SlideShare a Scribd company logo
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Information Security
Policies: General Principles
Lecture_4
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Introduction: What is Policy?
• POLICY: “A plan or course of action that influences decisions”
• Policy is the essential foundation of an effective
information security program
–“The success of an information resources protection program
depends on the policy generated, and on the attitude of
management toward securing information on automated systems”
• Policy maker sets the tone and emphasis on the
importance of information security
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Security Policy PURPOSES
• The basic purposes of policy are that it should:
 Protect people and information
 Set the rules for expected behaviour by users, system
administrator, management, and security personnel
 Authorize security personnel to monitor, probe, and investigate
 Define and authorize the consequences of violation
 Define the company consensus baseline stance on security
 Help minimize risk
 Help track compliance with regulations and legislation
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Security Policy OBJECTIVES
• Policy objectives
• a)Reduced risk
• b)Compliance with laws and regulations
• c)Assurance of operational continuity, information
integrity, and confidentiality
• For policies to be EFFECTIVE they must be properly
disseminated, read, understood, agreed-to, and uniformly
enforced
• Policies require CONSTANT modification and maintenance
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Why Policy?
• A quality information security program begins and
ends with policy
• Policies are the least expensive means of control and
often the most difficult to implement
• Basic rules for shaping a policy
–Policy should never conflict with law
–Policy must be able to stand up in court if challenged
–Policy must be properly supported and administered
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Why Policy? (cont’d.) Figure
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Why Policy? (cont’d.)
• Bulls-eye model layers
–Policies: first layer of defense
–Networks: threats first meet the organization’s
network
–Systems: computers and manufacturing
systems
–Applications: all applications systems
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Why Policy is Important?
• Policies are important reference
documents
–For internal audits
–For the resolution of legal disputes
about management's due diligence
–Policy documents can act as a clear
statement of management's intent
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• REFERENCES FOR
DEVELOPING
SECURITY PLANS
SP 800-18
Rev.1 (NIST)
• Can freely be downloaded from: http://csrc.nist.gov/publications/nistpubs/800-
18-Rev1/sp800-18-Rev1-final.pdf
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Examples of Information Security
Policy
• Bluetooth Device Security Policy
–This policy provides for more secure Bluetooth Device operations. It protects the
company from loss of Personally Identifiable Information (PII) and proprietary
company data.
• Dial-in Access Policy
–Defines appropriate dial-in access and its use by authorized personnel.
• Ethics Policy
–Defines the means to establish a culture of openness, trust and integrity in business
practices.
• Acquisition Assessment Policy
–Defines responsibilities regarding corporate acquisitions, and defines the minimum
requirements of an acquisition assessment to be completed by the information
security group.
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Other Examples of IS Policy
• Information Sensitivity Policy
–Defines the requirements for classifying and securing the organization's information in a manner
appropriate to its sensitivity level.
• Internal Lab Security Policy
–Defines requirements for internal labs to ensure that confidential information and technologies are
not compromised, and that production services and interests of the organization are protected
from lab activities.
• Personal Communication Devices and Voicemail Policy
–Describes Information Security's requirements for Personal Communication Devices and Voicemail.
• Risk Assessment Policy
–Defines the requirements and provides the authority for the information security team to identify,
assess, and remediate risks to the organization's information infrastructure associated with
conducting business.
• Technology Equipment Disposal - Policy SANS Technology Institute White Paper
• Web Application Security Assessment Policy
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Policies, Standards, & Practices
• Types of information security policy
1)Enterprise information security program policy (EISP)
2)Issue-specific information security policies (ISSP)
e-mail privacy or Internet connectivity approach
3)Systems-specific policies (SysSP)
System user - acceptable use of workstations for their actions on the
system
• Standards
–A more detailed statement of what must be done to comply with policy
• Practices
–Procedures and guidelines explain how employees will comply with policy
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Policies, Standards, & Practices
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Policies, Standards, & Practices
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
1) Enterprise Information Security Policy
(EISP)
• Sets strategic direction, scope, and tone for
organization’s security efforts
• Assigns responsibilities for various areas of
information security
• Guides development, implementation, and
management requirements of information
security program
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
EISP Elements
• EISP documents should provide:
–An overview of the corporate philosophy on security
–Information about information security organization
and information security roles
• Responsibilities for security that are shared by
all members of the organization
• Responsibilities for security that are unique to
each role within the organization
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Example EISP Components
• Statement of purpose
–What the policy is for
• Information technology security elements
–Defines information security
• Need for information technology security
– Justifies importance of information security in the organization
• Information technology security responsibilities
and roles
–Defines organizational structure
• Reference to other information technology
standards and guidelines
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
2) Issue-Specific Security Policy (ISSP)
• Provides detailed, targeted guidance
–Instructs the organization in secure use of a technology
systems
–Begins with introduction to fundamental technological
philosophy of the organization
• Protects organization from inefficiency and
ambiguity
–Documents how the technology-based system is
controlled
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
(ISSP)
• Protects organization from
inefficiency and ambiguity (cont’d.)
–Identifies the processes and authorities
that provide this control
• Indemnifies the organization against
liability for an employee’s
inappropriate or illegal system use
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Every organization’s ISSP should:
–Address specific technology-based
systems
–Require frequent updates
–Contain an issue statement on the
organization’s position on an issue
(ISSP)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• ISSP topics
–Email and internet use
–Minimum system configurations
–Prohibitions against hacking
–Home use of company-owned computer equipment
–Use of personal equipment on company networks
–Use of telecommunications technologies
–Use of photocopy equipment
(ISSP)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Components of the ISSP
• Statement of Purpose
–Scope and applicability
–Definition of technology addressed
–Responsibilities
• Authorized Access and Usage of
Equipment
–User access
–Fair and responsible use
–Protection of privacy
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Components of the ISSP (cont’d.)
• Prohibited Usage of Equipment
–Disruptive use or misuse
–Criminal use
–Offensive or harassing materials
–Copyrighted, licensed or other
intellectual property
–Other restrictions
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Components of the ISSP (cont’d.)
• Systems management
–Management of stored materials
–Employer monitoring
–Virus protection
–Physical security
–Encryption
• Violations of policy
–Procedures for reporting violations
–Penalties for violations
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Components of the ISSP (cont’d.)
• Policy review and modification
–Scheduled review of policy and procedures for modification
• Limitations of liability
–Statements of liability or disclaimers
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Implementing the ISSP
• Common approaches
–Several independent ISSP documents
–A single comprehensive ISSP document
–A modular ISSP document that unifies policy creation and
administration
•The recommended approach is the modular
policy
–Provides a balance between issue orientation and policy
management
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• System-specific security policies (SysSPs)
frequently do not look like other types of policy
–They may function as standards or procedures to be used
when configuring or maintaining systems
–E.g.: a) how to select, configure, or operate a firewall, b) access
control list that defines levels of access for each authorized
user
•SysSPs can be separated into
a)Management guidance
b)Technical specifications
c)Or combined in a single policy document
3) System-Specific Security Policy
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Created by management to guide the
implementation and configuration of
technology
• Applies to any technology that affects the
confidentiality, integrity or availability of
information
• Informs technologists of management
intent
a) Managerial Guidance SysSPs
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• System administrators’ directions on
implementing managerial policy
• Each type of equipment has its own type of
policies
• General methods of implementing technical
controls
a)Access Control List (ACL)
b)Configuration rules
b) Technical Specifications SysSPs
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
A) Access control lists
–Include the user access lists, matrices, and
capability tables that govern the rights and
privileges
–A similar method that specifies which subjects
and objects users or groups can access is called a
capability table
–These specifications are frequently complex
matrices, rather than simple lists or tables
Technical Specifications SysSPs (cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Access control lists (cont’d.)
–Enable administrations to restrict access
according to user, computer, time, duration, or
even a particular file
• Access control lists regulate
–Who can use the system
–What authorized users can access
–When authorized users can access the system
Technical Specifications SysSPs (cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Access control lists regulate (cont’d.)
–Where authorized users can access the system
from
–How authorized users can access the system
–Restricting what users can access, e.g. printers,
files, communications, and applications
• Administrators set user privileges
–Read, write, create, modify, delete, compare, copy
Technical Specifications SysSPs (cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Technical Specifications SysSPs (cont’d.)
Figure 5: Windows XP ACL
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
B) Configuration rules
–Specific configuration codes entered into
security systems
•Guide the execution of the system when
information is passing through it
•Rule policies are more specific to system
operation than ACLs
–May or may not deal with users directly
Technical Specifications SysSPs (cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Many security systems require
specific configuration scripts telling
the systems what actions to
perform on each set of information
they process
Technical Specifications SysSPs (cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Technical Specifications SysSPs (cont’d.)
Figure 6: Firewall configuration rules
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Often organizations create a single
document combining elements of both
management guidance and technical
specifications SysSPs
• This can be confusing, but practical
• Care should be taken to articulate the
required actions carefully as the
procedures are presented
Technical Specifications SysSPs (cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• For policies to be effective, they must be
properly:
Developed using industry-accepted practices
Distributed or disseminated using all appropriate methods
Reviewed or read by all employees
Understood by all employees
Formally agreed to by act or assertion
Uniformly applied and enforced
Guidelines for Effective Policy
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• It is often useful to view policy development
as a 2-part project
–1st - design and develop the policy (or redesign and
rewrite an outdated policy)
–2nd - establish management processes to
perpetuate/carry on the policy within the organization
• The former is an exercise in project
management, while the latter requires
adherence to good business practices
Develop Security Policy
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Policy development projects should
be
–Well planned
–Properly funded
–Aggressively managed to ensure that it is
completed on time and within budget
• The policy development project can be
guided by the SecSDLC process
Develop Security Policy Cont’d
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
1) Investigation
2) Analysis
3) Design
4) Implementation
5) Maintenance
Common Phases in Developing Security Policy
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
1) Investigation phase
 Obtain support from senior management,
and active involvement of IT management,
specifically the CIO
 Clearly articulate the goals of the policy
project
 Gain participation of correct individuals
affected by the recommended policies
Developing Security Policy
(cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Investigation phase (cont’d.)
 Involve legal, human resources and end-
users
 Assign a project champion with sufficient
stature and prestige
 Acquire a capable project manager
 Develop a detailed outline of and sound
estimates for project cost and scheduling
Developing Security Policy
(cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
2) Analysis phase should produce
 New or recent risk assessment or IT aud
documenting the current information
security needs of the organization
 Key reference materials
 Including any existing policies
Developing Security Policy
(cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Developing Security Policy
(cont’d.)
Figure 8 End user license agreement for Microsoft Windows XP
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
4) Implementation phase includes
 Writing the policies
 Making certain the policies are enforceable as
written
 Policy distribution is not always straightforward
 Effective policy is written at a reasonable reading
level, and attempts to minimize technical jargon
and management terminology
Developing Security Policy
(cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
3) Design phase includes
 How the policies will be distributed
 How verification of the distribution will be
accomplished
 Specifications for any automated tools
 Revisions to feasibility analysis reports based on
improved costs and benefits as the design is
clarified
Developing Security Policy
(cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
5) Maintenance Phase
 Maintain and modify the policy as needed to
ensure that it remains effective as a tool to
meet changing threats
 The policy should have a built-in mechanism via
which users can report problems with the
policy, preferably anonymously
 Periodic review should be built in to the process
Developing Security Policy
(cont’d.)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Gathering key reference materials
• Defining a framework for policies
• Preparing a coverage matrix
• Making critical systems design decisions
• Structuring review, approval, and
enforcement processes
The Information Securities Policy Made Easy Approach (ISPME)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
The Information Securities Policy Made Easy Approach (ISPME)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• ISPME checklist
–Perform a risk assessment or information technology
audit
To determine your organization's unique information
security needs
–Clarify the meaning of “policy” within your organization
–Ensure clear roles and responsibilities related to
information security
Including responsibility for issuing and maintaining
policies
The Information Securities Policy Made Easy Approach (ISPME)
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Lest you believe that the only reason to have
policies is to avoid litigation, it is important to
emphasize the preventative nature of policy
 Policies exist, first and foremost, to inform
employees of what is and is not acceptable
behavior in the organization
 Policy seeks to improve employee productivity,
and prevent potentially embarrassing situations
A Final Note on Policy
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• The rules the members of a society
create to balance the individual rights
to self-determination against the needs
of the society as a whole are called laws.
Laws are rules that mandate or prohibit
certain behavior; they are drawn from
ethics, which define socially acceptable
behaviors.
Law and Ethics in Information
Security
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• The key difference between laws
and ethics is that laws carry the
authority of a governing body, and
ethics do not. Ethics in turn are
based on cultural mores: the fixed
moral attitudes or customs of a
particular group.
Law and Ethics in Information
Security
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Within an organization, information
security professionals help maintain
security via the establishment and
enforcement of policies. These
policies are guidelines that describe
acceptable and unacceptable
employee behaviors in the workplace.
Policy Versus Law
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• They function as organizational laws,
complete with penalties, judicial practices,
and sanctions to require compliance.
Because these policies function as laws,
they must be crafted and implemented
with the same care to ensure that they
are complete, appropriate, and fairly
applied to everyone in the workplace.
Policy Versus Law
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• The difference between a policy and a
law, however, is that ignorance of a policy
is an acceptable defense. Thus, for a policy
to become enforceable, it must meet the
following five criteria:
• Dissemination (Distribution), Review (reading),
Comprehension (understanding), Compliance
(agreement), Uniform enforcement.
Policy Versus Law
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Civil law comprises a wide variety of laws that govern a nation or
state and deal with the relationships and conflicts between
organizational entities and people.
• Criminal law addresses activities and conduct harmful to society,
and is actively enforced by the state. Law can also be categorized as
private or public.
• Private law encompasses family law, commercial law, and labor law,
and regulates the relationship between individuals and
organizations.
• Public law regulates the structure and administration of
government agencies and their relationships with citizens,
employees, and other governments. Public law includes criminal,
administrative, and constitutional law.
Types of Law
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
From The Computer Ethics Institute
•Thou shalt not use a computer to harm other people.
•Thou shalt not interfere with other people’s computer
work.
•Thou shalt not snoop around in other people’s
computer files.
•Thou shalt not use a computer to steal.
•Thou shalt not use a computer to bear false witness.
Ethics and Information Security
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
• Thou shalt not copy or use proprietary software for which
you have not paid.
• Thou shalt not use other people’s computer resources
without authorization or proper compensation.
• Thou shalt not appropriate other people’s intellectual
output.
• Thou shalt think about the social consequences of the
program you are writing or the system you are designing.
• Thou shalt always use a computer in ways that ensure
consideration and respect for your fellow humans.
Ethics and Information Security

More Related Content

Similar to Lecture Notes for Postgraduates Students.ppt (20)

PPTX
DGI Compliance Webinar
SolarWinds
 
PPTX
Information Security Blueprint
Zefren Edior
 
PDF
Revealing the 2016 State of IBM i Security
HelpSystems
 
PPTX
Security management concepts and principles
Divya Tiwari
 
PPTX
Defense-in-Depth - ITE-Defense-in-Depth - ITE-Defense-in-Depth - ITE.pptx
samadyasrah
 
PDF
CIA-Triad-Presentation.pdf
BabyBoy55
 
PPTX
D1 security and risk management v1.62
AlliedConSapCourses
 
PPT
Risk Based Security and Self Protection Powerpoint
randalje86
 
PDF
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Denim Group
 
PPT
Ch01.ppt
temesgen895939
 
KEY
Application Security Done Right
pvanwoud
 
PPTX
L1_Introduction.pptx
StevenTharp2
 
PDF
ACS-security-2821-001 Lecture Note 13.pdf
Mostafa Taghizade
 
PPTX
Topic11
Anne Starr
 
PPTX
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
kevlekalakala
 
PPTX
Jason r mc kinney halfday
Jason Mckinney-Halfday
 
PPTX
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
 
PPTX
Cyber security applied to embedded systems
Tonex
 
PPTX
Selling to The IT Department
3VR Inc.
 
DGI Compliance Webinar
SolarWinds
 
Information Security Blueprint
Zefren Edior
 
Revealing the 2016 State of IBM i Security
HelpSystems
 
Security management concepts and principles
Divya Tiwari
 
Defense-in-Depth - ITE-Defense-in-Depth - ITE-Defense-in-Depth - ITE.pptx
samadyasrah
 
CIA-Triad-Presentation.pdf
BabyBoy55
 
D1 security and risk management v1.62
AlliedConSapCourses
 
Risk Based Security and Self Protection Powerpoint
randalje86
 
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Denim Group
 
Ch01.ppt
temesgen895939
 
Application Security Done Right
pvanwoud
 
L1_Introduction.pptx
StevenTharp2
 
ACS-security-2821-001 Lecture Note 13.pdf
Mostafa Taghizade
 
Topic11
Anne Starr
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
kevlekalakala
 
Jason r mc kinney halfday
Jason Mckinney-Halfday
 
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
 
Cyber security applied to embedded systems
Tonex
 
Selling to The IT Department
3VR Inc.
 

More from Muhammad54342 (14)

PPTX
Advanced Cyber Security and Digital Forensics.pptx
Muhammad54342
 
PPTX
CYB 305 Forensics and Digital Computer Security.pptx
Muhammad54342
 
PPT
An Introduction to Privacy Policy Lecture Note One.ppt
Muhammad54342
 
PPTX
Signal Processing Digital and Continuous part2.pptx
Muhammad54342
 
PPTX
Signal Processing Digital and Continuous .pptx
Muhammad54342
 
PPT
An Introduction to Computer Logic and Digital Design.ppt
Muhammad54342
 
PPT
Information Processing System Computing made easy.ppt
Muhammad54342
 
PPT
Cyber Forensics Make Easy Notes for Beginners.ppt
Muhammad54342
 
PPT
A Guide to Computer Forensics Lecture Notes .ppt
Muhammad54342
 
PPT
Computer Security and Privacy Lecture Notes .ppt
Muhammad54342
 
PPTX
Advanced Software Engineering Lecture Notes from University of Maiduguri.pptx
Muhammad54342
 
PPT
Wireless Sensor Networks Lectures notes.ppt
Muhammad54342
 
PPT
Introduction to IP Addressing for Networking.ppt
Muhammad54342
 
PPTX
Multiprocessor.pptx
Muhammad54342
 
Advanced Cyber Security and Digital Forensics.pptx
Muhammad54342
 
CYB 305 Forensics and Digital Computer Security.pptx
Muhammad54342
 
An Introduction to Privacy Policy Lecture Note One.ppt
Muhammad54342
 
Signal Processing Digital and Continuous part2.pptx
Muhammad54342
 
Signal Processing Digital and Continuous .pptx
Muhammad54342
 
An Introduction to Computer Logic and Digital Design.ppt
Muhammad54342
 
Information Processing System Computing made easy.ppt
Muhammad54342
 
Cyber Forensics Make Easy Notes for Beginners.ppt
Muhammad54342
 
A Guide to Computer Forensics Lecture Notes .ppt
Muhammad54342
 
Computer Security and Privacy Lecture Notes .ppt
Muhammad54342
 
Advanced Software Engineering Lecture Notes from University of Maiduguri.pptx
Muhammad54342
 
Wireless Sensor Networks Lectures notes.ppt
Muhammad54342
 
Introduction to IP Addressing for Networking.ppt
Muhammad54342
 
Multiprocessor.pptx
Muhammad54342
 
Ad

Recently uploaded (20)

PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
Precedence and Associativity in C prog. language
Mahendra Dheer
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPTX
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
PPTX
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PPTX
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Precedence and Associativity in C prog. language
Mahendra Dheer
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
Inventory management chapter in automation and robotics.
atisht0104
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Ad

Lecture Notes for Postgraduates Students.ppt

  • 1. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Information Security Policies: General Principles Lecture_4
  • 2. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Introduction: What is Policy? • POLICY: “A plan or course of action that influences decisions” • Policy is the essential foundation of an effective information security program –“The success of an information resources protection program depends on the policy generated, and on the attitude of management toward securing information on automated systems” • Policy maker sets the tone and emphasis on the importance of information security
  • 3. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 4. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Security Policy PURPOSES • The basic purposes of policy are that it should:  Protect people and information  Set the rules for expected behaviour by users, system administrator, management, and security personnel  Authorize security personnel to monitor, probe, and investigate  Define and authorize the consequences of violation  Define the company consensus baseline stance on security  Help minimize risk  Help track compliance with regulations and legislation
  • 5. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Security Policy OBJECTIVES • Policy objectives • a)Reduced risk • b)Compliance with laws and regulations • c)Assurance of operational continuity, information integrity, and confidentiality • For policies to be EFFECTIVE they must be properly disseminated, read, understood, agreed-to, and uniformly enforced • Policies require CONSTANT modification and maintenance
  • 6. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Why Policy? • A quality information security program begins and ends with policy • Policies are the least expensive means of control and often the most difficult to implement • Basic rules for shaping a policy –Policy should never conflict with law –Policy must be able to stand up in court if challenged –Policy must be properly supported and administered
  • 7. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Why Policy? (cont’d.) Figure
  • 8. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Why Policy? (cont’d.) • Bulls-eye model layers –Policies: first layer of defense –Networks: threats first meet the organization’s network –Systems: computers and manufacturing systems –Applications: all applications systems
  • 9. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Why Policy is Important? • Policies are important reference documents –For internal audits –For the resolution of legal disputes about management's due diligence –Policy documents can act as a clear statement of management's intent
  • 10. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 11. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • REFERENCES FOR DEVELOPING SECURITY PLANS SP 800-18 Rev.1 (NIST) • Can freely be downloaded from: http://csrc.nist.gov/publications/nistpubs/800- 18-Rev1/sp800-18-Rev1-final.pdf
  • 12. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Examples of Information Security Policy • Bluetooth Device Security Policy –This policy provides for more secure Bluetooth Device operations. It protects the company from loss of Personally Identifiable Information (PII) and proprietary company data. • Dial-in Access Policy –Defines appropriate dial-in access and its use by authorized personnel. • Ethics Policy –Defines the means to establish a culture of openness, trust and integrity in business practices. • Acquisition Assessment Policy –Defines responsibilities regarding corporate acquisitions, and defines the minimum requirements of an acquisition assessment to be completed by the information security group.
  • 13. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Other Examples of IS Policy • Information Sensitivity Policy –Defines the requirements for classifying and securing the organization's information in a manner appropriate to its sensitivity level. • Internal Lab Security Policy –Defines requirements for internal labs to ensure that confidential information and technologies are not compromised, and that production services and interests of the organization are protected from lab activities. • Personal Communication Devices and Voicemail Policy –Describes Information Security's requirements for Personal Communication Devices and Voicemail. • Risk Assessment Policy –Defines the requirements and provides the authority for the information security team to identify, assess, and remediate risks to the organization's information infrastructure associated with conducting business. • Technology Equipment Disposal - Policy SANS Technology Institute White Paper • Web Application Security Assessment Policy
  • 14. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 15. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Policies, Standards, & Practices • Types of information security policy 1)Enterprise information security program policy (EISP) 2)Issue-specific information security policies (ISSP) e-mail privacy or Internet connectivity approach 3)Systems-specific policies (SysSP) System user - acceptable use of workstations for their actions on the system • Standards –A more detailed statement of what must be done to comply with policy • Practices –Procedures and guidelines explain how employees will comply with policy
  • 16. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Policies, Standards, & Practices
  • 17. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Policies, Standards, & Practices
  • 18. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. 1) Enterprise Information Security Policy (EISP) • Sets strategic direction, scope, and tone for organization’s security efforts • Assigns responsibilities for various areas of information security • Guides development, implementation, and management requirements of information security program
  • 19. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 20. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. EISP Elements • EISP documents should provide: –An overview of the corporate philosophy on security –Information about information security organization and information security roles • Responsibilities for security that are shared by all members of the organization • Responsibilities for security that are unique to each role within the organization
  • 21. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Example EISP Components • Statement of purpose –What the policy is for • Information technology security elements –Defines information security • Need for information technology security – Justifies importance of information security in the organization • Information technology security responsibilities and roles –Defines organizational structure • Reference to other information technology standards and guidelines
  • 22. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. 2) Issue-Specific Security Policy (ISSP) • Provides detailed, targeted guidance –Instructs the organization in secure use of a technology systems –Begins with introduction to fundamental technological philosophy of the organization • Protects organization from inefficiency and ambiguity –Documents how the technology-based system is controlled
  • 23. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. (ISSP) • Protects organization from inefficiency and ambiguity (cont’d.) –Identifies the processes and authorities that provide this control • Indemnifies the organization against liability for an employee’s inappropriate or illegal system use
  • 24. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Every organization’s ISSP should: –Address specific technology-based systems –Require frequent updates –Contain an issue statement on the organization’s position on an issue (ISSP)
  • 25. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • ISSP topics –Email and internet use –Minimum system configurations –Prohibitions against hacking –Home use of company-owned computer equipment –Use of personal equipment on company networks –Use of telecommunications technologies –Use of photocopy equipment (ISSP)
  • 26. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Components of the ISSP • Statement of Purpose –Scope and applicability –Definition of technology addressed –Responsibilities • Authorized Access and Usage of Equipment –User access –Fair and responsible use –Protection of privacy
  • 27. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Components of the ISSP (cont’d.) • Prohibited Usage of Equipment –Disruptive use or misuse –Criminal use –Offensive or harassing materials –Copyrighted, licensed or other intellectual property –Other restrictions
  • 28. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Components of the ISSP (cont’d.) • Systems management –Management of stored materials –Employer monitoring –Virus protection –Physical security –Encryption • Violations of policy –Procedures for reporting violations –Penalties for violations
  • 29. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Components of the ISSP (cont’d.) • Policy review and modification –Scheduled review of policy and procedures for modification • Limitations of liability –Statements of liability or disclaimers
  • 30. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Implementing the ISSP • Common approaches –Several independent ISSP documents –A single comprehensive ISSP document –A modular ISSP document that unifies policy creation and administration •The recommended approach is the modular policy –Provides a balance between issue orientation and policy management
  • 31. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • System-specific security policies (SysSPs) frequently do not look like other types of policy –They may function as standards or procedures to be used when configuring or maintaining systems –E.g.: a) how to select, configure, or operate a firewall, b) access control list that defines levels of access for each authorized user •SysSPs can be separated into a)Management guidance b)Technical specifications c)Or combined in a single policy document 3) System-Specific Security Policy
  • 32. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 33. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Created by management to guide the implementation and configuration of technology • Applies to any technology that affects the confidentiality, integrity or availability of information • Informs technologists of management intent a) Managerial Guidance SysSPs
  • 34. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • System administrators’ directions on implementing managerial policy • Each type of equipment has its own type of policies • General methods of implementing technical controls a)Access Control List (ACL) b)Configuration rules b) Technical Specifications SysSPs
  • 35. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. A) Access control lists –Include the user access lists, matrices, and capability tables that govern the rights and privileges –A similar method that specifies which subjects and objects users or groups can access is called a capability table –These specifications are frequently complex matrices, rather than simple lists or tables Technical Specifications SysSPs (cont’d.)
  • 36. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Access control lists (cont’d.) –Enable administrations to restrict access according to user, computer, time, duration, or even a particular file • Access control lists regulate –Who can use the system –What authorized users can access –When authorized users can access the system Technical Specifications SysSPs (cont’d.)
  • 37. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Access control lists regulate (cont’d.) –Where authorized users can access the system from –How authorized users can access the system –Restricting what users can access, e.g. printers, files, communications, and applications • Administrators set user privileges –Read, write, create, modify, delete, compare, copy Technical Specifications SysSPs (cont’d.)
  • 38. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Technical Specifications SysSPs (cont’d.) Figure 5: Windows XP ACL
  • 39. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. B) Configuration rules –Specific configuration codes entered into security systems •Guide the execution of the system when information is passing through it •Rule policies are more specific to system operation than ACLs –May or may not deal with users directly Technical Specifications SysSPs (cont’d.)
  • 40. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Many security systems require specific configuration scripts telling the systems what actions to perform on each set of information they process Technical Specifications SysSPs (cont’d.)
  • 41. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Technical Specifications SysSPs (cont’d.) Figure 6: Firewall configuration rules
  • 42. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Often organizations create a single document combining elements of both management guidance and technical specifications SysSPs • This can be confusing, but practical • Care should be taken to articulate the required actions carefully as the procedures are presented Technical Specifications SysSPs (cont’d.)
  • 43. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • For policies to be effective, they must be properly: Developed using industry-accepted practices Distributed or disseminated using all appropriate methods Reviewed or read by all employees Understood by all employees Formally agreed to by act or assertion Uniformly applied and enforced Guidelines for Effective Policy
  • 44. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • It is often useful to view policy development as a 2-part project –1st - design and develop the policy (or redesign and rewrite an outdated policy) –2nd - establish management processes to perpetuate/carry on the policy within the organization • The former is an exercise in project management, while the latter requires adherence to good business practices Develop Security Policy
  • 45. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Policy development projects should be –Well planned –Properly funded –Aggressively managed to ensure that it is completed on time and within budget • The policy development project can be guided by the SecSDLC process Develop Security Policy Cont’d
  • 46. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. 1) Investigation 2) Analysis 3) Design 4) Implementation 5) Maintenance Common Phases in Developing Security Policy
  • 47. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. 1) Investigation phase  Obtain support from senior management, and active involvement of IT management, specifically the CIO  Clearly articulate the goals of the policy project  Gain participation of correct individuals affected by the recommended policies Developing Security Policy (cont’d.)
  • 48. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Investigation phase (cont’d.)  Involve legal, human resources and end- users  Assign a project champion with sufficient stature and prestige  Acquire a capable project manager  Develop a detailed outline of and sound estimates for project cost and scheduling Developing Security Policy (cont’d.)
  • 49. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. 2) Analysis phase should produce  New or recent risk assessment or IT aud documenting the current information security needs of the organization  Key reference materials  Including any existing policies Developing Security Policy (cont’d.)
  • 50. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Developing Security Policy (cont’d.) Figure 8 End user license agreement for Microsoft Windows XP
  • 51. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. 4) Implementation phase includes  Writing the policies  Making certain the policies are enforceable as written  Policy distribution is not always straightforward  Effective policy is written at a reasonable reading level, and attempts to minimize technical jargon and management terminology Developing Security Policy (cont’d.)
  • 52. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. 3) Design phase includes  How the policies will be distributed  How verification of the distribution will be accomplished  Specifications for any automated tools  Revisions to feasibility analysis reports based on improved costs and benefits as the design is clarified Developing Security Policy (cont’d.)
  • 53. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. 5) Maintenance Phase  Maintain and modify the policy as needed to ensure that it remains effective as a tool to meet changing threats  The policy should have a built-in mechanism via which users can report problems with the policy, preferably anonymously  Periodic review should be built in to the process Developing Security Policy (cont’d.)
  • 54. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Gathering key reference materials • Defining a framework for policies • Preparing a coverage matrix • Making critical systems design decisions • Structuring review, approval, and enforcement processes The Information Securities Policy Made Easy Approach (ISPME)
  • 55. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. The Information Securities Policy Made Easy Approach (ISPME)
  • 56. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • ISPME checklist –Perform a risk assessment or information technology audit To determine your organization's unique information security needs –Clarify the meaning of “policy” within your organization –Ensure clear roles and responsibilities related to information security Including responsibility for issuing and maintaining policies The Information Securities Policy Made Easy Approach (ISPME)
  • 57. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Lest you believe that the only reason to have policies is to avoid litigation, it is important to emphasize the preventative nature of policy  Policies exist, first and foremost, to inform employees of what is and is not acceptable behavior in the organization  Policy seeks to improve employee productivity, and prevent potentially embarrassing situations A Final Note on Policy
  • 58. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • The rules the members of a society create to balance the individual rights to self-determination against the needs of the society as a whole are called laws. Laws are rules that mandate or prohibit certain behavior; they are drawn from ethics, which define socially acceptable behaviors. Law and Ethics in Information Security
  • 59. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • The key difference between laws and ethics is that laws carry the authority of a governing body, and ethics do not. Ethics in turn are based on cultural mores: the fixed moral attitudes or customs of a particular group. Law and Ethics in Information Security
  • 60. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Within an organization, information security professionals help maintain security via the establishment and enforcement of policies. These policies are guidelines that describe acceptable and unacceptable employee behaviors in the workplace. Policy Versus Law
  • 61. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • They function as organizational laws, complete with penalties, judicial practices, and sanctions to require compliance. Because these policies function as laws, they must be crafted and implemented with the same care to ensure that they are complete, appropriate, and fairly applied to everyone in the workplace. Policy Versus Law
  • 62. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • The difference between a policy and a law, however, is that ignorance of a policy is an acceptable defense. Thus, for a policy to become enforceable, it must meet the following five criteria: • Dissemination (Distribution), Review (reading), Comprehension (understanding), Compliance (agreement), Uniform enforcement. Policy Versus Law
  • 63. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Civil law comprises a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people. • Criminal law addresses activities and conduct harmful to society, and is actively enforced by the state. Law can also be categorized as private or public. • Private law encompasses family law, commercial law, and labor law, and regulates the relationship between individuals and organizations. • Public law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments. Public law includes criminal, administrative, and constitutional law. Types of Law
  • 64. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. From The Computer Ethics Institute •Thou shalt not use a computer to harm other people. •Thou shalt not interfere with other people’s computer work. •Thou shalt not snoop around in other people’s computer files. •Thou shalt not use a computer to steal. •Thou shalt not use a computer to bear false witness. Ethics and Information Security
  • 65. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. • Thou shalt not copy or use proprietary software for which you have not paid. • Thou shalt not use other people’s computer resources without authorization or proper compensation. • Thou shalt not appropriate other people’s intellectual output. • Thou shalt think about the social consequences of the program you are writing or the system you are designing. • Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. Ethics and Information Security