Developing Secure Information System
Developing Secure Information System
system
Developing secure information system
User policies:
1. Password policy: This policy helps to keep
user account secure
Long password
2. Proprietary info use:
How to use proprietary information
who can use the info
who can transmit the info
3. Internet Usage:
Use of net mail, Use of programs with password,
unencrypted msg sent over the network.
4. VPN and remote user system- Should be checked for
viruses, Trojan horse
5. Acceptable use of hardware's like modem, pen drive
etc
Key elements of IS policy
• It is a set of rules put in to law by an
organization
• Prescription
• This policy will protect the sensitive
information.
• To detect the wrong and bad use of data,
networks and computer programs
• Protect the reputation of an organization
• Information Security Objectives
Confidentiality
Integrity
Availability
Access control policy
Authorization
• Classification of knowledge
3 types
High risk class:
Information protected by state and federal
laws ex: money, payroll, personnel details
Confidential category:
The information is not protected under
law. Information owner thinks to protect it
from unauthorized person
• Category public- This data is freely distributed
Information system Development Lifecycle
• https://www.brainkart.com/article/The-
Security-Systems-Development-Life-Cycle-
(Sec-SDLC-)_7921/
Information security governance and Risk
management
• Objectives
Determine frame work for implementing
and auditing security controls
Determine frame work for risk assessment-
distinguish between qualitative and
quantitative risk assessment- action taken as a
response of risk
Security governance
• It is a framework to reduce risk by protecting
the system and data
• Enterprise security governance include
activities
Institutionalization
Enterprise risk management
Security policies
Safeguard org digital assets
guarantee information loss interference
Shield organization name