Lesson 1 Review of The Introduction To Is
Lesson 1 Review of The Introduction To Is
INFORMATION SECURITY
Lesson 1
willistowerswatson.com
▪What is Information?
A ▪What is Information Security?
G
E
N
▪What is Risk?
D
A ▪An Introduction to ISO for
Information Technology
▪User Responsibilities
I
N Information can be
F
O
R
➢ Created
M ➢ Stored
A
T ➢ Destroyed
I
O L ➢ Processed
N I
F ➢ Transmitted
E
C ➢ Used – (For proper & improper purposes)
Y
C
➢ Corrupted
L ➢ Lost
E
➢ Stolen
I
N
F ➢Printed or written on paper
O
R ➢Stored electronically
M
A ➢ Transmitted by post or using electronics means
T
I
➢Shown on corporate videos
O
➢Displayed / published on web
N
➢Verbal – spoken in conversations
T
Y ‘…Whatever form the information takes, or
P means by which it is shared or stored, it
E
should always be appropriately protected’
S
I
N What Is Information Security?
F
O
R ➢ The quality or state of being secure to be free
M from danger.
A
T ➢ Security is achieved using several strategies.
I
O ➢ Security is achieved using several strategies
N S simultaneously or used in combination with one
E
another.
C
U ➢ Security is recognized as essential to protect vital
R
processes and the systems that provide those
I
T
processes.
Y
➢ Security is not something you buy but it is
something you do.
Downloaded by Edenjoy Manuel ([email protected])
lOMoARcPSD|46423229
I
N What Is Information Security?
F
O
R ➢ The architecture where an integrated combination of
M appliances, systems and solutions, software, alarms, and
A vulnerability scans working together
T
I
➢ Monitored 24x7
O
N S
E
➢ Having People, Processes, Technology, Policies, &
C
Procedures
U
R
I ➢ Security is for PPT and not only for appliances or
T devices
Y
I
N
F
O
S
E
C PEOPLE
C
O
M PROCESSES
P
O
N
E
N TECHNOLOGY
T
S
Technology
“What we use to improve what we do”
T
E Network Infrastructure:
C • Cabling, Data/Voice Networks and equipment
H • Telecommunications services (PABX), including VoIP services,
N ISDN, Video Conferencing
O • Server computers and associated storage devices
L • Operating software for server computers
O • Communications equipment and related hardware
G
• Intranet and Internet connections
Y
• VPNs and Virtual environments
• Remote access services
• Wireless connectivity
Technology
“What we use to improve what we do”
T Application Software:
E • Finance and assets systems, including Accounting packages,
Inventory management, HR systems, Assessment and reporting
C system
H • Software as a service (SaaS) - instead of software as a packaged or
custom-made product.
N
O
Physical Security Components:
L
• CCTV Cameras
O • Clock in Systems/ Biometrics
G • Environmental Management Systems: Humidity Control, Ventilation, Air
Y Conditioning, Fire Control Systems
• Electricity/ Power backup
Access Devices:
• Desktop computers
• Laptops, ultra-mobile laptops and
• PDAs Thin client computing
• Digital cameras, Printers, Scanners, Photocopier etc.
6/16/201
Downloaded by EdenjoyMohan
Manuel ([email protected])
Kamat 12
1
lOMoARcPSD|46423229
I
N INFORMATION SECURITY
F
O
R
M 1. Protects information from a range of threats
A 2. Ensures business continuity
T 3. Minimizes financial loss
I 4. Optimizes return on investments
O 5. Increases business opportunities
N S
E
C
U
R
Business survival depends on
I
T information security.
Y
6/16/201
Downloaded by EdenjoyMohan
Manuel ([email protected])
Kamat 13
1
lOMoARcPSD|46423229
I
N ISO 27002:2005 defines Information Security
F as the preservation of:
O
R
M Ensuring that information is
A – Confidentiality accessible only to those
T authorized to have access.
I A
O T
N T Safeguarding the accuracy and
completeness of information
R – Integrity and processing methods.
I
B
U
Ensuring that authorized
T
users have access to
E
S
– Availability information and associated
assets when required.
6/16/201
Downloaded by EdenjoyMohan
Manuel ([email protected])
Kamat 14
1
lOMoARcPSD|46423229
LOSS OF GOODWILL
6/16/201
Downloaded by Edenjoy Manuel
Mohan ([email protected])
Kamat 15
1
lOMoARcPSD|46423229
What is a Risk?
exploit
Threats Vulnerabilities
Information
Controls * Risk assets
reduce
T
H Threat Identification
R
E
A Elements of Threats
T
6/16/201
Downloaded by EdenjoyMohan
Manuel ([email protected])
Kamat 19
1
lOMoARcPSD|46423229
T
H
R Threat Identification
E
A
T
Elements of Threats
I
D Motive: Something that causes the agent
E
N
to act.
T • Accidental
I
F
• Intentional
I
• Only motivating factor that can be both
C
A
accidental and intentional is human
T
I
O
N
6/16/201
Downloaded by EdenjoyMohan
Manuel ([email protected])
Kamat 20
1
lOMoARcPSD|46423229
T
H
R
Threat Identification
E
A
T
I Elements of Threats
D
E Results: The outcome of the applied
N
T
threat. The results normally lead to the
I loss of CIA
F • Confidentiality
I
C • Integrity
A
• Availability
T
I
O
N
6/16/201
Downloaded by EdenjoyMohan
Manuel ([email protected])
Kamat 21
1
lOMoARcPSD|46423229
R
I
S
K
S
T
H
R
E
A
T
S
Natural
Systems & Lack Of Lapse in
Calamities &
Network Documentation Physical
Fire
Failure Security
6/16/201
1 Mohan Kamat 25
Downloaded by Edenjoy Manuel ([email protected])
lOMoARcPSD|46423229
SO HOW DO
WE
OVERCOME
THESE
PROBLEMS?
6/16/201
Downloaded by EdenjoyMohan
Manuel ([email protected])
Kamat 26
1
lOMoARcPSD|46423229
What Is Management?
Managerial Roles
• Informational role: Collecting, processing, and using
M information to achieve the objective
A
N • Interpersonal role: Interacting with superiors, subordinates,
outside stakeholders, and others
A
G • Decisional role: Selecting from alternative approaches, and
E resolving conflicts, dilemmas, or challenges
M
E
N
T
Characteristics of a Leader
M
A 1. Bearing 8. Integrity
N 2. Courage 9. Judgment
A
3. Decisiveness 10.Justice
G
4. Dependability 11.Knowledge
E
M
5. Endurance 12.Loyalty
E 6. Enthusiasm 13.Tact
N 7. Initiative 14.Unselfishness
T
Be…Know…Do…
TAWE AWAY:
Read about ISO 27001