SlideShare ist ein Scribd-Unternehmen logo
1 von 22
1
IT SECURITY CONTROLS, PLANS, AND
PROCEDURES
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
Mr. RAJASEKAR RAMALINGAM
Department of IT, College of Applied
Sciences, Sur.
Sultanate of Oman.
http://vrrsekar.wixsite.com/raja
Based on
William Stallings, Lawrie Brown, Computer Security: Principles and
Practice, Third Edition
CONTENT
11.1 IT Security Management Implementation
11.2 Security Controls or Safeguards
11.3 IT Security Plan
11.4 Implementation of Controls
11.5 Monitoring Risks
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES 2
3
11.1 IT Security Management Implementation
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
4
11.2 Controls or Safeguards
• Controls or safeguards are
– practices, procedures or mechanisms which may
protect against a threat, reduce a vulnerability,
limit the impact of an unwanted incident, detect
unwanted incidents and facilitate recover
• Classes of controls:
– management
– operational
– technical
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
5
11.2.1 Technical Controls
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
6
11.2.2 Lists of Controls
CLASS CONTROL FAMILY
Management Risk Assessment
Management Planning
Management System and Services Acquisition
Management Certification, Accreditation, and Security Assessments
Operational Personnel Security
Operational Physical and Environmental Protection
Operational Contingency Planning
Operational Configuration Management
Operational Maintenance
Operational System and Information Integrity
Operational Media Protection
Operational Incident Response
Operational Awareness and Training
Technical Identification and Authentication
Technical Access Control
Technical Audit and Accountability
Technical System and Communications Protection
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
7
11.2.3 Residual Risk
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
8
11.2.4 Cost-Benefit Analysis
• conduct to determine appropriate controls
– greatest benefit given resources available
• qualitative or quantitative
• show cost justified by reduction in risk
• contrast impact of implementing it or not
• management chooses selection of controls
• considers if it reduces risk too much or not enough, is too costly
or appropriate
• fundamentally a business decision
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
9
11.3 IT Security Plan
• provides details of
– what will be done
– what resources are needed
– who is responsible
• should include
– risks, recommended controls, action priority
– selected controls, resources needed
– responsible personnel, implementation dates
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
10
11.4 Implementation Plan
Risk
(Asset/Threat)
Level
of
Risk
Recommended
Controls
Prio
rity
Selected
Controls
Required
Resources
Responsible
Persons
Start
– End
Date
Other
Comments
Hacker attack
on Internet
Router
High 1. disable external
telnet access
2. use detailed auditing
of privileged command
use
3. set policy for strong
admin passwords
4. set backup strategy
for router config file
5. set change control
policy for the router
configuration
1 1.
2.
3.
4.
5.
1. 3 daysIT
net admin
time to
change &
verify router
config,
write
policies;
2. 1 day of
training for
net admin
staff
John Doe,
Lead
NetworkSys
Admin,
CorporateIT
Support
Team
1-
Feb-
2006
to4-
Feb-
2006
1. need
periodic test
& review of
config &
policy use
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
11
11.4.1 Security Plan Implementation
• given plan documents what is required
• identified personnel perform needed tasks
– to implement new or enhanced controls
– may need system configuration changes, upgrades
or new system installation
– or development of new / extended procedures
– with support from management
• monitored to ensure process correct
• when completed management approves
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
12
11.4.2 Security Training / Awareness
• responsible personnel need training
– on details of design and implementation
– awareness of operational procedures
• also need general awareness for all
– spanning all levels in organization
– essential to meet security objectives
– lack leads to poor practices reducing security
– aim to convince personnel that risks exist and
breaches may have significant consequences
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
13
11.4.3 Implementation Follow-up
• security management is cyclic, repeated
• need to monitor implemented controls
• evaluate changes for security implications
– otherwise increase chance of security breach
• have a number of aspects
• which may indicate need for changes in previous stages
of process
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
14
11.4.4 Maintenance
• need continued maintenance and monitoring of implemented
controls to ensure continued correct functioning and
appropriateness
• tasks include:
– periodic review of controls
– upgrade of controls to meet new requirements
– check system changes do not impact controls
– address new threats or vulnerabilities
• goal to ensure controls perform as intended
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
15
11.4.5 Security Compliance
• audit process to review security processes
• to verify compliance with security plan
• using internal or external personnel
• usually based on checklists to check
– suitable policies and plans were created
– suitable selection of controls were
chosen
– that they are maintained and used
correctly
• often as part of wider general audit
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
16
11.4.6 Change and Configuration Management
• change management is the process to review proposed
changes to systems
– evaluate security and wider impact of changes
– part of general systems administration process
– cf. management of bug patch testing and install
– may be informal or formal
• configuration management is keeping track of
configuration and changes to each system
– to help restoring systems following a failure
– to know what patches or upgrades might be relevant
– also part of general systems administration process
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
17
11.5 Monitoring Risk
11.5.1 Incident Handling
• need procedures specifying how to respond to a security
incident
– given will most likely occur sometime
• reflect range of consequences on org
• codify action to avoid panic
• e.g. mass email worm
– exploiting vulnerabilities in common apps
– propagating via email in high volumes
– should disconnect from Internet or not?
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
18
11.5.2 Types of Security Incidents
• any action threatening classic security services
• unauthorized access to a system
– unauthorized viewing by self / other of information
– bypassing access controls
– using another users access
– denying access to another user
• unauthorized modification of info on a system
– corrupting information
– changing information without authorization
– unauthorized processing of information
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
19
11.5.3 Managing Security Incidents
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
20
11.5.4 Detecting Incidents
• reports from users or admin staff
– encourage such reporting
• detected by automated tools
– e.g. system integrity verification tools, log
analysis tools, network and host intrusion
detection systems, intrusion prevention systems
– updated to reflect new attacks or vulnerabilities
– costly so deployed if risk assess justifies
• admins must monitor vulnerability reports
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
21
11.5.5 Responding to Incidents
• need documented response procedures
– how to identify cause of the security incident
– describe action taken to recover from it
• procedures should
– identify typical categories of incidents and approach taken
to respond
– identify management personnel responsible for making
critical decisions and their contacts
– whether to report incident to police / CERT etc
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
22
11.5.6 Documenting Incidents
• need to identify vulnerability used
• and how to prevent it occurring in future
• recorded details for future reference
• consider impact on org and risk profile
– may simply be unlucky
– more likely risk profile has changed
– hence risk assessment needs reviewing
– followed by reviewing controls in use
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 

Was ist angesagt? (20)

Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Information security management
Information security managementInformation security management
Information security management
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
8. operations security
8. operations security8. operations security
8. operations security
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Security policies
Security policiesSecurity policies
Security policies
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 

Ähnlich wie It security controls, plans, and procedures

Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
 
crisc_wk_4.pptx
crisc_wk_4.pptxcrisc_wk_4.pptx
crisc_wk_4.pptxdotco
 
CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxrajalakshmi5921
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleDonald E. Hester
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effortDhani Ahmad
 
Human resources security
Human resources securityHuman resources security
Human resources securityCAS
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Information system implementation, change management and control
Information system implementation, change management and controlInformation system implementation, change management and control
Information system implementation, change management and controlShruti Pendharkar
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityDr. Lasantha Ranwala
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.pptit160320737038
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 

Ähnlich wie It security controls, plans, and procedures (20)

Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Chap01
Chap01Chap01
Chap01
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
crisc_wk_4.pptx
crisc_wk_4.pptxcrisc_wk_4.pptx
crisc_wk_4.pptx
 
CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptx
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
CH18-CompSec4e.pptx
CH18-CompSec4e.pptxCH18-CompSec4e.pptx
CH18-CompSec4e.pptx
 
Information system implementation, change management and control
Information system implementation, change management and controlInformation system implementation, change management and control
Information system implementation, change management and control
 
Compliance
ComplianceCompliance
Compliance
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 

Mehr von CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyCAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve thisCAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Database security
Database securityDatabase security
Database securityCAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)CAS
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2CAS
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1CAS
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systemsCAS
 

Mehr von CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systems
 

Kürzlich hochgeladen

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Kürzlich hochgeladen (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

It security controls, plans, and procedures

  • 1. 1 IT SECURITY CONTROLS, PLANS, AND PROCEDURES ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES Mr. RAJASEKAR RAMALINGAM Department of IT, College of Applied Sciences, Sur. Sultanate of Oman. http://vrrsekar.wixsite.com/raja Based on William Stallings, Lawrie Brown, Computer Security: Principles and Practice, Third Edition
  • 2. CONTENT 11.1 IT Security Management Implementation 11.2 Security Controls or Safeguards 11.3 IT Security Plan 11.4 Implementation of Controls 11.5 Monitoring Risks ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES 2
  • 3. 3 11.1 IT Security Management Implementation ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 4. 4 11.2 Controls or Safeguards • Controls or safeguards are – practices, procedures or mechanisms which may protect against a threat, reduce a vulnerability, limit the impact of an unwanted incident, detect unwanted incidents and facilitate recover • Classes of controls: – management – operational – technical ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 5. 5 11.2.1 Technical Controls ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 6. 6 11.2.2 Lists of Controls CLASS CONTROL FAMILY Management Risk Assessment Management Planning Management System and Services Acquisition Management Certification, Accreditation, and Security Assessments Operational Personnel Security Operational Physical and Environmental Protection Operational Contingency Planning Operational Configuration Management Operational Maintenance Operational System and Information Integrity Operational Media Protection Operational Incident Response Operational Awareness and Training Technical Identification and Authentication Technical Access Control Technical Audit and Accountability Technical System and Communications Protection ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 7. 7 11.2.3 Residual Risk ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 8. 8 11.2.4 Cost-Benefit Analysis • conduct to determine appropriate controls – greatest benefit given resources available • qualitative or quantitative • show cost justified by reduction in risk • contrast impact of implementing it or not • management chooses selection of controls • considers if it reduces risk too much or not enough, is too costly or appropriate • fundamentally a business decision ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 9. 9 11.3 IT Security Plan • provides details of – what will be done – what resources are needed – who is responsible • should include – risks, recommended controls, action priority – selected controls, resources needed – responsible personnel, implementation dates ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 10. 10 11.4 Implementation Plan Risk (Asset/Threat) Level of Risk Recommended Controls Prio rity Selected Controls Required Resources Responsible Persons Start – End Date Other Comments Hacker attack on Internet Router High 1. disable external telnet access 2. use detailed auditing of privileged command use 3. set policy for strong admin passwords 4. set backup strategy for router config file 5. set change control policy for the router configuration 1 1. 2. 3. 4. 5. 1. 3 daysIT net admin time to change & verify router config, write policies; 2. 1 day of training for net admin staff John Doe, Lead NetworkSys Admin, CorporateIT Support Team 1- Feb- 2006 to4- Feb- 2006 1. need periodic test & review of config & policy use ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 11. 11 11.4.1 Security Plan Implementation • given plan documents what is required • identified personnel perform needed tasks – to implement new or enhanced controls – may need system configuration changes, upgrades or new system installation – or development of new / extended procedures – with support from management • monitored to ensure process correct • when completed management approves ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 12. 12 11.4.2 Security Training / Awareness • responsible personnel need training – on details of design and implementation – awareness of operational procedures • also need general awareness for all – spanning all levels in organization – essential to meet security objectives – lack leads to poor practices reducing security – aim to convince personnel that risks exist and breaches may have significant consequences ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 13. 13 11.4.3 Implementation Follow-up • security management is cyclic, repeated • need to monitor implemented controls • evaluate changes for security implications – otherwise increase chance of security breach • have a number of aspects • which may indicate need for changes in previous stages of process ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 14. 14 11.4.4 Maintenance • need continued maintenance and monitoring of implemented controls to ensure continued correct functioning and appropriateness • tasks include: – periodic review of controls – upgrade of controls to meet new requirements – check system changes do not impact controls – address new threats or vulnerabilities • goal to ensure controls perform as intended ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 15. 15 11.4.5 Security Compliance • audit process to review security processes • to verify compliance with security plan • using internal or external personnel • usually based on checklists to check – suitable policies and plans were created – suitable selection of controls were chosen – that they are maintained and used correctly • often as part of wider general audit ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 16. 16 11.4.6 Change and Configuration Management • change management is the process to review proposed changes to systems – evaluate security and wider impact of changes – part of general systems administration process – cf. management of bug patch testing and install – may be informal or formal • configuration management is keeping track of configuration and changes to each system – to help restoring systems following a failure – to know what patches or upgrades might be relevant – also part of general systems administration process ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 17. 17 11.5 Monitoring Risk 11.5.1 Incident Handling • need procedures specifying how to respond to a security incident – given will most likely occur sometime • reflect range of consequences on org • codify action to avoid panic • e.g. mass email worm – exploiting vulnerabilities in common apps – propagating via email in high volumes – should disconnect from Internet or not? ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 18. 18 11.5.2 Types of Security Incidents • any action threatening classic security services • unauthorized access to a system – unauthorized viewing by self / other of information – bypassing access controls – using another users access – denying access to another user • unauthorized modification of info on a system – corrupting information – changing information without authorization – unauthorized processing of information ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 19. 19 11.5.3 Managing Security Incidents ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 20. 20 11.5.4 Detecting Incidents • reports from users or admin staff – encourage such reporting • detected by automated tools – e.g. system integrity verification tools, log analysis tools, network and host intrusion detection systems, intrusion prevention systems – updated to reflect new attacks or vulnerabilities – costly so deployed if risk assess justifies • admins must monitor vulnerability reports ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 21. 21 11.5.5 Responding to Incidents • need documented response procedures – how to identify cause of the security incident – describe action taken to recover from it • procedures should – identify typical categories of incidents and approach taken to respond – identify management personnel responsible for making critical decisions and their contacts – whether to report incident to police / CERT etc ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 22. 22 11.5.6 Documenting Incidents • need to identify vulnerability used • and how to prevent it occurring in future • recorded details for future reference • consider impact on org and risk profile – may simply be unlucky – more likely risk profile has changed – hence risk assessment needs reviewing – followed by reviewing controls in use ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES