COSC 6301 - Computer Security - Overview
COSC 6301 - Computer Security - Overview
Faculty of Science
Department of Computer Science
Chapter 1 - Overview
By
Girum Ketema (PhD)
[email protected]
[email protected]
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Definition – Computer Security
• Measures and controls that ensure confidentiality, integrity, and availability of information
system assets (includes hardware, software, firmware, information being processed, stored and
communicated). (NIST 2013)
Hardware
Software
Firmware
CIA Triad
Data
Telecommunications
Objectives Information System Resources
NIST 2013 – The National Institute of Standards and Technology (NIST) Internal Report 7298 (May 2013
Confidentiality
• Preserving authorized restrictions on information access and disclosure, including
means for protecting personal privacy and proprietary information.
Assures that information and Assures that a system performs its intended
programs are changed only in a function in an unimpaired manner, free from
specified and authorized manner. deliberate or inadvertent unauthorized
manipulation of the system.
Availability
• Ensuring timely and reliable access to and use of information.
• A loss of availability is the disruption of access to or use of information
or an information system.
Security Impact Levels
Low
Moderate
High
Security Impact Levels
Low • Limited adverse effect
Authenticity: The property of being genuine and being able to be verified and trusted
Accountability: The security goal that generates the requirement for actions of an entity to be
traced uniquely to that entity.
Nonrepudiation Deterrence Fault isolation Intrusion detection and prevention Legal action
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Computer Security Elements (NIST Handbook)
Computer security
should support the Security is a means to and end and ont an end in itself
mission of the
organization.
Security shall explicitly be stated in terms of the organization’s
mission
Computer security
If the responsibilities are not made explicit, management may find it difficult
responsibilities and to hold personnel accountable for future outcomes.
accountability should
be made explicit
Documenting information security responsibilities is not dependent on the
size of the organization.
Computer Security
Requires a
Comprehensive and Interdependencies of Security Controls: security controls often depend
Integrated Approach. upon the proper functioning of other controls.
Computer security
should be periodically Organizations must ensure that new vulnerabilities and evolving
reassessed. threats are quickly identified and responded to accordingly
Computer security is
constrained by societal
and Cultural factors Organizations shall make information security functions transparent,
easy to use, and understandable.
Supporting information-
• Overseeing risk
sharing amongst
management related
authorizing officials and
activities across the
other senior leaders in
organization.
the Organization
Chief Executive Officer (CEO)
Ensuring the integration of information security management processes with strategic and
Ensuring operational planning processes;
Making sure that the information and systems used to support organizational operations have
Making proper information security safeguards;
Confirming that trained personnel are complying with related information security legislation,
Confirming policies, directives, instructions, standards, and guidelines.
Chief Information Officer (CIO)
Allocating resources dedicated to the protection of the systems
Allocating supporting the organization’s mission and business functions;
Making decisions with regard to planning and resourcing of the security authorization
process, approval of the security plan, approving and monitoring the implementation
of plans of action and milestones, and the assessment and/or determination of risk;
Preparing the final authorization package, obtaining the authorizing official’s signature
on the authorization decision document, and transmitting the authorization package
to appropriate organizational officials.
Senior Agency Official for Privacy
Reviewing the agency’s information privacy procedures to ensure that they are
comprehensive and up-to-date;
Ensure the agency’s employees and contractors receive appropriate training and
education programs regarding the information privacy laws, regulations, policies,
and procedures governing the agency’s handling of personal information.
Common Control Provider
Addressing the operational interests of the user community (i.e., users who require
Addressing access to the system to satisfy mission, business, or operational requirements);
Developing and Developing and maintaining the system security plan and ensuring that the system is
maintaining deployed and operated in accordance with the agreed-upon security controls.
System Security Officer (SSO)
Preparing a security assessment report containing the results and findings from
Preparing the assessment.
System Administrator
1 2 3 4
Installing, Establishing and Overseeing backup Implementing
configuring, and managing user and recovery tasks technical security
updating hardware accounts controls.
and software
User
• Write A Short Essay on the Ethiopian Security Roles and Responsibilities in your
organizations.
• Comment on missing gaps by comparing to the NIST recommendation
Pages
Due Date