chapter 5 developing the security program presented by: jennifer, sergey & kalagee slides by:...

62
Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

Post on 21-Dec-2015

221 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

Chapter 5 Developing the Security

ProgramPresented by: Jennifer, Sergey & Kalagee

Slides by: Ryan

Page 2: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2

Outline

• Introduction

• Organizing for Security

• Information Security Placement

• Components of the Security Program

• Information Security Roles and Titles

• Security Education, Training, and Awareness

Page 3: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3

Introduction

• Security Program

– Entire set of personnel, plans, and policies related to Information Security

• Information Security

– Corporate or physical security

• Information Security Program

– Structured effort to contain risks to information assets

Page 4: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

4

Organizing for Security

• Security Program Influences– Organizational culture– Company size and available resources– Security personnel and capital budget

Page 5: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

5

Organization Sizes

• Small (10-100 computers)– 20% of IT budget

• Medium (100-1,000 computers)– 11% of IT budget

• Large (1,000-10,000 computers)– 5% of IT budget security

• Very Large (10,000+ computers)– 6% of IT budget

Page 6: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

6

Information Security Functions

• Risk Assessment• Risk Management• Systems Testing• Policy• Legal Assessment• Incident Response• Planning• Vulnerability

Assessment

• Measurement• Compliance• Centralized

Authentication• Systems Security

Administration• Training• Network Security

Administration

Page 7: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

7

Security Function Distribution• Non-technology business units

– Legal assessment and training• IT groups outside of information security

– Systems and network administration• Information security as customer service

– Planning, testing, risk assessment, incident response, vulnerability assessment

• Information security as compliance enforcement– Policy, compliance, and risk management

Page 8: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

8

Large Org. Staffing

Page 9: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

9

Very Large Org. Staffing

Page 10: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

10

Medium Org. Staffing

Page 11: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

11

Small Org. Staffing

Page 12: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

12

Security Placement

• Openness to new ideas• Clout with top management• Respect in the eyes of a wide variety of

employees• Comfort and familiarity with information

security concepts• Willingness to defend the best interest of

the organization in the long run

Page 13: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

13

Security Placement Locations• IT

• Security

• Administrative Services

• Insurance and Risk Management

• Strategy and Planning

• Legal

• Internal Audit

• Help Desk

• Accounting and Finance Through IT

• Human Resources

• Facilities Management

• Operations

Page 14: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

14

IT

Page 15: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

15

Security

Page 16: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

16

Administrative Services

Page 17: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

17

Insurance & Risk

Page 18: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

18

Strategy & Planning

Page 19: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

19

Legal

Page 20: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

20

Other Options

• Internal Audit

• Help Desk

• Accounting and Finance Through IT

• Human Resources

• Facilities Management

• Operations

Page 21: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2121

Components of the Security Program

• InfoSec needs are unique to culture, size, and budget of organization

• Guided by mission and vision statements

• CIO and CISO use mission and vision statements to formulate InfoSec program mission statement

Page 22: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2222

Elements of a Security Program (NIST)

• Policy• Program management• Risk management• Life-cycle planning• Personnel and user issues• Contingency and disaster recovery

planning• Computer security incident handling

Page 23: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2323

Elements of a Security Program (NIST)

• Awareness and training

• Security considerations

• Physical and environmental security

• Identification and authentication

• Logical access control

• Audit trails

• Cryptography

Page 24: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2424

Information Security Roles and Titles

• Those that define– Provide policies, guidelines, and standards

• Those that build– Create and install security solutions

• Those that administer– Monitor and improve the security process

Page 25: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2525

Job Function Categories

• Chief Information Security Officer (CISO)• Security manager• Security administrator/analyst• Security technician• Security staffer• Security consultant• Security officer and investigator• Help desk personnel

Page 26: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2626

Chief Information Security Officer (CISO)

• Assessment, management, and implementation of the InfoSec program

• Other Titles– Manager for Security– Security Administrator

• Most cases reports to CIO

Page 27: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2727

Security Manager

• Oversee day-to-day operation of the InfoSec program– Scheduling– Setting priorities– Administering procedural tasks

• Report to CISO

• Some technical knowledge

Page 28: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2828

Security Administrator/Analyst

• Have both technical knowledge and managerial skill

• Manage day-to-day operation of the InfoSec program

• Assist in development and delivery of training programs and policies

Page 29: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

2929

Security Technician

• Subject matter experts

• Implement security software

• Diagnose and troubleshoot problems

• Coordinate with administrators to ensure security is properly implemented

• Tend to be specialized

Page 30: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3030

Security Staffer

• Individuals who perform routine watch-standing activities– Intrusion detection consoles– Monitor email– Perform routine, yet critical, tasks

Page 31: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3131

Security Consultants

• Expert in some aspect of InfoSec– Disaster recovery– Business continuity planning– Policy development– Strategic planning

Page 32: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3232

Security Officers and Investigators

• Sometimes necessary to protect highly sensitive data from physical threats

• Three G’s of physical security– Guards– Gates– Guns

Page 33: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3333

Help Desk Personnel

• Enhances security team’s ability to identify potential problems

• Must be prepared to identify and diagnose problems– Traditional technical problems– Threats to information security

Page 34: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3434

Security Education, Training, and Awareness (SETA)

• Responsibility of CISO• Designed to reduce accidental security

breaches• Can improve employee behavior• Inform members of the organization

about where to report violations of policy• Allows organizations to hold employees

accountable for their actions

Page 35: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3535

Purpose of SETA

• Enhance security– By building in-depth knowledge to design,

implement, or operate security programs for organizations and systems

– By developing skills and knowledge so that computer users can perform their jobs more securely

– By improving awareness of the need to protect system resources

Page 36: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3636

Security Education

• Information security training programs must address:– Information security educational

components– General education requirements

Page 37: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3737

Developing InfoSec Curricula

• InfoSec standards– ACM– IEEE– ABET

• No security curricula models

Page 38: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3838

Developing InfoSec Curricula

• Must carefully map expected learning outcomes

• Knowledge map– Helps potential students assess various

InfoSec programs– Identifies skills and knowledge clusters

obtained by program graduates

Page 39: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

3939

InfoSec Knowledge Map

Page 40: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

4040

Security Training

• Provides employees with hands-on training

• In-house or outsourced

• NIST provides free InfoSec training documents – NIST SP 800-16

Page 41: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

4141

Security Training

• Customizing training by functional background– General user– Managerial user– Technical user

• Job category• Job function• Technology product

Page 42: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

4242

Security Training

• Customizing training by skill level– Novice– Intermediate – Advanced

Page 43: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

4343

Training for General Users

• Commonly during employee orientation

• Employees are educated on a wide variety of policies– Good security practices– Password management– Specialized access controls– Violation reporting

Page 44: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

4444

Training for Managerial Users

• Similar to general training

• More personalized

• Small groups

• More interaction and discussion

Page 45: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

4545

Training for Technical Users

• Developing advanced technical training– By job category– By job function– By technology product

Page 46: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

46

Training Techniques

• Use correct teaching methods

• Take advantage of latest learning technology

• Use best practices

• On-site training is beneficial

Page 47: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

47

Delivery Methods

• Delivery method choice is influenced by– Budget– Scheduling– Needs of organization

• Delivery methods– One-on-one– Formal Class– Computer-Based Training (CBT)

Page 48: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

48

Delivery Methods (cont)

• Distance learning

• Web Seminars

• User Support Group

• On-Site Training

• Self-Study

Page 49: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

49

Selecting Training Staff

• Local training program• Continuing education department• External training agency• Hire a professional trainer• Hire a consultant, or someone from an

accredited institution to conduct on-site training

• organize and conduct training in-house using its own employees.

Page 50: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

50

Implementing Training

1. Identify program scope, goals and objectives

2. Identify training staff3. Identify target audiences4. Motivate management and employees5. Administer the program6. Maintain the program7. Evaluate the program

Page 51: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

51

Security Awareness• Change organizational

culture to realize importance of InfoSec

• Users need to be reminded of the standards and procedures

• Gives employees sense of responsibility and importance

Page 52: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

52

Security Awareness Program

• Focus on people• Don’t use technical jargon• Use every available medium• Defines a learning objective • Helps users understand their roles• Don’t overload users with too much information• Take advantage of in-house communication• Make the awareness program formal• Provide good information early

Page 53: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

53

Employee Behavior and Awareness

• Educate employees on how to– Properly handle information– Use applications– Operate within the organization

• This minimizes risk of accidental compromise, damage, or destruction of information

Page 54: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

54

Employee Accountability

• Effective training programs make employees accountable for their actions

• “Ignorance of the law excuses no one”

• A constant reminder of the consequences of abusing or misusing information resources can help protect the organization against lawsuits

Page 55: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

55

Awareness Techniques

• Changes based on intended audience

• Security awareness program – can use many methods to deliver its

message– developed with the assumption that people

tend to practice a tuning out process– awareness techniques should be creative

and frequently changed

Page 56: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

56

Developing Security Awareness Components

• Videos• Posters and banners• Lectures and

conferences• Computer-based

training• Newsletters• Brochures and flyers• Trinkets• Bulletin boards

Page 57: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

57

Posters

Page 58: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

58

Newsletters

• Cost-effective• Distributed via e-mails, hard-copy or

intranet• Consists of front page, index, volume,

contact information. • May contains articles, policies, how-to’s,

security events, upgrades, incidents, etc.

Page 59: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

59

Trinket Program

• Most expensive• Gets attention

instantly• Mugs, calendars, t-

shirts, pens, holders, etc.

Page 60: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

60

InfoSec Awareness Website

Tips– Don’t reinvent– Plan ahead– Minimal page loading time– Attractive look and feel – Always seek feedback– Test everything. Assume nothing– Promote the website

Page 61: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

61

Conclusions

• Information security programs can be dramatically different for organizations of varying size but they all have the same goal– To secure information and information assets

• This is achieved by – Optimal placement of InfoSec within organization– Security, education, and awareness training

(SETA)

Page 62: Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan

62

Questions?