1 / 66

MANAGEMENT of INFORMATION SECURITY Third Edition

MANAGEMENT of INFORMATION SECURITY Third Edition. Chapter 2 Planning for Security. You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra. Objectives. Upon completion of this material, you should be able to:

gail-wilson
Download Presentation

MANAGEMENT of INFORMATION SECURITY Third Edition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MANAGEMENT of INFORMATION SECURITY Third Edition Chapter2 Planning for Security You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

  2. Objectives • Upon completion of this material, you should be able to: • Identify the roles in organizations that are active in the planning process • Explain the principal components of information security system implementation planning in the organizational planning scheme • Differentiate between strategic organizational InfoSec and specialized contingency planning Management of Information Security, 3rd Edition

  3. Objectives (cont’d.) • Upon completion of this material, you should be able to: (cont’d.) • Describe the unique considerations and relationships between strategic and contingency plans Management of Information Security, 3rd Edition

  4. Introduction Figure 2-1 Information Security and Planning Management of Information Security, 3rd Edition Source: Course Technology/Cengage Learning

  5. The Role of Planning • Successful organizations utilize planning • Planning involves • Employees • Management • Stockholders • Other outside stakeholders • The physical and technological environment • The political and legal environment • The competitive environment Management of Information Security, 3rd Edition

  6. The Role of Planning (cont’d.) • Strategic planning includes: • Vision statement • Mission statement • Strategy • Coordinated plans for sub units • Knowing how the general organizational planning process works helps in the information security planning process Management of Information Security, 3rd Edition

  7. The Role of Planning (cont’d.) • Planning is creating action steps toward goals, and then controlling them • Planning provides direction for the organization’s future • In the top-down method, an organization’s leaders choose the direction • Planning begins with the general and ends with the specific Management of Information Security, 3rd Edition

  8. Values Statement • Establishes organizational principles • Makes organization’s conduct standards clear • RWW values commitment, honesty, integrity and social responsibility among its employees, and is committed to providing its services in harmony with its corporate, social, legal and natural environments • The values, vision, and mission statements together provide the foundation for planning Management of Information Security, 3rd Edition

  9. Vision Statement • The vision statement expresses what the organization wants to become • Vision statements should be ambitious • Random Widget Works will be the preferred manufacturer of choice for every business’s widget equipment needs, with an RWW widget in every machine they use Management of Information Security, 3rd Edition

  10. Mission Statement • Mission statement • Declares the business of the organization and its intended areas of operations • Explains what the organization does and for whom • Random Widget Works, Inc. designs and manufactures quality widgets and associated equipment and supplies for use in modern business environments Management of Information Security, 3rd Edition

  11. Figure 2-2 Microsoft’s Mission and Values Statement Management of Information Security, 3rd Edition Source: Course Technology/Cengage Learning

  12. Strategic Planning • Strategy is the basis for long-term direction • Strategic planning guides organizational efforts • Focuses resources on clearly defined goals • “… strategic planning is a disciplined effort to produce fundamental decisions and actions that shape and guide what an organization is, what it does, and why it does it, with a focus on the future.” Management of Information Security, 3rd Edition

  13. Creating a Strategic Plan Figure 2-3 Top-down Strategic Planning Management of Information Security, 3rd Edition Source: Course Technology/Cengage Learning

  14. Creating a Strategic Plan (cont’d.) • An organization develops a general strategy • Then creates specific strategic plans for major divisions • Each level or division translates those objectives into more specific objectives for the level below • In order to execute this broad strategy executives must define individual managerial responsibilities Management of Information Security, 3rd Edition

  15. Planning Levels • Strategic goals are translated into tasks • Objectives should be specific, measurable, achievable, reasonably high and time-bound (SMART) • Strategic planning then begins a transformation from general to specific objectives Management of Information Security, 3rd Edition

  16. Planning Levels (cont’d.) Figure 2-4 Planning Levels Management of Information Security, 3rd Edition Source: Course Technology/Cengage Learning

  17. Planning Levels (cont’d.) • Tactical Planning • Has a shorter focus than strategic planning • Usually one to three years • Breaks applicable strategic goals into a series of incremental objectives Management of Information Security, 3rd Edition

  18. Planning Levels (cont’d.) • Operational Planning • Used by managers and employees to organize the ongoing, day-to-day performance of tasks • Includes clearly identified coordination activities across department boundaries such as: • Communications requirements • Weekly meetings • Summaries • Progress reports Management of Information Security, 3rd Edition

  19. Planning and the CISO • Elements of a strategic plan • Executive summary • Mission statement and vision statement • Organizational profile and history • Strategic issues and core values • Program goals and objectives • Management/operations goals and objectives • Appendices (optional) Management of Information Security, 3rd Edition

  20. Planning and the CISO (cont’d.) • Tips for creating a strategic plan • Create a compelling vision statement that frames the evolving plan, and acts as a magnet for people who want to make a difference • Embrace the use of the balanced scorecard approach • Deploy a draft high level plan early, and ask for input from stakeholders in the organization Management of Information Security, 3rd Edition

  21. Planning and the CISO (cont’d.) • Tips for creating a strategic plan (cont’d.) • Make the evolving plan visible • Make the process invigorating for everyone • Be persistent • Make the process continuous • Provide meaning • Be yourself • Lighten up and have some fun Management of Information Security, 3rd Edition

  22. Information Security Governance • Governance of information security is a strategic planning responsibility • Importance has grown in recent years • Information security objectives must be addressed at the highest levels of an organization's management team • To be effective and offer a sustainable approach Management of Information Security, 3rd Edition

  23. Information Security Governance (cont.) • Information security governance includes • Providing strategic direction • Establishing objectives • Measuring progress toward those objectives • Verifying that risk management practices are appropriate • Validating that the organization’s assets are used properly Management of Information Security, 3rd Edition

  24. Information Security Governance (cont’d.) • Actions of the Board of Directors • Inculcating a culture that recognizes the importance of information security • Aligning management’s investment in information security with organizational strategies and risk environment • Assuring comprehensive development and implementation of an information security program Management of Information Security, 3rd Edition

  25. Information Security Governance (cont’d.) • Actions of the Board of Directors (cont’d.) • Demanding reports from the various layers of management on the information security program’s effectiveness and adequacy Management of Information Security, 3rd Edition

  26. Desired Outcomes • Outcomes of information security governance • Strategic alignment of information security with business strategy to support organizational objectives • Risk management to reduce potential impacts on information resources • Resource management with efficient use of information security knowledge and infrastructure Management of Information Security, 3rd Edition

  27. Desired Outcomes (cont’d.) • Outcomes of information security governance (cont’d.) • Performance measurement to ensure that organizational objectives are achieved • Value delivery by optimizing information security investments in support of organizational objectives Management of Information Security, 3rd Edition

  28. Desired Outcomes (cont’d.) • Recommended Board of Director practices • Place information security on the board’s agenda • Identify information security leaders, hold them accountable and ensure support for them • Ensure the effectiveness of the corporation’s information security policy through review and approval • Assign information security to a key committee and ensure adequate support for that committee Management of Information Security, 3rd Edition

  29. Implementing Information Security Governance Figure 2-6 General Governance Framework Source: IDEAL is a service mark of Carnegie Mellon University Management of Information Security, 3rd Edition

  30. Implementing Information Security Governance (cont’d.) Figure 2-7 The IDEAL model governance framework Source: IDEAL is a service mark of Carnegie Mellon University Management of Information Security, 3rd Edition

  31. Planning for Information Security Implementation Figure 2-8 Information security governance responsibilities Source: Information Security Governance: A Call to Action Management of Information Security, 3rd Edition

  32. Planning For Information Security Implementation (cont’d.) • Roles of the CIO and CISO • Translating overall strategic plan into tactical and operational information security plans • The CISO plays a more active role in the development of the planning details than does the CIO Management of Information Security, 3rd Edition

  33. Planning For Information Security Implementation (cont’d.) • CISO Job Description • Creates a strategic information security plan with a vision for the future of information security • Understands the fundamental business activities and suggests appropriate information security solutions to protect these activities • Develops action plans, schedules, budgets, and status reports Management of Information Security, 3rd Edition

  34. Planning For Information Security Implementation (cont’d.) • Implementation can begin • After plan has been translated into IT and information security objectives and tactical and operational plans • Methods of implementation • Bottom-up • Top-down Management of Information Security, 3rd Edition

  35. Planning For Information Security Implementation (cont’d.) Figure 2-9 Approaches to security implementation Management of Information Security, 3rd Edition Source: Course Technology/Cengage learning

  36. Introduction to the Security Systems Development Life Cycle • An SDLC is a methodology for the design and implementation of an information system • SDLC-based projects may be initiated by events or planned • At the end of each phase, a review occurs to determine if the project should be continued, discontinued, outsourced, or postponed Management of Information Security, 3rd Edition

  37. Introduction to the Security Systems Development Life Cycle (cont’d.) • SecSDLC methodology is similar to SDLC • Identification of specific threats and the risks they represent • Design and implementation of specific controls to counter those threats and manage risks posed to the organization Management of Information Security, 3rd Edition

  38. Introduction to the Security Systems Development Life Cycle (cont’d.) Figure 2-10 Phases of the SecSDLC Management of Information Security, 3rd Edition Source: Course Technology/Cengage learning

  39. Introduction to the Security Systems Development Life Cycle (cont’d.) • Investigation in the SecSDLC • Phase begins with directive from management specifying the process, outcomes, and goals of the project and its budget • Frequently begins with the affirmation or creation of security policies • Teams assembled to analyze problems, define scope, specify goals and identify constraints Management of Information Security, 3rd Edition

  40. Introduction to the Security Systems Development Life Cycle (cont’d.) • Investigation in the SecSDLC (cont’d.) • Feasibility analysis • Determines whether the organization has the resources and commitment to conduct a successful security analysis and design • Analysis in the SecSDLC • Prepare analysis of existing security policies and programs, along with known threats and current controls Management of Information Security, 3rd Edition

  41. Introduction to the Security Systems Development Life Cycle (cont’d.) • Analysis in the SecSDLC (cont’d.) • Analyze relevant legal issues that could affect the design of the security solution • Risk management begins in this stage • The process of identifying, assessing, and evaluating the levels of risk facing the organization, specifically the threats to the information stored and processed by the organization • A threat is an object, person, or other entity that represents a constant danger to an asset Management of Information Security, 3rd Edition

  42. Introduction to the Security Systems Development Life Cycle (cont’d.) • An attack • A deliberate act that exploits a vulnerability to achieve the compromise of a controlled system • Accomplished by a threat agent that damages or steals an organization’s information or physical assets • An exploit • A technique or mechanism used to compromise a system Management of Information Security, 3rd Edition

  43. Introduction to the Security Systems Development Life Cycle (cont’d.) • A vulnerability • An identified weakness of a controlled system in which necessary controls that are not present or are no longer effective Management of Information Security, 3rd Edition

  44. Introduction to the Security Systems Development Life Cycle (cont’d.) Table 2-1 Threats to Information Security Management of Information Security, 3rd Edition Source: Course Technology/Cengage Learning (adapted from Whitman, 2003)

  45. Introduction to the Security Systems Development Life Cycle (cont’d.) • Some common attacks • Malicious code • Hoaxes • Back doors • Password crack • Brute force • Dictionary • Denial-of-service (DoS) and distributed denial-of-service (DDoS) Management of Information Security, 3rd Edition

  46. Introduction to the Security Systems Development Life Cycle (cont’d.) • Some common attacks (cont’d.) • Spoofing • Man-in-the-middle • Spam • Mail bombing • Sniffer • Social engineering • Buffer overflow • Timing Management of Information Security, 3rd Edition

  47. Introduction to the Security Systems Development Life Cycle (cont’d.) • Prioritize the risk posed by each category of threat • Identify and assess the value of your information assets • Assign a comparative risk rating or score to each specific information asset Management of Information Security, 3rd Edition

  48. Introduction to the Security Systems Development Life Cycle (cont’d.) • Design in the SecSDLC • Create and develop a blueprint for security • Examine and implement key policies • Evaluate the technology needed to support the security blueprint • Generate alternative solutions • Agree upon a final design Management of Information Security, 3rd Edition

  49. Introduction to the Security Systems Development Life Cycle (cont’d.) • Security models may be used to guide the design process • Models provide frameworks for ensuring that all areas of security are addressed • Organizations can adapt or adopt a framework to meet their own information security needs Management of Information Security, 3rd Edition

  50. Introduction to the Security Systems Development Life Cycle (cont’d.) • A critical design element of the information security program is the information security policy • Management must define three types of security policy • Enterprise information security policies • Issue-specific security policies • Systems-specific security policies Management of Information Security, 3rd Edition

More Related