Computer and Network Security - 2
Computer and Network Security - 2
(2nd Week)
Outline
• 2. Management issues
—2.1. IT Security Management and Risk Assessment
—2.2. IT Security Controls, Plans and Procedures
—2.3. Physical and Infrastructure Security
—2.4. Human Resources Security
—2.5. Security Auditing
—2.6. Legal and Ethical Aspects
2.1. IT Security Management and Risk
Assessment
2.1. Outline
• IT Security Management
• Organizational Context and Security Policy
• Security Risk Assessment
• Detailed Security Risk Analysis
• Case Study: Silver Star Mines
IT Security Management
Overview
Is the formal process of answering the questions:
Monitoring the
implementation
Determining Identifying and and operation of Developing
safeguards that
organizational Determining analyzing Identifying and Detecting
Specifying are necessary in
IT security organizational security threats and implementing and
appropriate order to cost
objectives, IT security to IT assets analyzing a security reacting to
safeguards effectively
strategies, and requirements within the risks protect the
awareness incidents
policies organization information and program
services within
the organization
Organizational
IT Security Policy
Aspects
Selection of Controls
Implementation
Follow-Up
Security
Maintenance
Compliance
Change Incident
Management Handling
Plan Check
Information
Security Do Managed
Needs Security
importance of IT
Policies - identify
systems in organization what needs to be done
Security Policy
Needs to address:
• Scope and purpose including relation of objectives to business, legal,
regulatory requirements
• IT security requirements
• Assignment of responsibilities
• Risk management approach
• Security awareness and training
• General personnel issues and any legal sanctions
• Integration of security into systems development
• Information classification scheme
• Contingency and business continuity planning
• Incident detection and handling processes
• How and when policy reviewed, and change control to it
Management Support
• IT security policy must be supported by senior
management
• Need IT security officer
• To provide consistent overall supervision
• Liaison with senior management
• Maintenance of IT security objectives, strategies, policies
• Handle incidents
• Management of IT security awareness and training programs
• Interaction with IT project security officers
• Large organizations need separate IT project
security officers associated with major projects and
systems
• Manage security policies within their area
Security Risk Assessment
Critical component of process
• Baseline
• Informal
• Detailed risk
• Combined
Baseline Approach
• Goal is to implement agreed controls to provide
protection against the most common threats
• Forms a good base for further security measures
• Use “industry best practice”
• Easy, cheap, can be replicated
• Gives no special consideration to variations in risk exposure
• May give too much or too little security
• Generally recommended only for small
organizations without the resources to
implement more structured approaches
Involves conducting an
informal, pragmatic risk
Exploits knowledge and
analysis on Fairly quick and cheap
expertise of analyst
organization’s IT
systems
Judgments can be
made about
Some risks may be Skewed by analyst’s
vulnerabilities and risks
incorrectly assessed views, varies over time
that baseline approach
would not address
• Over time, this can result in the most appropriate and cost-effective security
controls being selected and implemented on these systems
Detailed Security Risk
Analysis
Provides the most accurate evaluation of an
organization's IT system’s security risks
Highest cost
Determine Risk
• Risk appetite
• The level of risk the organization views as acceptable
Media Utilities Banking &
Finance
Asset
Anything that
might hinder or
prevent an asset
from providing
appropriate levels
of the key security
services
Threat Sources
• Threats may be
• Natural “acts of God”
• Man-made
• Accidental or deliberate
• Motivation
• Capability
• Resources
• Probability of attack
• Deterrence
Uneconomic
so accept
Low
$ Cost of Treatment $$$$$
Not proceeding
Risk with the activity
or system that
avoidance creates this risk
Sharing
Risk responsibility for
the risk with a
transfer third party
Availability, integrity of
Availability, integrity
maintenance/production
of financial system
system
Availability, integrity of
procurement system