450 likes | 1.33k Views
Administering Security. Presented by Wing Chi. Security Goals. Security - a combination of technical, administrative, and physical controls. Protect data from leakage to outsiders. Protect against loss of data due to physical disaster Protect the data ’ s integrity. Administering Security.
E N D
Administering Security Presented by Wing Chi
Security Goals • Security - a combination of technical, administrative, and physical controls. • Protect data from leakage to outsiders. • Protect against loss of data due to physical disaster • Protect the data’s integrity
Administering Security • Planing • Risk analysis • Policy • Physical control
Security planning • Policy • Current state • Requirements • Recommended controls • Accountability • Timetable • Continuing attention
Policy • Indicating the goals of a computer security effort and the willingness of the people involved to work to achieve those goals.
Current State • Describing the status of security at the time of the plan • Risk analysis – a careful investigation of the system, its environment, and the things that might go wrong.
Requirements • Recommending ways to meet the security goals • Heart of the security plan • Organizational needs
Recommended Controls • Mapping controls to the vulnerabilities identified in the policy and requirements
Accountability • Describing who is responsible for each security activity • Personal computer • Project leaders • Managers • Database administrators • Information officers • Personnel staff
Timetable • Identifying when different security functions are to be done • Show how and when the element of the plan will be performed
Continuing Attention • Specifying a structure for periodically updating the security plan
OCTAVE • The Software Engineering Institute at Carnegie Mellon University has created a framework for building a security plan • Identify enterprise knowledge • Identify operational area knowledge • Identify staff knowledge • Establish security requirements • Map high priority information assets to information infrastructure • Perform an infrastructure vulnerability evaluation • Develop a protection strategy
Risk Analysis OPSEC • U.S Army used its Operations Security (OPSEC) guidelines during the Vietnam war • Identify the critical information to be protected • Analyze the threats • Analyze the vulnerabilities • Assess the risks • Apply countermeasures
Reference • Pfleeger, Charles and Pfleeger, Shari. “Security in Computing.” • http://e-docs.bea.com/tuxedo/tux71 • /html/secadm.htm