0% found this document useful (0 votes)
54 views4 pages

Chapter 3 Reviewer - Information Security Management

InfoSec Chapter 3

Uploaded by

dwenbeagarcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views4 pages

Chapter 3 Reviewer - Information Security Management

InfoSec Chapter 3

Uploaded by

dwenbeagarcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 3: Information Security Management

3.1 Overview of Information Security Management

 Information Security Management (ISM): A structured approach to managing an organization's


information security in alignment with business objectives.

 Primary Goal: Protect confidentiality, integrity, and availability (CIA) of information by


implementing effective security measures.

3.2 Information Security Management System (ISMS)

 ISMS Definition: A systematic approach to managing sensitive company information, ensuring it


remains secure.

 Purpose of ISMS:

o Protect information assets.

o Reduce risks related to security breaches.

o Align with regulatory requirements.

o Foster a culture of continuous improvement in information security.

 Key Elements of an ISMS:

o Policies: Outline security rules and guidelines.

o Processes: Define procedures for implementing security practices.

o Technology: Tools and systems that support security measures.

o People: Roles and responsibilities in maintaining security.

3.3 Key Information Security Management Frameworks

 ISO/IEC 27001:

o An international standard that specifies the requirements for establishing,


implementing, and managing an ISMS.

o Provides a risk-based approach to protect information.

o ISO/IEC 27002 complements it by providing guidance on implementing controls.

 NIST Cybersecurity Framework:

o Created by the National Institute of Standards and Technology (NIST), focused on


protecting critical infrastructure.

o Based on five core functions: Identify, Protect, Detect, Respond, and Recover.

 COBIT (Control Objectives for Information and Related Technologies):


o A framework that aligns IT management with business objectives.

o Focuses on managing and governing information to maximize value.

 ITIL (Information Technology Infrastructure Library):

o Provides best practices for IT service management, including security processes.

o Emphasizes aligning IT services with business needs.

3.4 Risk Management in Information Security

 Risk Management: A process to identify, assess, and prioritize risks to mitigate their impact on
the organization.

 Steps in the Risk Management Process:

1. Risk Assessment:

 Identify Assets: Recognize critical information and resources.

 Identify Threats and Vulnerabilities: Understand potential security gaps and


threats that may exploit them.

 Analyze Impact: Evaluate potential damages or consequences if risks


materialize.

2. Risk Mitigation:

 Avoid: Remove sources of risk.

 Reduce: Implement controls to minimize risk.

 Transfer: Shift risk to third parties (e.g., insurance).

 Accept: Acknowledge and accept certain low-level risks.

3. Risk Monitoring and Review:

 Continuously monitor security controls and update as needed.

 Conduct periodic reviews to adapt to evolving threats.

3.5 Security Policies, Standards, Guidelines, and Procedures

 Security Policy: A high-level document that outlines an organization’s approach to information


security, including objectives, scope, and general rules.

 Standards: Specific security requirements to implement policies (e.g., password length,


encryption levels).

 Guidelines: Recommended best practices for implementing standards (not mandatory).

 Procedures: Detailed, step-by-step instructions for specific security tasks.


Types of Security Policies:

 Acceptable Use Policy (AUP): Specifies how resources should be used.

 Access Control Policy: Outlines access levels and authorization requirements.

 Data Protection Policy: Guides the protection of personal and sensitive data.

3.6 Security Roles and Responsibilities

 Chief Information Security Officer (CISO): Leads the organization’s security strategy and
oversees ISMS implementation.

 Security Manager: Manages security operations, teams, and projects.

 Security Analyst: Monitors systems, analyzes threats, and investigates incidents.

 Incident Response Team: Specializes in identifying, containing, and recovering from security
incidents.

 All Employees: Expected to comply with security policies and report any suspicious activity.

3.7 Information Security Controls and Safeguards

 Control Types:

o Preventive Controls: Aim to prevent security incidents (e.g., firewalls, access controls).

o Detective Controls: Identify and detect incidents when they occur (e.g., intrusion
detection systems).

o Corrective Controls: Restore systems after a security breach (e.g., backups, disaster
recovery).

o Deterrent Controls: Discourage attacks (e.g., warning signs, surveillance cameras).

 Categories of Controls:

o Physical Controls: Protect physical assets (e.g., locks, security guards).

o Technical Controls: Protect data and networks (e.g., encryption, firewalls).

o Administrative Controls: Define roles, policies, and procedures (e.g., training, security
policies).

3.8 Incident Management and Response

 Incident Management: Process to detect, respond to, and recover from security incidents.

 Incident Response Steps:

1. Preparation: Develop incident response policies, train staff, and establish protocols.

2. Identification: Detect and confirm the presence of a security incident.


3. Containment: Isolate and limit the impact of the incident.

4. Eradication: Eliminate the root cause of the incident and remove affected components.

5. Recovery: Restore and validate systems for resuming normal operations.

6. Lessons Learned: Conduct post-incident review to identify improvements and prevent


future incidents.

3.9 Security Awareness and Training

 Purpose of Security Awareness Programs: Educate employees on security policies, potential


threats, and safe practices.

 Key Components:

o Regular training on emerging threats (e.g., phishing scams).

o Drills and simulated attacks to assess readiness.

o Reminders and resources to encourage a security-conscious culture.

3.10 Monitoring, Auditing, and Continuous Improvement

 Monitoring: Ongoing observation of network and data to detect abnormal activities and
potential threats.

 Auditing: Periodic examination of security practices, compliance with policies, and control
effectiveness.

 Continuous Improvement: Incorporates a feedback loop to refine and enhance security


practices regularly (based on the Plan-Do-Check-Act (PDCA) cycle).

3.11 Security Metrics and Reporting

 Security Metrics: Quantifiable measurements used to assess security effectiveness (e.g., number
of incidents, time to detect/resolve threats).

 Reporting: Regular reports to management on security status, vulnerabilities, compliance levels,


and improvements.

You might also like