110 likes | 229 Views
Information (Data) Security & Risk Mitigation. IT Act 2000 Amendment (Sec 43 A). Corporate Bodies like Banks handling sensitive personal data to implement and practice reasonable security practices and procedures. Damages by way of compensation to person affected without any upper limit.
E N D
IT Act 2000 Amendment (Sec 43 A) • Corporate Bodies like Banks handling sensitive personal data to implement and practice reasonable security practices and procedures. • Damages by way of compensation to person affected without any upper limit.
Information Security- Myths Our existing Security controls are adequate to prevent any information loss • Passwords are enough • to secure our • business Information Security is responsibility of IT… Data backups are enough Why plan for BCP ?
Information Security- Reality • Critical data is accessible to others because I have left my PC/terminal unattended • Worm infecting my machine can bring down the entire network • My account is used to commit fraud because my password is weak /shared
Why Information Security? Confidentiality, Integrity, Availability People are the weakest link in Information Security To know Security Responsibilities To know Information Security Risks associated with their job responsibilities Adherence to the Organizational security policies
Information Security Risks Online Frauds Hacking Attacks Phishing / Vishing Attacks Spam Data Theft Insecure Business Applications Malware / Spyware Virus / Worm / Trojan Attacks Denial of Service (DOS) Attacks Lack of User Awareness
Risk Mitigation Measures • Infrastructure Set up • DR Site • DR Drills • Updated BCP • Critical Applications • High Availability Clusters/Multiple Servers • Application Security Testing • Parameter Fine Tuning • Hardened Operating Systems • Strong Physical Security/Surveillance Camera/Biometric Access
Risk Mitigation Measures • Delivery Channels • Secured Indirect Access to CBS • Independent Systems • Encrypted Data Exchange across systems • Multiple Authentication • Outsourced Services • Drafting and Monitoring of SLAs • Non Disclosure Clauses • Review and Monitoring of Reports and Outputs • Third Party Employee Background Checks
Risk Mitigation Measures • Users • Need to know basis • Periodic Review of Access rights • Strong Authentications • Awareness Training • Networks • Intrusion Detection/Prevention Systems • Internal and External Firewalls • Periodic Penetration Testing • 24x7 Cyber Policing/Monitoring Attacks • Virus/Worm/Malware/Spyware Protection • Regular Security Updates – IPS/IDS, Anti-Virus
Information Security Practices Information Security Management System Information Security Policy & Procedures Continuous Risk Assessment Information Security Incident Management Business Continuity/Disaster Recovery Plans Information Systems Audit Network Security Audit Application Security Testing Vulnerability Assessment/Penetration Testing Security Operations Centre (SOC)/Cyber Policing Control Room Awareness Trainings