SlideShare a Scribd company logo
2
Most read
3
Most read
19
Most read
Principles of Information Security,
Fifth Edition
Chapter 1
Introduction to Information Security
Lesson 4 – Software Design
Principles
Learning Objectives
Upon completion of this lesson, you should be
able to:
- Describe the information security roles of
professionals within an organization
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 2
Software Design Principles
Software development leaders J. H. Saltzer and M.
D. Schroeder first identified security principles:
◦ Economy of mechanism
◦ Fail-safe defaults
◦ Complete mediation
◦ Open design
◦ Separation of privilege
◦ Least privilege
◦ Least common mechanism
◦ Psychological acceptability
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 3
The NIST Approach to Securing
the SDLC
NIST Special Publication 800-64 rev. 2 maintains
that early integration of security in the SDLC
enables agencies to maximize return on investment
through:
◦ Early identification and mitigation of security
vulnerabilities and misconfigurations
◦ Awareness of potential engineering challenges
◦ Identification of shared security services and reuse of
security strategies and tools
◦ Facilitation of informed executive decision making
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 4
The NIST Approach: Initiation
Security at this point is looked at in terms of
business risks, with information security office
providing input.
Key security activities include:
◦ Delineation of business requirements in terms of
confidentiality, integrity, and availability
◦ Determination of information categorization and
identification of known special handling requirements to
transmit, store, or create information
◦ Determination of any privacy requirements
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 5
The NIST Approach:
Development/Acquisition
Key security activities include:
◦Conducting risk assessment and using
results to supplement baseline security
controls
◦Analyzing security requirements
◦Performing functional and security testing
◦Preparing initial documents for system
certification and accreditation
◦Designing security architecture
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 6
The NIST Approach:
Implementation/Assessment
System is installed and evaluated in
operational environment.
Key security activities include:
◦ Integrating information system into its
environment
◦ Planning and conducting system certification
activities in synchronization with testing of
security controls
◦ Completing system accreditation activities
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 7
The NIST Approach: Operations
and Maintenance
Systems are in place and operating, enhancements and/or
modifications to the system are developed and tested, and
hardware and/or software are added or replaced.
Key security activities include:
◦ Conducting operational readiness review
◦ Managing configuration of system
◦ Instituting process and procedure for assured operations
and continuous monitoring of information system’s
security controls
◦ Performing reauthorization as required
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION
8
The NIST Approach: Disposal
Provides for disposal of system and
closeout of any contracts in place
Key security activities include:
◦Building and executing disposal/transition
plan
◦Archival of critical information
◦Sanitization of media
◦Disposal of hardware and software
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 9
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 10
Security Professionals and the
Organization
Wide range of professionals are
required to support a diverse
information security program.
Senior management is the key
component.
Additional administrative support and
technical expertise are required to
implement details of IS program.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 11
Senior Management
Chief information officer (CIO)
◦ Senior technology officer
◦ Primarily responsible for advising the senior
executives on strategic planning
Chief information security officer (CISO)
◦ Has primary responsibility for assessment,
management, and implementation of IS in the
organization
◦ Usually reports directly to the CIO
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 12
Information Security Project
Team
A small functional team of people who are
experienced in one or multiple facets of required
technical and nontechnical areas:
◦ Champion
◦ Team leader
◦ Security policy developers
◦ Risk assessment specialists
◦ Security professionals
◦ Systems administrators
◦ End users
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION
13
Data Responsibilities
Data owners: senior management
responsible for the security and use of a
particular set of information
Data custodian: responsible for information
and systems that process, transmit, and
store it
Data users: individuals with an information
security role
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 14
Communities of Interest
Group of individuals united by similar
interests/values within an organization
◦ Information security management and
professionals
◦ Information technology management and
professionals
◦ Organizational management and professionals
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 15
Information Security: Is It an
Art or a Science?
Implementation of information security is
often described as a combination of art and
science.
“Security artisan” idea: based on the way
individuals perceive system technologists
and their abilities
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 16
Security as Art
No hard and fast rules nor many universally
accepted complete solutions
No manual for implementing security through
entire system
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION
17
Security as Science
Dealing with technology designed for rigorous performance
levels
Specific conditions cause virtually all actions in computer
systems.
Almost every fault, security hole, and systems malfunction
is a result of interaction of specific hardware and software.
If developers had sufficient time, they could resolve and
eliminate faults.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 18
Security as a Social Science
Social science examines the behavior of individuals
interacting with systems.
Security begins and ends with the people that
interact with the system, intentionally or
otherwise.
Security administrators can greatly reduce the
levels of risk caused by end users and create more
acceptable and supportable security profiles.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 19

More Related Content

PPT
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 2 - Lesson 1
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
PPT
Chapter 5 Planning for Security-students.ppt
Shruthi48
 
PPTX
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 2 - Lesson 1
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
Chapter 5 Planning for Security-students.ppt
Shruthi48
 
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 

What's hot (20)

PPT
Information Assurance And Security - Chapter 3 - Lesson 3
MLG College of Learning, Inc
 
PPT
Ethics in IT Security
mtvvvv
 
PPT
Legal, Ethical and professional issues in Information Security
Gamentortc
 
PPT
Information Assurance And Security - Chapter 2 - Lesson 3
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 3 - Lesson 1
MLG College of Learning, Inc
 
PDF
Cyber Security: The Strategic View
Cisco Canada
 
PPTX
Network security
Nkosinathi Lungu
 
PPTX
Network security
Estiak Khan
 
PPT
Basics of Information System Security
chauhankapil
 
PPTX
Network Security ppt
SAIKAT BISWAS
 
PDF
Threat Intelligence
Deepak Kumar (D3)
 
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
PPT
Information security
razendar79
 
PPTX
National cyber security policy final
Indian Air Force
 
PPT
Information Assurance And Security - Chapter 3 - Lesson 2
MLG College of Learning, Inc
 
PPT
Introduction to information security
Kumawat Dharmpal
 
PPTX
Introduction to Incident Response Management
Don Caeiro
 
PPT
Software security
Roman Oliynykov
 
Information Assurance And Security - Chapter 3 - Lesson 3
MLG College of Learning, Inc
 
Ethics in IT Security
mtvvvv
 
Legal, Ethical and professional issues in Information Security
Gamentortc
 
Information Assurance And Security - Chapter 2 - Lesson 3
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 3 - Lesson 1
MLG College of Learning, Inc
 
Cyber Security: The Strategic View
Cisco Canada
 
Network security
Nkosinathi Lungu
 
Network security
Estiak Khan
 
Basics of Information System Security
chauhankapil
 
Network Security ppt
SAIKAT BISWAS
 
Threat Intelligence
Deepak Kumar (D3)
 
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Information security
razendar79
 
National cyber security policy final
Indian Air Force
 
Information Assurance And Security - Chapter 3 - Lesson 2
MLG College of Learning, Inc
 
Introduction to information security
Kumawat Dharmpal
 
Introduction to Incident Response Management
Don Caeiro
 
Software security
Roman Oliynykov
 
Ad

Similar to Information Assurance And Security - Chapter 1 - Lesson 4 (20)

PPT
Lesson 1- Information Policy
MLG College of Learning, Inc
 
PPT
Lesson 1- Risk Managment
MLG College of Learning, Inc
 
PPT
Lesson 2 - System Specific Policy
MLG College of Learning, Inc
 
PPTX
Chapter 1 - Lesson 2.pptx
JhaiJhai6
 
PPT
Principles of information security Chapter 5.ppt
EstherBaguma
 
PPT
Lesson 2-Identify Theft
MLG College of Learning, Inc
 
PPT
Lesson 1 - Introduction
MLG College of Learning, Inc
 
PPTX
Chapter 3 - Lesson 2.pptx
JhaiJhai6
 
PPT
Lesson 3- Major natural laws
MLG College of Learning, Inc
 
PPT
Chapter 5
sivadnolram
 
PPT
Information security
Praveen Minz
 
PPT
is_1_Introduction to Information Security
SARJERAO Sarju
 
PDF
1. Security and Risk Management
Sam Bowne
 
PPT
Introduction to information security
Elumalai Vasan
 
Lesson 1- Information Policy
MLG College of Learning, Inc
 
Lesson 1- Risk Managment
MLG College of Learning, Inc
 
Lesson 2 - System Specific Policy
MLG College of Learning, Inc
 
Chapter 1 - Lesson 2.pptx
JhaiJhai6
 
Principles of information security Chapter 5.ppt
EstherBaguma
 
Lesson 2-Identify Theft
MLG College of Learning, Inc
 
Lesson 1 - Introduction
MLG College of Learning, Inc
 
Chapter 3 - Lesson 2.pptx
JhaiJhai6
 
Lesson 3- Major natural laws
MLG College of Learning, Inc
 
Chapter 5
sivadnolram
 
Information security
Praveen Minz
 
is_1_Introduction to Information Security
SARJERAO Sarju
 
1. Security and Risk Management
Sam Bowne
 
Introduction to information security
Elumalai Vasan
 
Ad

More from MLG College of Learning, Inc (20)

PPTX
PC111.Lesson1
MLG College of Learning, Inc
 
PPTX
PC111-lesson1.pptx
MLG College of Learning, Inc
 
PPTX
PC LEESOON 6.pptx
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-09.pptx
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-07
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-01
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 04
MLG College of Learning, Inc
 
PPTX
PC 106 Slide no.02
MLG College of Learning, Inc
 
PPTX
pc-106-slide-3
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 2
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 1.pptx
MLG College of Learning, Inc
 
PDF
Db2 characteristics of db ms
MLG College of Learning, Inc
 
PDF
Db1 introduction
MLG College of Learning, Inc
 

Recently uploaded (20)

PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 

Information Assurance And Security - Chapter 1 - Lesson 4

  • 1. Principles of Information Security, Fifth Edition Chapter 1 Introduction to Information Security Lesson 4 – Software Design Principles
  • 2. Learning Objectives Upon completion of this lesson, you should be able to: - Describe the information security roles of professionals within an organization PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 2
  • 3. Software Design Principles Software development leaders J. H. Saltzer and M. D. Schroeder first identified security principles: ◦ Economy of mechanism ◦ Fail-safe defaults ◦ Complete mediation ◦ Open design ◦ Separation of privilege ◦ Least privilege ◦ Least common mechanism ◦ Psychological acceptability PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 3
  • 4. The NIST Approach to Securing the SDLC NIST Special Publication 800-64 rev. 2 maintains that early integration of security in the SDLC enables agencies to maximize return on investment through: ◦ Early identification and mitigation of security vulnerabilities and misconfigurations ◦ Awareness of potential engineering challenges ◦ Identification of shared security services and reuse of security strategies and tools ◦ Facilitation of informed executive decision making PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 4
  • 5. The NIST Approach: Initiation Security at this point is looked at in terms of business risks, with information security office providing input. Key security activities include: ◦ Delineation of business requirements in terms of confidentiality, integrity, and availability ◦ Determination of information categorization and identification of known special handling requirements to transmit, store, or create information ◦ Determination of any privacy requirements PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 5
  • 6. The NIST Approach: Development/Acquisition Key security activities include: ◦Conducting risk assessment and using results to supplement baseline security controls ◦Analyzing security requirements ◦Performing functional and security testing ◦Preparing initial documents for system certification and accreditation ◦Designing security architecture PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 6
  • 7. The NIST Approach: Implementation/Assessment System is installed and evaluated in operational environment. Key security activities include: ◦ Integrating information system into its environment ◦ Planning and conducting system certification activities in synchronization with testing of security controls ◦ Completing system accreditation activities PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 7
  • 8. The NIST Approach: Operations and Maintenance Systems are in place and operating, enhancements and/or modifications to the system are developed and tested, and hardware and/or software are added or replaced. Key security activities include: ◦ Conducting operational readiness review ◦ Managing configuration of system ◦ Instituting process and procedure for assured operations and continuous monitoring of information system’s security controls ◦ Performing reauthorization as required PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 8
  • 9. The NIST Approach: Disposal Provides for disposal of system and closeout of any contracts in place Key security activities include: ◦Building and executing disposal/transition plan ◦Archival of critical information ◦Sanitization of media ◦Disposal of hardware and software PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 9
  • 10. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 10
  • 11. Security Professionals and the Organization Wide range of professionals are required to support a diverse information security program. Senior management is the key component. Additional administrative support and technical expertise are required to implement details of IS program. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 11
  • 12. Senior Management Chief information officer (CIO) ◦ Senior technology officer ◦ Primarily responsible for advising the senior executives on strategic planning Chief information security officer (CISO) ◦ Has primary responsibility for assessment, management, and implementation of IS in the organization ◦ Usually reports directly to the CIO PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 12
  • 13. Information Security Project Team A small functional team of people who are experienced in one or multiple facets of required technical and nontechnical areas: ◦ Champion ◦ Team leader ◦ Security policy developers ◦ Risk assessment specialists ◦ Security professionals ◦ Systems administrators ◦ End users PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 13
  • 14. Data Responsibilities Data owners: senior management responsible for the security and use of a particular set of information Data custodian: responsible for information and systems that process, transmit, and store it Data users: individuals with an information security role PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 14
  • 15. Communities of Interest Group of individuals united by similar interests/values within an organization ◦ Information security management and professionals ◦ Information technology management and professionals ◦ Organizational management and professionals PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 15
  • 16. Information Security: Is It an Art or a Science? Implementation of information security is often described as a combination of art and science. “Security artisan” idea: based on the way individuals perceive system technologists and their abilities PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 16
  • 17. Security as Art No hard and fast rules nor many universally accepted complete solutions No manual for implementing security through entire system PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 17
  • 18. Security as Science Dealing with technology designed for rigorous performance levels Specific conditions cause virtually all actions in computer systems. Almost every fault, security hole, and systems malfunction is a result of interaction of specific hardware and software. If developers had sufficient time, they could resolve and eliminate faults. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 18
  • 19. Security as a Social Science Social science examines the behavior of individuals interacting with systems. Security begins and ends with the people that interact with the system, intentionally or otherwise. Security administrators can greatly reduce the levels of risk caused by end users and create more acceptable and supportable security profiles. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 19