Uploaded by Sisay Fekadu

1. COSC 6301 – Computer Security - Overview

advertisement
Addis Ababa University
Faculty of Science
Department of Computer Science
COSC 6301 – Computer Security
Chapter 1 - Overview
By
Girum Ketema (PhD)
Girumk@gmail.com
Girum.ketema@ju.edu.et
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Definition – Computer Security
• Measures and controls that ensure confidentiality, integrity, and availability of information
system assets (includes hardware, software, firmware, information being processed, stored and
communicated). (NIST 2013)
Hardware
Software
Firmware
CIA Triad
Data
Telecommunications
Objectives
Information System Resources
NIST 2013 – The National Institute of Standards and Technology (NIST) Internal Report 7298 (May 2013
Confidentiality
• Preserving authorized restrictions on information access and disclosure, including
means for protecting personal privacy and proprietary information.
• A loss of confidentiality is the unauthorized disclosure of information.
Data Confidentiality
Assures that private or
confidential information is not
made available or disclosed to
unauthorized individuals.
Privacy
Assures that individuals control or
influence information related to them:
• Collection
• Storage
• Disclosure – By Whom, to Whom
Integrity
• Guarding against improper information modification or destruction, including
ensuring information nonrepudiation and authenticity.
• A loss of integrity is the unauthorized modification or destruction of information.
Data Integrity
Assures that information and
programs are changed only in a
specified and authorized manner.
System Integrity
Assures that a system performs its intended
function in an unimpaired manner, free from
deliberate or inadvertent unauthorized
manipulation of the system.
Availability
• Ensuring timely and reliable access to and use of information.
• A loss of availability is the disruption of access to or use of information
or an information system.
Security Impact Levels
Low
Moderate
High
Security Impact Levels
Low
Moderate
High
• Limited adverse effect
• Degradation in mission capability but can perform primary functions
• Minor damage to organizational assets
• Minor financial loss
• Minor harm to individuals
Security Impact Levels
Low
Moderate
High
• Serious adverse effect
• Significant degradation in mission capability but can perform
primary functions with reduced effectiveness
• Significant damage to organizational assets
• Significant financial loss
• Significant harm to individuals
Security Impact Levels
Low
Moderate
High
• Sever or catastrophic adverse effect
• Severe degradation or loss in mission capability
• Major damage on organizational assets
• Major financial loss
• Major harm to individuals (may include loss of life)
Examples – Loss of Confidentiality
• Grade information should only be available to students, their parents,
and employees that require the information to do their job.
• Low Impact → Disclosure of directory list of students and staff
• Moderate → Disclosure of enrolment information
• High → Disclosure of student grade information
Example – Loss of Integrity
• Low Impact → Anonymous online poll
• Moderate → Falsified information on a website may damage the
reputation of the website
• High → Inaccurate allergy information in a hospital database may
result in death or serious injury
Example – Loss of Availability
• Critical systems have more availability requirements
• Low Impact → Online telephone directory
• Moderate → Public website of an organization
• High → Authentication service for other systems
Definition …
Authenticity: The property of being genuine and being able to be verified and trusted
Accountability: The security goal that generates the requirement for actions of an entity to be
traced uniquely to that entity.
Nonrepudiation
Deterrence
Fault isolation
Intrusion detection and prevention
Legal action
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Computer Security Elements (NIST Handbook)
Computer security
should support the
mission of the
organization.
Computer security is an
integral element of
sound management.
Computer security
should be cost-effective.
Computer security
responsibilities and
accountability should be
made explicit.
System owners have
computer security
responsibilities outside
their own
organizations.
Computer security
requires a
comprehensive and
integrated approach.
Computer security
should be periodically
reassessed.
Computer security is
constrained by societal
factors
Computer Security Elements (NIST Handbook)
Security rules and procedures should not negatively impact the
mission of the organization
Computer security
should support the
mission of the
organization.
Security is a means to and end and ont an end in itself
Security shall explicitly be stated in terms of the organization’s
mission
In inter-organizational systems, each organization benefits from securing their
systems.
Computer Security Elements (NIST Handbook)
Management personnel are ultimately responsible
for determining the level of acceptable risk for a
specific system and the organization as a whole,
taking into account the cost of security controls.
Computer security is
an integral element of
sound management
Security breaches can’t be avoided completely. The
management shall find a balance between
protecting the information and utilizing available
resources
When an organization's information and systems are
linked with external systems, management’s
responsibilities extend beyond organizational
boundaries.
Computer Security Elements (NIST Handbook)
The costs and benefits of security should be carefully examined
in both monetary and nonmonetary terms to ensure that the
cost of controls does not exceed expected benefits.
Computer
security should
be cost-effective.
By investing in security measures, an organization can reduce
the frequency and severity of computer security-related losses.
Security benefits do have both direct and indirect costs.
Solutions to security problems should not be chosen if they cost
more, directly or indirectly, than simply tolerating the problem.
Computer Security Elements (NIST Handbook)
The responsibilities and accountability of owners, providers, and users of
computer systems and other parties concerned with the security of computer
systems should be explicit.
Computer security
responsibilities and
accountability should
be made explicit
If the responsibilities are not made explicit, management may find it difficult
to hold personnel accountable for future outcomes.
Documenting information security responsibilities is not dependent on the
size of the organization.
All organizations, irrespective of size, must have security policy
Computer Security Elements (NIST Handbook)
System owners have
computer security
responsibilities outside
their own organizations.
If a system has external users, its owners have a responsibility to
share appropriate knowledge about the existence and general
extent of security measures so that other users can be confident
that the system is adequately secure.
Managers should act in a timely, coordinated manner to prevent
and to respond to breaches of security" to help prevent damage
Computer Security Elements (NIST Handbook)
A comprehensive approach that considers a variety of areas both within
and outside of the computer security field shall be in place.
Computer Security
Requires a
Comprehensive and
Integrated Approach.
Interdependencies of Security Controls: security controls often depend
upon the proper functioning of other controls.
Other Interdependencies: The effectiveness of security controls also
depends on such factors as system management, legal issues, quality
assurance, and internal and management controls.
Computer Security Elements (NIST Handbook)
Computer Security is not a static process. It requires continuous
monitoring and management
Computer security
should be periodically
reassessed.
Organizations must ensure that new vulnerabilities and evolving
threats are quickly identified and responded to accordingly
Understanding of organizational risk tolerance to assist officials in
setting priorities and managing risk throughout the organization in a
consistent manner is required.
Computer Security Elements (NIST Handbook)
The ability of security to support the mission of the organization(s) may
be limited by various factors, such as social issues. For example,
security and workplace privacy can conflict
Computer security is
constrained by societal
and Cultural factors
Organizations shall make information security functions transparent,
easy to use, and understandable.
Organizations shall find a balance between information security
requirements and usability
Outline
• Course Outline
• Basics
• Computer Security Elements
• Roles and Responsibilities
Roles and Responsibilities
SECURITY JOB INVOLVES
ACTIVITIES THAT SPAN ACROSS THE
ENTERPRISE
CLEAR DESIGNATION OF ROLES
AND RESPONSIBILITIES IS CRUCIAL
IN SMALL ORGANIZATIONS, AN
EMPLOYEE MAY TAKE MORE THAN
ONE RESPONSIBILITY
Risk Executive Function (Senior Management)
Defining a holistic
approach to addressing
risk across the entire
organization;
Developing an
organizational risk
management strategy;
Supporting informationsharing amongst
authorizing officials and
other senior leaders in
the Organization
• Overseeing risk
management related
activities across the
organization.
Chief Executive Officer (CEO)
Ensuring
Ensuring the integration of information security management processes with strategic and
operational planning processes;
Making
Making sure that the information and systems used to support organizational operations have
proper information security safeguards;
Confirming
Confirming that trained personnel are complying with related information security legislation,
policies, directives, instructions, standards, and guidelines.
Chief Information Officer (CIO)
Allocating
Allocating resources dedicated to the protection of the systems
supporting the organization’s mission and business functions;
Ensuring
Ensuring that systems are protected by approved security plans
and are authorized to operate;
Making
Making sure that there is an organization-wide information
security program that is being effectively implemented.
Information Owner
Establishing
Providing
Establishing the rules for the appropriate use and protection of
the subject information;
Providing input to system owners regarding the security
requirements and security controls needed to adequately
protect the subject information
Chief Information Security Officer
Managing
Managing and implementing an organization-wide information security
and
program;
implementing
Assuming
Assuming the role of authorizing official designated representative or
security control assessor when needed.
Authorizing Official (AO)
Approving
Ensuring
Approving security plans, memorandums of agreement or understanding,
plans of action and milestones, as well as determining whether significant
changes in the system or environments of operation require reauthorization;
Ensuring that authorizing official designated representatives carry out all
activities and functions associated with security authorization.
Authorizing Official Designated
Representative
Carrying out the duties of the Authorizing Official as assigned;
Making decisions with regard to planning and resourcing of the security authorization
process, approval of the security plan, approving and monitoring the implementation
of plans of action and milestones, and the assessment and/or determination of risk;
Preparing the final authorization package, obtaining the authorizing official’s signature
on the authorization decision document, and transmitting the authorization package
to appropriate organizational officials.
Senior Agency Official for Privacy
Overseeing, coordinating, and facilitating the agency’s privacy compliance efforts;
Reviewing the agency’s information privacy procedures to ensure that they are
comprehensive and up-to-date;
Ensure the agency’s employees and contractors receive appropriate training and
education programs regarding the information privacy laws, regulations, policies,
and procedures governing the agency’s handling of personal information.
Common Control Provider
Documenting the organization-identified common controls in a security
Documenting plan (or equivalent document prescribed by the organization);
Ensuring
Ensuring that required assessments of common controls are carried
out by qualified assessors with an appropriate level of independence
defined by the organization.
System Owner
Addressing
Ensuring
Developing and
maintaining
Addressing the operational interests of the user community (i.e., users who require
access to the system to satisfy mission, business, or operational requirements);
Ensuring compliance with information security requirements; and
Developing and maintaining the system security plan and ensuring that the system is
deployed and operated in accordance with the agreed-upon security controls.
System Security Officer (SSO)
OVERSEEING THE DAY-TO-DAY SECURITY
OPERATIONS OF A SYSTEM
ASSISTING IN THE DEVELOPMENT OF THE
SECURITY POLICIES AND PROCEDURES
AND ENSURING COMPLIANCE WITH
THOSE POLICIES AND PROCEDURES.
Information Security Architect
Serving
Serving as the liaison between the enterprise architect and the
information security engineer
Coordinating with system owners, common control providers,
Coordinating and system security officers on the allocation of security controls
as system-specific, hybrid, or common controls.
System Security Engineer (SSE)
Designing
and
developing
Designing and developing organizational systems or upgrading
legacy systems
Coordinating security-related activities with information security
Coordinating architects, senior agency information security officers, system
owners, common control providers, and system security officers.
Security Control Assessor
Providing
Providing an assessment to identify weaknesses or deficiencies in the system and
its environment of operation
Recommending Recommending corrective actions to address identified vulnerabilities
Preparing
Preparing a security assessment report containing the results and findings from
the assessment.
System Administrator
1
Installing,
configuring, and
updating hardware
and software
2
Establishing and
managing user
accounts
3
Overseeing backup
and recovery tasks
4
Implementing
technical security
controls.
User
Adhering
Using
Reporting
Adhering to policies that govern acceptable use of organizational
systems
Using the organization-provided IT resources for defined
purposes only
Reporting anomalies or suspicious system behavior
Supporting Roles - Auditor
Check whether the system is meeting stated security requirements
and organization policies
Check whether security controls are appropriate.
Informal audits can be performed by those operating the system
under review or by impartial third-party auditors.
Support - Physical Security Staff
The physical security office is responsible for developing and enforcing
appropriate physical security controls, often in consultation with information
security management, program and functional managers, and others.
Physical security addresses central system installations, backup facilities, and
office environments.
In the government, this office is often responsible for processing personnel
background checks and security clearances.
Disaster Recovery/Contingency Planning Staff
Some organizations have a separate disaster
recovery/contingency planning staff.
The staff is typically responsible for contingency planning
for the entire organization and works with other teams to
obtain additional contingency planning support, as needed
Assignment
Instruction
• Write A Short Essay on the Ethiopian Security Roles and Responsibilities in your
organizations.
• Comment on missing gaps by comparing to the NIST recommendation
Pages
• Max 5 pages. Min 2 pages.
Due Date
• Next Wednesday (December 01, 2021).
Download