Chapter1 Why Study Information Security? To protect computers

advertisement
Chapter1
Why Study Information Security?
To protect computers, networks, and the information they store
Who is information security specialist?
Is more than a technician who prevents hackers from attacking a Web Site?
Growing ITS (information technologies Security) Importance.


Increased services to both end-users and employees
create risks to the confidentiality, integrity, and availability
How to become a great Information Security Specialist?





Get the right certification
Consider earning a graduate degree in INFOSEC
Increase your disaster recovery and risk management skills
Build a home laboratory
Get on a project working with strategic partners
Contextualizing Information Security (umbrella)
1. Compliance
2. Auditing
3. Administration
4. Indent response
5. Permission controls
6. Physical security
7. Software development security
8. Standers
9. Polices
10. Instruction detection and prevention
11. Antivirus
12. Key management
13. Operation controls
14. Security testing
15. Public key infrastructure
16. Access controls
17. Training and awareness
18. Disaster recovery
To support business operations a number of common positions and career opportunities
are needed
1.
2.
3.
4.
5.
Security administrators
Access coordinators
Security architects and network engineers
Security consultants
Security testers
Chapter 2
 Information Security Principles of Success
1. There Is No Such Thing as Absolute Security
2. Three Security Goals (CIA)
3. Defense in Depth as Strategy
4. When Left on Their Own, People Tend to Make the Worst Security Decisions
5. Functional and Assurance Requirements
6. Security Through Obscurity Is Not an Answer
7. Security = Risk Management
8. Security Controls: Preventative, Detective, and Responsive
9. Complexity Is The Enemy of Security
10. Fear, Uncertainty, and Doubt (FUD) Do Not Work in Selling Security
11. People, Process and Technology Are All Needed
12. Open Disclosure of Vulnerabilities Is Good for Security
 There Is No Such Thing as Absolute Security
Given enough time, tools, skills, and, a hacker can break through any security measure
 Three Security Goals (CIA)
 Protect the confidentiality
o To assure that no unauthorized access to information is permitted and that accidental
disclosure of sensitive information is not possible
 Preserve the integrity of data
 Promote the availability of data for authorized use
o Availability keep data and resources available for authorized use
 Defense in Depth as Strategy
 Defense in depth
o Security implemented in overlapping layers that provide the three elements
needed to secure assets: prevention, detection, and response
o The weaknesses of one security layer affect by the strengths of two or more layers
 When Left on Their Own, People Tend to Make the Worst Security Decisions
Many people are easily convinced to double-click on the attachment
 Functional and Assurance Requirements
 Functional requirements
o Describe what a system should do
 Assurance requirements
o Describe how functional requirements should be implemented and tested
Does the system do the right things in the right way?
 Verification:
The process of confirming that one or more predetermined requirements or specifications are
met
 Validation:
A determination of the correctness or quality of the mechanisms used in meeting the needs
 Note:
Computer security specialists must not only know the technical side of their jobs but also must
understand the principles behind information security
Chapter3
 Certification Programs and the Common Body of Knowledge

Certification Programs
1.
2.
3.
4.
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Global Information Assurance Certifications (GIAC)
Vendor-Specific Certification Programs

Information Security CBK (Common Body of Knowledge)
The CBK is a compilation and distillation of all security information collected that is relevant to
information security professionals
o Contains 10 domains
1. Security Management Practices
2. Security Architecture and Models
3. Business Continuity Planning
4. Law, Investigations, and Ethics
5. Physical Security
6. Operations Security
7. Access Control Systems and Methodology
8. Cryptography
9. Telecommunications, Network, and Internet Security
10. Applications Development Security
What is The benefits of certification and immersion into the CBK ?
Are clear to both employers and professionals who commit to life-long learning and to the
betterment of themselves and their careers
Chapter 4
 Security Management
Security Management is a broad set of executive support and management activities that define
an IT security programmed
 How Security Policies Set the Stage for Success?
Policies are the most crucial element in a corporate information security infrastructure and must
be considered before security technology is acquired and deployed
 Effective policies



1.
2.
3.
4.
can rectify many of the weaknesses from failures to understand the business direction and
security mission
can help to prevent or eliminate many of the faults and errors caused by a lack of security
guidance
What are the types of policies?
Programme-level policy
Programme-framework policy
Issue-specific policy
System-specific policy
 Programme-Framework Policies
Provide
An organization-wide direction for broad areas of programme implementation
Define
The organization’s security programme elements that form the foundation for the computer
security programme
Reflect
Information technology management’s decisions about priorities for protection, resource
allocation, and assignment of responsibilities
 Specific Policies components:
1.
2.
3.
4.
5.
6.
Issue statement
Statement of the organization’s position
Applicability
Roles and responsibilities
Compliance
Points of contact and supplementary information
 Development and Management of Security Policies
 Three-level model for system security policy
o Security objectives
o Operational security
o Policy implementation
 Standards Taxonomy
Standards are formal written documents that describe several security concepts that are
fundamental to all successful programmers
 Risk Analysis and Management
A risk analysis answers three fundamental questions:
o What am I trying to protect?
o What is threatening my system?
o How much time, effort, and money am I willing to spend?
 Two basic types of risk analysis
o Quantitative Risk Analysis
o Qualitative Risk Analysis
 Qualitative Risk Analysis
Attempts to establish and maintain an independent set of risk metrics and statistics
Some of the calculations used for quantitative risk analysis
 Annualized loss expectancy (ALE)
 Probability
 Threat
 Control
 Vulnerability
Who Is Responsible for Security?
Everyone who uses information technology is responsible for maintaining the security and
confidentiality of information resources and must comply with security policies and procedures

o
o
o
o
o
o
Chief information security officer (CISO),
information resources manager,
information resources security officer,
owners of information resources,
custodians of information resources,
technical managers (network and system administrators),
internal auditors, and users
Download