200 likes | 410 Views
?Dr. Respickius Casmir. Outline. IntroductionA Conceptual IT SystemIT Security in a NutshellIT Security Risks, Threats and Vulnerabilities Why Worry about IT Security and CybercrimeConclusion and the Way Forward. ?Dr. Respickius Casmir. Introduction. Every progressive organization is governe
E N D
1. ©Dr. Respickius Casmir IT Security & CybercrimeIT & Communication Summit 2010 March 8, 2010 By
Respickius Casmir, PhD.
University of Dar es Salaam Computing Centre (UCC)
2. ©Dr. Respickius Casmir Outline Introduction
A Conceptual IT System
IT Security in a Nutshell
IT Security Risks, Threats and Vulnerabilities
Why Worry about IT Security and Cybercrime
Conclusion and the Way Forward
3. ©Dr. Respickius Casmir Introduction Every progressive organization is governed by a Corporate Strategy.
IT Governance is part and parcel of Corporate Strategy.
IT Security is an integral part of IT Governance.
Therefore, Corporate Strategy, IT Governance, and IT Security are inseparable elements.
Cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.
4. ©Dr. Respickius Casmir A Conceptual IT System
5. ©Dr. Respickius Casmir A Conceptual IT System (2)
6. ©Dr. Respickius Casmir A Conceptual IT System (3)
7. ©Dr. Respickius Casmir A Conceptual IT System (4)
8. ©Dr. Respickius Casmir A Conceptual IT System (5)
9. ©Dr. Respickius Casmir A Conceptual IT System (5) People include:
1. Insiders (i.e. staff, temporary staff, consultants)
2. Outsiders with access to the inside (i.e. partners, suppliers, customers)
3. Outsiders with some knowledge about the inside (i.e. ex-staff, ex-consultants)
4. Outsiders with certain motivation to launch attacks against your organisation (competitors, hackers, industrial espionages, other attackers)
10. ©Dr. Respickius Casmir IT Security in a Nutshell IT security is all about controlling access to information assets to ensure:
Confidentiality – ensuring that information is accessible only to those authorized to have access to it.
Integrity – safeguarding the accuracy and completeness of information and processing methods.
Availability – ensuring that authorized users have access to information and associated assets when required.
11. ©Dr. Respickius Casmir Security Goals
12. ©Dr. Respickius Casmir Security Attacks
13. ©Dr. Respickius Casmir Security Attacks Interruption: This is an attack on availability
Interception: This is an attack on confidentiality
Modification: This is an attack on integrity
Fabrication: This is an attack on authenticity
14. ©Dr. Respickius Casmir Security Risks, Threats & Vulnerability
15. ©Dr. Respickius Casmir Budgeting for security precautions Remember the old saying, “Do not place all of your eggs in one basket”?.
This wisdom definitely applies to budgeting for your IT security. Do not spend all of your budget on one mode of protection.
For example, it does little good to invest $15,000 in fire-walling technology if someone can simply walk through the front door and walk away with your corporate server.
16. ©Dr. Respickius Casmir Budgeting for security precautions (2) The bottom line is to be creative.
The further you can stretch your security budget, the more precautions you can take.
Security is a proactive expenditure, meaning that we invest money in security precautions to avoid spending additional money later playing for recovery from a network disaster.
The more precautions that can be taken, the less likely disaster is to strike.
17. ©Dr. Respickius Casmir IT Security Challenges IT security challenges include:
Increased global exposure of Information Assets via the Internet.
Ubiquitous security threats and vulnerabilities
Increased dependence on IT Systems without proper strategies to deal with security issues
Inadequacy of IT security awareness programs for end users
Lack of National level/Institutional Strategy for handling IT Security and Cybercrime issues.
18. ©Dr. Respickius Casmir Conclusion and the Way Forward We need to have a national/institutional strategy for handling IT security and cybercrime issues.
Such a strategy should include security training and awareness programmes to ensure that all users of IT systems have the basics of security.
Adopt International IT security Best Practices such as ISO/IEC 27000 family of standards, is an Information Security Management System (ISMS), and
Adopt and customize BS 7799-3:2005 to come up with our own TZ 7799 standard for Information security management systems that is tailored to our own business context.
19. ©Dr. Respickius Casmir Conclusion and the Way Forward It is imperative to note that a well-trained, well-informed workforce is one of the most powerful weapons in an information security manager’s arsenal.
20. ©Dr. Respickius Casmir Thank You!Respickius Casmir, PhD.res@udsm.ac.tz