security hardware and software. At one organization, business units could supplement
the central group's resources in order to increase the central group's participation in high
priority projects. While all of the central groups had staffs ranging from 3 to 17 people
permanently assigned to the group, comparing the size of these groups is of limited value
because of wide variations in the (1) sizes of the organizations we studied, (2) inherent
riskiness of their operations, and (3) the additional support the groups received from other
organizational components and from numerous subordinate security managers and
administrators.
In particular, no two groups were alike regarding the extent of support they received
from other organizational units. For example, the computer vendor relied on a security
manager in each of the organization's four regional business units, while the utility's nine-
member central group relied on 48 part-time information security coordinators at various
levels within the company. Some central groups relied heavily on technical assistance
located in another organizational unit, while others had significant technical expertise
among their own staff, and, thus, were much more involved in directly implementing and
testing controls.
Organizations need a holistic view of their network. With disparate vendor devices
and hosts, security teams need a normalized, comprehensive view of the network,
including: routing rules, access rules, NAT, VPN, etc.; hosts, including all products (and
versions), services, vulnerabilities, and patches; and assets, including asset groupings and
classifications.
With a comprehensive view of the network, security teams can view hosts in the
network, as well as configurations, classifications and other pertinent information. A
network map or model is both a useful visualization tool and a diagnostic tool, providing
analysis that is only possible when considering an overall view. For example, security and
compliance teams can use this macro view to see how data would move between points on
the network.
Additionally, it highlights information that is missing, such as hosts, access control list
(ACL) data, and more.
Daily or weekly reviews of all devices on the network is unattainable with a manual
process, and reviewing device configurations less frequently puts network security and
compliance at risk. Automating policy compliance helps ensure compliance and consistency,
and preserves IT resources.
Ideally, a network modelling tool that provides a macro view should also allow
administrators to drill down into a micro view of each device, providing information on
users, applications, vulnerabilities, and more. This allows administrators to see the broader
network view and then focus in on particular devices for management.
Merely knowing the network vulnerabilities and their criticality is insufficient for
understanding the true level of risk to an organization. Today’s attacks often incorporate
multiple steps that cross several different network zones, and an isolated view of any of
these steps could appear innocuous.
For example, a change management process can flag when a network change will
expose vulnerabilities, when a firewall change opens access to risky services, or when there
is an unauthorized access path from a partner to an internal zone. More importantly, to
maintain network security, change management processes can be used to determine the
impact of a proposed change before implementing the change.
Implementing these four best practices for network security management can reduce
risk across the network. With visibility on both the network and device level, tremendous
amounts of data are translated into intelligence that deciphers complicated network
security transactions into manageable, actionable information. With this insight, attack
simulation can then prioritize vulnerabilities and eliminate the attack vectors that are most
critical to the organization, protecting business services and data. Finally, change
management can automate and optimize security processes to improve security and reduce
the security management workload.