chapter 2 information security overview the executive guide to information security manual

19
Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Upload: samantha-maxwell

Post on 11-Jan-2016

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Chapter 2 Information Security Overview

The Executive Guide to Information Security manual

Page 2: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Introduction • Infor Security Programs requires solutions

from:• People • Process• Technology

• People administers security programs & processes to ensure info are protected

• Using Technology, Layered Security (defense in depth) can be develop to protect information assets.

Page 3: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Overview

• Information Security Principles & components of Info Sec program for Enterprises

• Review of major security technologies & best practices

• Foundation for more in-depth security review in subsequent classes.

Page 4: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

3 Major components of Info. Sec. Program

• People play a critical role in Information Security .

• Processes provides guidelines for securing information assets

• Technology enables security programs to be executed.

• What is the weakest link in Info Sec.?

Page 5: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

People

• Having the right people in Key positions is paramount to a successful Security Program.

WHY???• Skills • Change management• SOD• Many other reasons

Page 6: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Process • Provides a framework/standards for People to execute security operations

• What are some of the processes?– Policies– Procedures– Guidelines– Work Aids – Training– Risks & Security Assessments

• Access on the Principle of Lease Privilege (Need-to-Know)

– Others • Process serves as the “glue” bwt

PEOPLE & TECH to ensure Security Programs are operating effectively

Page 7: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

• The most vast and complicated component of the Security Program.

Why is Technology the most complicated components?

• Variety of products currently in market

• Products don’t all work in sync together

• Need special knowledge to run different security applications.

• Constant upgrades/maintenance to ensure product operates in an optimal manner

Page 8: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Defense – in – Depth • Layer security for– Gateway – entryway btw 1 part of the environment to

another (internet to network)– Server – PCs that performs shared functions (ERP, SAP,

PeopleSoft) – Client – desktops, laptops, PDAs, others that

employees used daily • 4 Major zones for defense

1. External (internet)2. Extranet3. Intranet4. Missions Critical systems

Page 9: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Example of Layering Security

Page 10: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Today’s Security Technology

• Authentication, Authorization & Accounting (AAA)

• Firewalls/Virtual Private Network (VPN)• Anti-Virus software• Intrusion Detection/Intrusion Prevention

(IDS/IPS)• Content filtering• Encryption

Page 11: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Authentication, Authorization & Accounting (AAA)

What are some examples of Security tools?• Access Control List (ACL)

• RSA tokens • Smart cards• Biometric

What is a 2 factor authentication?• Something you know• Something you have

Page 12: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Privilege Access

• What is privilege access?– Admin, Super user, sys admin, utility, etc.

• How should privilege access be controlled?– Limit access, daily/wkly/monthly monitoring,

mandatory access change control, etc.• What is Single Sign on (SSO) & how should this be

controlled?– Access on the concept of Lease privilege– Monitor & timely removal of access when not in use

for 30 days. – Periodic password change

Page 13: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Firewalls

• What is a firewall?– Filters electronic traffics to allow only certain types

of information to flow to the CO’s network• What are the 3 type of firewalls?– Packet Filtering – reviews the header/address– Statefull Inspection- verify the inbound packet

matches the outbound request (identifies legitimacy of source ie addresses on a letter)

– Proxy firewall-read & rewrite ea. packet to only allow valid messages to pass to the network. More secure at a slower speed.

Page 14: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Virtual Private Networks (VPN)

• What is VPN?– Tool that enables secure connection the network

when using public network (internet)– Use encryption to protect data (tunnel)– Uses hardware & software combo to secure access

Page 15: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Anti-Virus Software

• Why should you install updated anti-virus?– Prevent pc infection from virus, worms, Trojan

horse, malware in general– Virus vs Worms- what is the difference?

• Signature vs Heuristic virus– Signature relays on know pattern – Heuristic looks for pattern of potential virus (lots

of false positives)

Page 16: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Vulnerability Management

• Network based & Host based– Network base identify know vulnerabilities on the

network – Host based scan physical devices ( servers)

• Patch management• Intrusion Detection System (IDS)• Intrusion Prevention System (IPS)• Content Filtering • Encryption (symmetric & asymetric)

Page 17: Chapter 2 Information Security Overview The Executive Guide to Information Security manual

Summary Key Points

• Effective info sec program use a combination of People, Process & Technology

• People are the weakest link, therefore, it is the most important aspect of the program

• Process is the gel that binds People & Technology to effectively protect information assets

• Technology can be use to layer security for Defense –in-Depth approach to protect information asset.

Page 18: Chapter 2 Information Security Overview The Executive Guide to Information Security manual
Page 19: Chapter 2 Information Security Overview The Executive Guide to Information Security manual