Hybridoma Technology ( Production , Purification , and Application )
Introduction to the management of information security
1. 1
University of Technology
Computer Science Department
UCHAPTER 1
Introduction to the Management of Information Security
U(1)
UPrepared by
SAMMER A.QADER
2017
2. 2
If this is the information superhighway, it’s going through a lot of
bad, bad, neighborhoods.-- DORIAN BERGER, 1997
UObjectives
Upon completion of this material, you should be able to:
Describe the importance of the manager’s role in securing an organization’s
use of information technology, and understand who is responsible for
protecting an organization’s information assets
Enumerate and discuss the key characteristics of information security
Know & understand the definition & key characteristics of leadership &
management
Recognize the characteristics that differentiate information security
management from general management
1.1 UIntroduction:
• Information technology is critical to business and society ... & always has been
(what happens if it’s not available?)
• Computer security is evolving into information security.
• Information security is the responsibility of every member of an organization, but
managers play a critical role.
U1.2 Information security involves 3 distinct communities of interest:
Organizations must realize that information security funding and planning decisions
involve more than just technical managers, such as information security managers or
members of the information security team. Altogether, they should involve three distinct
groups of decision makers, or communities of interest:
1- Information security managers & professionals.
2- Information technology managers & professionals.
3- Non-technical business managers & professionals.
3. 3
1.3U Communities of Interest :
The communities of interest and the roles they fulfill include the following:
Information security community: protect information assets from threats
IT community: support business objectives by supplying appropriate information
technology
Business community: policy and resources
1.4 UWhat Is Security?
In order to understand the varied aspects of information security, you must know the
definitions of certain IT terms and concepts. This knowledge enables you to
communicate effectively with the IT and information security communities.
• The quality or state of being secure—to be free from danger.
• Security is achieved using several strategies altogether.
U1.4.1 Specialized Areas of Security :
Physical security: Protecting people, physical assets, and the workplace from
various threats, including fire, unauthorized access, and natural disasters .
Operations security: Protecting the organization’s ability to carry out its
operational activities without interruption or compromise .
Communications security : Protecting the organization’s communications media,
technology, and content, and its ability to use these tools to achieve the
organization’s objectives
Network security: Protecting the organization’s data networking devices,
connections, and contents as well as protecting the ability to use that network to
accomplish the organization’s data communication functions.
4. 4
U1.4.2 Information Security :
is the protection of information and its critical characteristics (confidentiality, integrity,
and availability), including the systems and hardware that use, store, and transmit that
information, through the application of policy, training and awareness programs, and
technology. Figure 1-1 shows that InfoSec includes:
InfoSec includes information security management, computer security, data
security, and network security
Policy is a central to all information security efforts figure (1.1)
Components of Information Security
Figure (1.1)
6. 6
U1.4.3 CIA Triangle
The C.I.A. triangle is made up of:
– Confidentiality
– Integrity
– Availability
Over time the list of characteristics has expanded, but these three remain central
Figure (1.3)
7. 7
U1.5 Characteristics Key Concepts of Information Security include :
1. Confidentiality: Ensures that only those with sufficient privileges may access
certain information.
• Information classification
• Secure document storage
• Application of general security policies
• Education of information.
2. Integrity : is the quality or state of being whole, complete, and uncorrupted
• The integrity of information is threatened when it is exposed to
corruption, damage, destruction, or other disruption of its authentic state
• Corruption can occur while information is being compiled, stored, or
transmitted
3. Availability : Availability is making information accessible to user access
without interference or obstruction in the required format
• A user in this definition may be either a person or another
computer system
• Availability means availability to authorized users
4. Privacy :
• Information is to be used only for purposes known to the
data owner
• This does not focus on freedom from observation, but rather
that information will be used only in ways known to the
owner
5. Identification:
• Information systems possess the characteristic of identification when they are
able to recognize individual users
• Identification and authentication are essential to establishing the level of access
or authorization that an individual is granted
6. Authentication :
• Authentication occurs when a control provides proof that a user
possesses the identity that he or she claims
8. 8
7. Authorization
• After the identity of a user is authenticated, a process called
authorization provides assurance that the user (whether a person or a
computer) has been specifically and explicitly authorized by the proper
authority to access, update, or delete the contents of an information asset
8. Accountability
• The characteristic of accountability exists when a control provides
assurance that every activity undertaken can be attributed to a named
person or automated process
U1.6 What Is Management?
A process of achieving objectives using a given set of resources
To manage the information security process, first understand core principles of
management
A manager is “someone who works with and through other people by coordinating
their work activities in order to accomplish organizational goals”
U1.6.1 Managerial Roles
Informational role: Collecting, processing, and using information to achieve the
objective
Interpersonal role: Interacting with superiors, subordinates, outside stakeholders,
and other
Decisional role: Selecting from alternative approaches and resolving conflicts,
dilemmas, or challenges
U1.6.2 Differences Between Leadership and Management
The leader influences employees so that they are willing to accomplish objectives
He or she is expected to lead by example and demonstrate personal traits that
instill a desire in others to follow
Leadership provides purpose, direction, and motivation to those that follow
9. 9
A Manager administer the resources of the organization by
– Creating budgets
– Authorizes expenditures
– Hires employees
A Manager can also be a leader.
U1.6.3 Characteristics of a Leader
1. Patience
2. Courage
3. Decisiveness
4. Dependability
5. Endurance
6. Initiative
7. Integrity
8. Justice
9. Knowledge
10. Tact
U1.6.4 What Makes a Good Leader?
Action plan for improvement of leadership abilities
1. Knows and seeks self-improvement
2. Be technically and tactically proficient
3. Seek responsibility and take responsibility for your actions
4. Make sound and timely decisions and Set the example
U1.6.5 Behavioral Types of Leaders
Three basic behavioral types of leaders:
– Autocratic- action-oriented, “Do as I say”
– Democratic – action-oriented and likely to be less efficient
– Laissez-faire – laid-back.
10. 10
U1.7 Characteristics of Management
Two well-known approaches to management:
– Traditional management theory using principles of planning, organizing,
staffing, directing, and controlling (POSDC)
– Popular management theory categorizes principles of management into
planning, organizing, leading, and controlling (POLC)
UPlanning
Planning: process that develops, creates, and implements strategies for the
accomplishment of objectives
Three levels of planning:
– Strategic – occurs at highest level of organization
– Tactical – focuses on production planning and integrates organizational
resources
– Operational – focuses on day-to-day operations of local resources
In general, planning begins with the strategic plan for the whole organization
– To do this successfully, organization must thoroughly define its goals and
objectives
UOrganization
Organization: is a principle of management dedicated to structuring of
resources to support the accomplishment of objectives
Organizing tasks requires determining:
– What is to be done
– In what order
– By whom
– By which methods
– When
11. 11
ULeadership
Encourages the implementation of the planning and organizing functions,
including supervising employee behavior, performance, attendance, and attitude
Leadership generally addresses the direction and motivation of the human resource
UControl
Control:
– Monitoring progress toward completion
– Making necessary adjustments to achieve the desired objectives
Controlling function determines what must be monitored as well using
specific control tools to gather and evaluate information
USolving Problems
All managers face problems that must be solved.
Step 1: Recognize and Define the Problem
Step 2: Gather Facts and Make Assumptions
Step 3: Develop Possible Solutions
Step 4: Analyze and Compare the Possible Solutions
Step 5: Select, Implement, and Evaluate a Solution
U1.7.1 Principles Of Information Security Management
Information security management is part of the organizational management team.
The extended characteristics of information security are known as the six Ps:
• Planning
• Policy
• Programs
• Protection
• People
• Project Management
12. 12
U1.7.2 Information Security Planning
Included in the InfoSec planning model are activities necessary to support the
design, creation, and implementation of information security strategies as they
exist within the IT planning environment
U1.7.3 Information Security Planning Types
Several types of InfoSec plans exist:
• Incident response
• Business continuity
• Disaster recovery
• Policy
• Personnel
• Technology rollout
• Risk management and Security program including education, training and
awareness
UPolicyU:
Policy: set of organizational guidelines that dictates certain behavior within the
organization
In InfoSec, there are three general categories of policy:
• General program policy (Enterprise Security Policy)
• An issue-specific security policy (ISSP)
• System-specific policies (SSSPs)
UPrograms
Programs: specific entities managed in the information security domain , a security
education training and awareness (SETA) program is one such entity
Other programs that may emerge include a physical security program, complete
with fire, physical access, gates, guards, and so on
UProtection
Risk management activities, including risk assessment and control, as well as
protection mechanisms, technologies, and tools.
UPeople
13. 13
People are the most critical link in the information security program.
It is imperative that managers continuously recognize the crucial role that people
play
Including information security personnel and the security of personnel, as well as
aspects of the SETA program
U1.8 Project Management
The final component of a security manager’s skill set is the use of a project management
Approach. Whether the task is to roll out a new security training program or to select and
Implement a new firewall; it is important that the process be managed as a project
Project management discipline should be present throughout all elements of the
information security program.
UInvolves
• Identifying and controlling the resources applied to the project
• Measuring progress and adjusting the process as progress is made toward the
goal