SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Security Policies and
Standards
Introduction
 Organization
 Collection of people working together toward a common goal
 Must have clear understanding of the rules of acceptable behavior
 Policy
 Conveys management’s intentions to its employees
 Effective security program
 Use of a formal plan to implement and manage security in the
organization
Policies,
Standards, and
Procedures
 Policy
 Set of guidelines or instructions
 Organization’s senior management implements
 Idea
 Standards
 More detailed descriptions of what must be done to comply with
policy
 Specifics and outline
 Procedures
 How to accomplish the policies and standards
Effective
Policies
 For a policy to be considered effective and legally enforceable:
 Dissemination
 Distribution of the information
 Is it in a readily available place?
 Review
 Has it been read?
 Who is reading it?
 Comprehension
 Is it understandable?
 Too confusing?
 Compliance
 Acknowledge vs. Agree
 Uniform enforcement
 How are violations being handled?
What Drives
Policy
Development?
 Mission of an organization
 Written statement of purpose of organization
 Usually Not Modified
 Vision of an organization
 Witten statement of the organization’s long-term goals
 Occasionally Modified
 Strategic planning
 Process of moving the organization toward its vision.
 Constantly Reworked to promote progress
 Security policy
 Set of rules that protects an organization’s assets
 Question:What are some security policies you are aware of?
Types of
Information
Security
Policies
 Information security policy
 Set of rules for the protection of an organization’s information
assets
 Enterprise information security policies
 General security policy
 Issue-specific security policies
 Specific technology policy
 Systems-specific security policies
 Configurations
Enterprise
Information
Security Policy
(EISP)
 Supports the mission, vision, and direction of the organization
 Sets the strategic direction, scope, and tone for all security efforts
 Executive-level document
 Drafted by organization’s chief information officer
 Expresses the security philosophy within the IT environment
 Guides the development, implementation, and management of
the security program
 Address an organization’s need to comply with laws and
regulations in two ways:
 General compliance
 Identification of specific penalties and disciplinary actions
Components
of EISP
Issue-Specific
Security Policy
(ISSP)
 Addresses specific areas of technology
 Requires frequent updates
 Contains a statement on the organization’s position on a specific
issue
 May cover:
 Use of company-owned networks and the Internet
 Use of telecommunications technologies (fax and phone)
 Use of electronic mail
 Specific minimum configurations of computers to defend against
worms and viruses
 Prohibitions against hacking or testing organization security
controls
 Home use of company-owned computer equipment
 Use of personal equipment on company networks
 Use of photocopy equipment
Components
of ISSP
Systems-
Specific Policy
(SysSP)
 Appear with the managerial guidance expected in a policy
 Include detailed technical specifications not usually found in other types of
policy documents
 Managerial Guidance SysSPs
 Guide the implementation and configuration of a specific technology
 Technical Specifications SysSPs
 General methods for implementing technical controls
 Access control lists
 Set of specifications that identifies a piece of technology’s authorized users and
includes details on the rights and privileges those users have on that technology
 Access control matrix
 Combines capability tables and ACLs
 Configuration rules
 Specific instructions entered into a security system to regulate how it reacts to the
data it receives
 Rule-based policies
 More specific to a system’s operation than ACLs
 May or may not deal with users directly
Frameworks
and Industry
Standards
 Security blueprint
 Basis for the design, selection, and implementation of all security
program elements
 Security framework
 Outline of the overall information security strategy
 Roadmap for planned changes to the organization’s information
security environment
 The ISO 27000 Series
 NIST Model
NISTSecurity
Models
 Computer Security Resource Center (CSRC) publications
 SP 800-14: Generally Accepted Principles and Practices for Securing
InformationTechnology Systems
 Lists the principles and practices to be used in the development of a
security blueprint
 SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
 Provides an overview of the capabilities and technologies of firewalls
and firewall policies
 SP 800-53 Rev. 3: Recommended Security Controls for Federal
Information Systems and Organizations
 Describes the selection and implementation of security controls for
information security to lower the possibility of successful attack from
threats
 SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in
Federal Information Systems: Building Effective Security
Assessment Plans
 Provides a systems developmental lifecycle approach to security
assessment of information systems
Other NIST
Perimeter
Defense
Publications
Benchmarking
and Best
Practices
 Best practices
 Procedures that are accepted or prescribed as being correct or most
effective
 Benchmarking
 Evaluation against a standard
 Spheres of security - Generalized foundation of a good security
framework
 Controls -Implemented between systems and the information,
between networks and the computer systems, and between the
Internet and internal networks
 Information security - Designed and implemented in three layers:
policies, people (education, training, and awareness programs), and
technology
Spheres of
Security
Security
Education,
Training, and
Awareness
Program
 Education, training, and awareness (SETA) program
 Responsibility of the CISO
 Control measure designed to reduce the incidences of accidental
security breaches by employees
 Designed to supplement the general education and training
programs
Purpose of
SETA
 The Program Elements:
 Security education
 Provide Opportunity , Inform
 TheWhy
 Security training
 Hands-on Education and Experience
 The How
 Security awareness
 Reinforce
 TheWhat
 Purpose of SETA is to enhance security by:
 Improving awareness of the need to protect system resources
 Developing skills and knowledge so computer users can perform
their jobs more securely
 Building in-depth knowledge, as needed, to design, implement, or
operate security programs for organizations and systems
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
DTCC’sOwn
Newsletter
Summary
 Policy
 Basis for all information security planning, design, and deployment
 Security team develops a design blueprint used to implement the
security program
 Implement a security education, training, and awareness (SETA)
program
 Supplement the general education and training programs

Weitere ähnliche Inhalte

Was ist angesagt?

Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards ComplianceDr. Prashant Vats
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 

Was ist angesagt? (20)

Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Information security management
Information security managementInformation security management
Information security management
 
Security policies
Security policiesSecurity policies
Security policies
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Information security
Information securityInformation security
Information security
 
information security management
information security managementinformation security management
information security management
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 

Ähnlich wie Security Policies and Standards

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docxdurantheseldine
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managGrazynaBroyles24
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Bonagiri Rajitha
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxManushiKhatri
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 

Ähnlich wie Security Policies and Standards (20)

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
Chapter003
Chapter003Chapter003
Chapter003
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptx
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 

Mehr von primeteacher32

Mehr von primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Kürzlich hochgeladen

Bobby singh - Digital Marketing Service
Bobby singh -  Digital Marketing ServiceBobby singh -  Digital Marketing Service
Bobby singh - Digital Marketing ServiceBobby singh
 
Chapter 4 - Promoting Inclusive Culture.ppt
Chapter 4 - Promoting   Inclusive Culture.pptChapter 4 - Promoting   Inclusive Culture.ppt
Chapter 4 - Promoting Inclusive Culture.pptmoytopo
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3Ajumarkdiezmo1
 
Training for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptTraining for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptVidalMendoza5
 
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作rpb5qxou
 
Design, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxDesign, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxaaronbasko1
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping materialnadeemcollege26
 
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道7283h7lh
 
dentinalhypersensitivity, classification and material used
dentinalhypersensitivity,  classification and material useddentinalhypersensitivity,  classification and material used
dentinalhypersensitivity, classification and material usedaishwaryakhare5
 
The Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating PressThe Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating Pressmatingpress170
 
What is the career path of a VFX artist?
What is the career path of a VFX artist?What is the career path of a VFX artist?
What is the career path of a VFX artist?santoshjadhav126
 
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024Hector Del Castillo, CPM, CPMM
 
Get to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfGet to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfRaquel Thompson Barbados
 
Complete Benefits of career counseling in India
Complete Benefits of career counseling in IndiaComplete Benefits of career counseling in India
Complete Benefits of career counseling in IndiaMere Mentor
 
How to make career in advance 3d animation
How to make career in advance 3d animationHow to make career in advance 3d animation
How to make career in advance 3d animationsantoshjadhav126
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoubGhobrial1
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoubGhobrial1
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathanBaughman3
 
Senior IT Professional with Master’s Degree with 21+ years of experience is...
Senior IT Professional with Master’s Degree with 21+ years of experience   is...Senior IT Professional with Master’s Degree with 21+ years of experience   is...
Senior IT Professional with Master’s Degree with 21+ years of experience is...Anas Acharath Parakat
 
APSC Motor Vechile Inspector 18 Posts.pdf
APSC Motor Vechile Inspector 18 Posts.pdfAPSC Motor Vechile Inspector 18 Posts.pdf
APSC Motor Vechile Inspector 18 Posts.pdfsoumita869
 

Kürzlich hochgeladen (20)

Bobby singh - Digital Marketing Service
Bobby singh -  Digital Marketing ServiceBobby singh -  Digital Marketing Service
Bobby singh - Digital Marketing Service
 
Chapter 4 - Promoting Inclusive Culture.ppt
Chapter 4 - Promoting   Inclusive Culture.pptChapter 4 - Promoting   Inclusive Culture.ppt
Chapter 4 - Promoting Inclusive Culture.ppt
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3A
 
Training for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptTraining for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.ppt
 
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
 
Design, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxDesign, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptx
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping material
 
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
怎么办理美国UCLA毕业证加州大学洛杉矶分校学位证书一手渠道
 
dentinalhypersensitivity, classification and material used
dentinalhypersensitivity,  classification and material useddentinalhypersensitivity,  classification and material used
dentinalhypersensitivity, classification and material used
 
The Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating PressThe Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating Press
 
What is the career path of a VFX artist?
What is the career path of a VFX artist?What is the career path of a VFX artist?
What is the career path of a VFX artist?
 
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
 
Get to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfGet to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdf
 
Complete Benefits of career counseling in India
Complete Benefits of career counseling in IndiaComplete Benefits of career counseling in India
Complete Benefits of career counseling in India
 
How to make career in advance 3d animation
How to make career in advance 3d animationHow to make career in advance 3d animation
How to make career in advance 3d animation
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdf
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdf
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editor
 
Senior IT Professional with Master’s Degree with 21+ years of experience is...
Senior IT Professional with Master’s Degree with 21+ years of experience   is...Senior IT Professional with Master’s Degree with 21+ years of experience   is...
Senior IT Professional with Master’s Degree with 21+ years of experience is...
 
APSC Motor Vechile Inspector 18 Posts.pdf
APSC Motor Vechile Inspector 18 Posts.pdfAPSC Motor Vechile Inspector 18 Posts.pdf
APSC Motor Vechile Inspector 18 Posts.pdf
 

Security Policies and Standards

  • 2. Introduction  Organization  Collection of people working together toward a common goal  Must have clear understanding of the rules of acceptable behavior  Policy  Conveys management’s intentions to its employees  Effective security program  Use of a formal plan to implement and manage security in the organization
  • 3. Policies, Standards, and Procedures  Policy  Set of guidelines or instructions  Organization’s senior management implements  Idea  Standards  More detailed descriptions of what must be done to comply with policy  Specifics and outline  Procedures  How to accomplish the policies and standards
  • 4. Effective Policies  For a policy to be considered effective and legally enforceable:  Dissemination  Distribution of the information  Is it in a readily available place?  Review  Has it been read?  Who is reading it?  Comprehension  Is it understandable?  Too confusing?  Compliance  Acknowledge vs. Agree  Uniform enforcement  How are violations being handled?
  • 5. What Drives Policy Development?  Mission of an organization  Written statement of purpose of organization  Usually Not Modified  Vision of an organization  Witten statement of the organization’s long-term goals  Occasionally Modified  Strategic planning  Process of moving the organization toward its vision.  Constantly Reworked to promote progress  Security policy  Set of rules that protects an organization’s assets  Question:What are some security policies you are aware of?
  • 6. Types of Information Security Policies  Information security policy  Set of rules for the protection of an organization’s information assets  Enterprise information security policies  General security policy  Issue-specific security policies  Specific technology policy  Systems-specific security policies  Configurations
  • 7. Enterprise Information Security Policy (EISP)  Supports the mission, vision, and direction of the organization  Sets the strategic direction, scope, and tone for all security efforts  Executive-level document  Drafted by organization’s chief information officer  Expresses the security philosophy within the IT environment  Guides the development, implementation, and management of the security program  Address an organization’s need to comply with laws and regulations in two ways:  General compliance  Identification of specific penalties and disciplinary actions
  • 9. Issue-Specific Security Policy (ISSP)  Addresses specific areas of technology  Requires frequent updates  Contains a statement on the organization’s position on a specific issue  May cover:  Use of company-owned networks and the Internet  Use of telecommunications technologies (fax and phone)  Use of electronic mail  Specific minimum configurations of computers to defend against worms and viruses  Prohibitions against hacking or testing organization security controls  Home use of company-owned computer equipment  Use of personal equipment on company networks  Use of photocopy equipment
  • 11. Systems- Specific Policy (SysSP)  Appear with the managerial guidance expected in a policy  Include detailed technical specifications not usually found in other types of policy documents  Managerial Guidance SysSPs  Guide the implementation and configuration of a specific technology  Technical Specifications SysSPs  General methods for implementing technical controls  Access control lists  Set of specifications that identifies a piece of technology’s authorized users and includes details on the rights and privileges those users have on that technology  Access control matrix  Combines capability tables and ACLs  Configuration rules  Specific instructions entered into a security system to regulate how it reacts to the data it receives  Rule-based policies  More specific to a system’s operation than ACLs  May or may not deal with users directly
  • 12. Frameworks and Industry Standards  Security blueprint  Basis for the design, selection, and implementation of all security program elements  Security framework  Outline of the overall information security strategy  Roadmap for planned changes to the organization’s information security environment  The ISO 27000 Series  NIST Model
  • 13. NISTSecurity Models  Computer Security Resource Center (CSRC) publications  SP 800-14: Generally Accepted Principles and Practices for Securing InformationTechnology Systems  Lists the principles and practices to be used in the development of a security blueprint  SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy  Provides an overview of the capabilities and technologies of firewalls and firewall policies  SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations  Describes the selection and implementation of security controls for information security to lower the possibility of successful attack from threats  SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans  Provides a systems developmental lifecycle approach to security assessment of information systems
  • 15. Benchmarking and Best Practices  Best practices  Procedures that are accepted or prescribed as being correct or most effective  Benchmarking  Evaluation against a standard  Spheres of security - Generalized foundation of a good security framework  Controls -Implemented between systems and the information, between networks and the computer systems, and between the Internet and internal networks  Information security - Designed and implemented in three layers: policies, people (education, training, and awareness programs), and technology
  • 17. Security Education, Training, and Awareness Program  Education, training, and awareness (SETA) program  Responsibility of the CISO  Control measure designed to reduce the incidences of accidental security breaches by employees  Designed to supplement the general education and training programs
  • 18. Purpose of SETA  The Program Elements:  Security education  Provide Opportunity , Inform  TheWhy  Security training  Hands-on Education and Experience  The How  Security awareness  Reinforce  TheWhat  Purpose of SETA is to enhance security by:  Improving awareness of the need to protect system resources  Developing skills and knowledge so computer users can perform their jobs more securely  Building in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems
  • 25. Summary  Policy  Basis for all information security planning, design, and deployment  Security team develops a design blueprint used to implement the security program  Implement a security education, training, and awareness (SETA) program  Supplement the general education and training programs

Hinweis der Redaktion

  1. Security Education Investigate available courses from local institutions of higher learning or continuing education Centers of Excellence program Identifies outstanding universities that have both coursework in information security and an integrated view of information security in the institution itself 4th grade cyber security training Security Training Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely Industry training conferences and programs offered through professional agencies SETA resources Offer assistance in the form of sample topics and structures for security classes Security Awareness Designed to keep information security at the forefront of users’ minds Include newsletters, security posters, videos, bulletin boards, flyers, and trinkets