information security background

29
Information Systems 365/765 Information Systems Security and Strategy Lecture 2 Introduction to Information Security

Upload: nicholas-davis

Post on 16-Jan-2015

1.498 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Information security background

Information Systems 365/765Information Systems Security and Strategy

Lecture 2Introduction to Information Security

Page 2: Information security background

Information Security Defined

Protecting information and informationSystems from unauthorized access, use,disclosure, disruption, modification, ordestruction. Information security isconcerned with the confidentiality,integrity and availability of data regardlessof the form the data may take: electronic,print, or other forms.

Page 3: Information security background

Why Study Information Security in the School of Business?

• Businesses collect mass amounts of data about their customers, employees, and competitors

• Most of this data is stored on computers and transmitted across networks

• If this information should fall into the hands of a competitor, the result could be loss of business, lawsuits and bankruptcy

• Protecting corporate data is no longer an option, it is a requirement

Page 4: Information security background

What Types of Jobs Do Information Security Professionals Hold?

• Information Systems Auditor• Business Continuity and

Disaster Recovery Planning and Implementation

• Digital Forensics• Infrastructure Design• Business Integration

Page 5: Information security background

History of Information Security

• Throughout history, confidentiality of information has always played a key role in military conflict

• Confidentiality• Tampering• Authenticity• Physical protection• Background checks• Encryption

Page 6: Information security background

Key Concept of Information Security. The single most

important slide in this course!

Confidentiality, Integrity,Availability (CIA Triad)

Page 7: Information security background

Confidentiality

Confidentiality is the process ofpreventing disclosure ofinformation to unauthorizedindividuals or systems.

Examples: Credit card, ShoulderSurfing, Laptop theft

Confidentiality is necessary, but notsufficient to maintain privacy

Page 8: Information security background

IntegrityIntegrity means that datacannot be modified withoutAuthorization

Examples: Manual deletion oralteration of important datafiles, Virus infection, Employeealtering their own salary,website vandalism, polling fraud

In Information Security, the term “dataintegrity” should not be confused withDatabase referential integrity

Page 9: Information security background

Integrity

For any information system to serve its purpose,The information must be available when it isneeded. This means that the computing systemsused to store and process the information, thesecurity controls used to protect it, and thecommunication channels used to access it must befunctioning correctly.

Examples: Power outages, Hardware failures,System upgrades and Preventing denial-of-serviceattacks

Page 10: Information security background

Authenticity

In computing, e-Business andinformation security it is necessaryto ensure that the data,transactions, communications ordocuments (electronic or physical)are genuine (i.e. they have not beenforged or fabricated.)

Examples: Passport, Credit cardAccounts, academic transcripts

Page 11: Information security background

Non-Repudiation

Non-Repudiation is a complexterm used to describe the lackof deniability of ownership of amessage, piece of data, orTransaction

Examples: Proof of an ATM transaction, a stock trade, or anemail

Page 12: Information security background

Strong Information Security = Solid Risk Management

Proper Risk Management involves understanding andcontrolling risks, vulnerabilities and threats

Risk is the likelihood thatsomething bad will happen thatcauses harm or loss of anInformational asset

Vulnerability is a weaknessthat could be used to endanger orcause harm to an informationalAsset

Threat is anything deliberate or random andUnanticipated that has the potential to cause harm

Page 13: Information security background

Risk Management

The likelihood that a threat will use avulnerability to cause harm creates a risk.

When a threat does use a vulnerability toinflict harm, it has an impact.

In the context of information security, the impact Ia loss of availability, integrity, and confidentiality,and possibly other losses (lost income, loss of life,loss of real property)

It should be pointed out that it is not possible toidentify all risks, nor is it possible to eliminate allrisk. The remaining risk is called residual risk.

Page 14: Information security background

Risk Assessment

A risk assessment is formal project carried out by ateam of people who have knowledge of specificareas of the business. Membership of the team mayvary over time as different parts of the business areassessed.

The assessment may use a subjective qualitativeanalysis based on informed opinion, or wherereliable dollar figures and historical information isavailable, the analysis may use quantitativeanalysis as well

Page 15: Information security background

Components of a Risk Assessment

Security Policy Organization of information security, Asset management Human resources security, Physical and environmental security, Communications and operations management, Access control, logical and physical Information systems acquisition and lifecyclemanagement Development and maintenance Information security incident management Business continuity management Regulatory compliance

Page 16: Information security background

Risk Management Process

Identification of assets and estimating their value.Include: people, buildings, hardware, software,data (electronic, print, other), supplies.

Conduct a threat assessment. Include: Acts ofnature, acts of war, accidents, malicious actsoriginating from inside or outsidethe organization.

Conduct a vulnerability assessment, and for eachvulnerability, calculate the probability that it will beexploited. Evaluate policies, procedures, standards,training, physical security, quality control andtechnical security.

Page 17: Information security background

Risk Management Process

Calculate the impact that each threatwould have on each asset. Use qualitativeanalysis or quantitative analysis.

Identify, select and implementappropriate controls. Provide aproportional response. Considerproductivity, cost effectiveness, and valueof the asset.

Evaluate the effectiveness of the controlmeasures. Ensure the controls provide therequired cost effective protection withoutdiscernible loss of productivity.

Page 18: Information security background

Risk Remedies

For any given risk, you may choose to:

Accept the risk based upon the relative low valueof the asset, the relative low frequency ofoccurrence, and the relative low impact on thebusiness.

Mitigate the risk by selecting and implementingappropriate control measures to reduce the risk.

Transfer the risk to another business by buyinginsurance or out-sourcing to another business.

Deny the risk, which is obviously dangerous

Page 19: Information security background

Information Security Controls

When Management chooses tomitigate a risk, they will do soby implementing one or more ofthree different types of controls

• Administrative Controls• Logical/Technical Controls• Physical Controls

Page 20: Information security background

Administrative Controls

Consist of approved written policies, procedures,standards and guidelines.

Administrative controls form the framework forrunning the business and managing people.

They inform people on how the business is to be run andhow day to day operations are to be conducted.

Laws and regulations created by government bodies arealso a type of administrative control, such as PCI, HIPAA,FERPA and SOX

Other examples of administrative controls include thecorporate security policy, password policy, hiring policies,and disciplinary policies.

Page 21: Information security background

Separation of Duties is the most important and often overlooked

physical controlSeparation of duties ensures that an individual cannot complete a critical task by themselves.

For example: an employee who submits a requestfor reimbursement should not also be able toauthorize payment or print the check.

An applications programmer should not also be theserver administrator or the database administrator

These roles and responsibilities must be separatedFrom one another

Page 22: Information security background

Logical Controls

Logical controls (also called technicalcontrols) consist of software anddata to monitor and control accessto information and computingsystems.

For example: passwords, networkand host based firewalls, networkintrusion detection systems, accesscontrol lists, and data encryption arelogical controls.

Page 23: Information security background

The Principle of Least Privilege is the most important and often overlooked logical control in IS

The principle of least privilege requires that an individual,program or system process is not granted any moreAccess privileges than are necessary to perform the task.

A blatant example of the failure to adhere to the principle of least privilege is logging into Windows asuser Administrator to read Email and surf the Web.

Violations of this principle can also occur when anIndividual: Collects additional access privileges over timeJob duties change, promotion, new position, etc.They are promoted to a new position, or they transfer toanother department.

Examine and adjust access rights for ALL employees on aregular basis

Page 24: Information security background

Physical Controls

Physical controls monitor and control theenvironment of the work place and computingfacilities. They also monitor and control access toand from such facilities.

For example: doors, locks, heating and airconditioning, smoke and fire alarms, firesuppression systems, cameras, barricades,fencing, security guards, cable locks, etc.

Separating the network and work place intofunctional areas are also physical controls.

Page 25: Information security background

Security Classification of Information

An important aspect of informationsecurity and risk management isrecognizing the value of informationand defining appropriate proceduresand protection requirements for theinformation. Not all information isequal and so not all informationrequires the same degree ofprotection. This requires informationto be assigned a securityclassification

Page 26: Information security background

Security Classification of Information

1. Identify a member of seniormanagement as the owner of theparticular information to beclassified

2. Develop a classification policy.The policy should describe thedifferent classification labels, definethe criteria for information to beassigned a particular label, and list therequired security controls for eachclassification

Page 27: Information security background

Security Classification of Information

Some factors that influence whichclassification information should beassigned include:1. How much value that informationhas to the organization 2. How old the information is andwhether or not the information hasbecome obsolete. 3. Laws and other regulatoryrequirements are also importantconsiderations when classifyinginformation

Page 28: Information security background

Information Security Classification Labels

Common information securityclassification labels used by thebusiness sector are:PublicSensitive Private Confidential

Page 29: Information security background

Information Security Classification Labels

All employees in the organization, as wellas business partners, must be trained onthe classification schema and understandthe required security controls and handlingprocedures for each classification.

The classification a particular informationasset has been assigned should bereviewed periodically to ensure theclassification is still appropriate for theinformation and to ensure the securitycontrols required by the classification arein place.