630 likes | 655 Views
Chapter 5 Developing the Security Program. Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan. Outline. Introduction Organizing for Security Information Security Placement Components of the Security Program Information Security Roles and Titles
E N D
Chapter 5 Developing the Security Program Presented by: Jennifer, Sergey & Kalagee Slides by: Ryan
Outline • Introduction • Organizing for Security • Information Security Placement • Components of the Security Program • Information Security Roles and Titles • Security Education, Training, and Awareness
Introduction • Security Program • Entire set of personnel, plans, and policies related to Information Security • Information Security • Corporate or physical security • Information Security Program • Structured effort to contain risks to information assets
Organizing for Security • Security Program Influences • Organizational culture • Company size and available resources • Security personnel and capital budget
Organization Sizes • Small (10-100 computers) • 20% of IT budget • Medium (100-1,000 computers) • 11% of IT budget • Large (1,000-10,000 computers) • 5% of IT budget security • Very Large (10,000+ computers) • 6% of IT budget
Risk Assessment Risk Management Systems Testing Policy Legal Assessment Incident Response Planning Vulnerability Assessment Measurement Compliance Centralized Authentication Systems Security Administration Training Network Security Administration Information Security Functions
Security Function Distribution • Non-technology business units • Legal assessment and training • IT groups outside of information security • Systems and network administration • Information security as customer service • Planning, testing, risk assessment, incident response, vulnerability assessment • Information security as compliance enforcement • Policy, compliance, and risk management
Security Placement • Openness to new ideas • Clout with top management • Respect in the eyes of a wide variety of employees • Comfort and familiarity with information security concepts • Willingness to defend the best interest of the organization in the long run
IT Security Administrative Services Insurance and Risk Management Strategy and Planning Legal Internal Audit Help Desk Accounting and Finance Through IT Human Resources Facilities Management Operations Security Placement Locations
Other Options • Internal Audit • Help Desk • Accounting and Finance Through IT • Human Resources • Facilities Management • Operations
Components of the Security Program • InfoSec needs are unique to culture, size, and budget of organization • Guided by mission and vision statements • CIO and CISO use mission and vision statements to formulate InfoSec program mission statement 21
Elements of a Security Program (NIST) • Policy • Program management • Risk management • Life-cycle planning • Personnel and user issues • Contingency and disaster recovery planning • Computer security incident handling 22
Elements of a Security Program (NIST) • Awareness and training • Security considerations • Physical and environmental security • Identification and authentication • Logical access control • Audit trails • Cryptography 23
Information Security Roles and Titles • Those that define • Provide policies, guidelines, and standards • Those that build • Create and install security solutions • Those that administer • Monitor and improve the security process 24
Job Function Categories • Chief Information Security Officer (CISO) • Security manager • Security administrator/analyst • Security technician • Security staffer • Security consultant • Security officer and investigator • Help desk personnel 25
Chief Information Security Officer (CISO) • Assessment, management, and implementation of the InfoSec program • Other Titles • Manager for Security • Security Administrator • Most cases reports to CIO 26
Security Manager • Oversee day-to-day operation of the InfoSec program • Scheduling • Setting priorities • Administering procedural tasks • Report to CISO • Some technical knowledge 27
Security Administrator/Analyst • Have both technical knowledge and managerial skill • Manage day-to-day operation of the InfoSec program • Assist in development and delivery of training programs and policies 28
Security Technician • Subject matter experts • Implement security software • Diagnose and troubleshoot problems • Coordinate with administrators to ensure security is properly implemented • Tend to be specialized 29
Security Staffer • Individuals who perform routine watch-standing activities • Intrusion detection consoles • Monitor email • Perform routine, yet critical, tasks 30
Security Consultants • Expert in some aspect of InfoSec • Disaster recovery • Business continuity planning • Policy development • Strategic planning 31
Security Officers and Investigators • Sometimes necessary to protect highly sensitive data from physical threats • Three G’s of physical security • Guards • Gates • Guns 32
Help Desk Personnel • Enhances security team’s ability to identify potential problems • Must be prepared to identify and diagnose problems • Traditional technical problems • Threats to information security 33
Security Education, Training, and Awareness (SETA) • Responsibility of CISO • Designed to reduce accidental security breaches • Can improve employee behavior • Inform members of the organization about where to report violations of policy • Allows organizations to hold employees accountable for their actions 34
Purpose of SETA • Enhance security • By building in-depth knowledge to design, implement, or operate security programs for organizations and systems • By developing skills and knowledge so that computer users can perform their jobs more securely • By improving awareness of the need to protect system resources 35
Security Education • Information security training programs must address: • Information security educational components • General education requirements 36
Developing InfoSec Curricula • InfoSec standards • ACM • IEEE • ABET • No security curricula models 37
Developing InfoSec Curricula • Must carefully map expected learning outcomes • Knowledge map • Helps potential students assess various InfoSec programs • Identifies skills and knowledge clusters obtained by program graduates 38
Security Training • Provides employees with hands-on training • In-house or outsourced • NIST provides free InfoSec training documents • NIST SP 800-16 40
Security Training • Customizing training by functional background • General user • Managerial user • Technical user • Job category • Job function • Technology product 41
Security Training • Customizing training by skill level • Novice • Intermediate • Advanced 42
Training for General Users • Commonly during employee orientation • Employees are educated on a wide variety of policies • Good security practices • Password management • Specialized access controls • Violation reporting 43
Training for Managerial Users • Similar to general training • More personalized • Small groups • More interaction and discussion 44
Training for Technical Users • Developing advanced technical training • By job category • By job function • By technology product 45
Training Techniques • Use correct teaching methods • Take advantage of latest learning technology • Use best practices • On-site training is beneficial
Delivery Methods • Delivery method choice is influenced by • Budget • Scheduling • Needs of organization • Delivery methods • One-on-one • Formal Class • Computer-Based Training (CBT)
Delivery Methods (cont) • Distance learning • Web Seminars • User Support Group • On-Site Training • Self-Study
Selecting Training Staff • Local training program • Continuing education department • External training agency • Hire a professional trainer • Hire a consultant, or someone from an accredited institution to conduct on-site training • organize and conduct training in-house using its own employees.
Implementing Training • Identify program scope, goals and objectives • Identify training staff • Identify target audiences • Motivate management and employees • Administer the program • Maintain the program • Evaluate the program