Information Security Issues, Threats, Solution & Standrads
Information Security Issues, Threats, Solution & Standrads
ISSUES,THREATS,SOLUTION
& STANDRADS
“IF YOU THINK TECHNOLOGY CAN SOLVE YOUR
SECURITY PROBLEMS , THEN
YOU DON’T UNDERSTAND THE PROBLEMS
&
YOU DON’T UNDERSTAND THE TECHNOLOGY.”
…Bruce Schenier
Nature of Business –
• Embarrassment
• Loss of confidential and sensitive information
• Loss of strategic advantage and resources
• Non availability of systems in combat situations
• Time and efforts spent creating ‘Intellectual
Property’
• National Security, when information is misused by
terrorists/miscreants
Recent cases
Cases – India Specific
• CEO – Bazee.com
BS ISO 17799:20000
Introduction to Information Security
Lifecycle of Information
Created
Stored
Processed
Transmitted
Used – (For proper & improper purposes)
Lost
Corrupted
Destroyed
Introduction to Information Security
Ensuring that
information is
accessible only to those
authorized to have
– Confidentiality Safeguarding
accessthe
accuracy and
completeness of
– Integrity information and
Ensuring that
processing authorized
methods
users have access to
– Availability information and
associated assets when
required
Information Security Trends
Information People
Security
Process
IT Security Technology
INTRODUCTION
• Information security – a broad term
encompassing the protection of information
from accidental or intentional misuse by
persons inside or outside an organization
• Risk Treatment
a. Mitigate
b. Transfer
c. Avoid
d. Accept
Suggested Roadmap for IT Security
• Implementation of Controls
Policy
Technology
Training
• Continual Improvement
Thefirst
• The First Line
line of of Defense
defense - People
an organization should
follow to help combat insider issues is to
develop information security policies and an
information security plan
• Information security policies – identify the rules
required to maintain information security
• Information security plan – details how an
organization will implement the information security
policies
People Readiness
The Second Line of Defense -
Technology
• Three primary information security areas:
1. Authentication and authorization
2. Prevention and resistance
3. Detection and response
Suggested Technologies
Information
Security Policy
Organisation
Compliance
Security
Information
Security Incident Human Resource
Management Security
Availability
System Physical
Development & Security
Maint.
Communication
Access & Operations
Controls Mgmt