1 / 32

Introduction to the Management of Information Security

Introduction to the Management of Information Security. Dan Hein, Dinesh Raveendran, Molly Coplen Feb 3, 2008. Organization. Overview of Information Security Defining Security Information Security Management The Six P’s of Information Security. Information Security.

deron
Download Presentation

Introduction to the Management of Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to the Management of Information Security Dan Hein, Dinesh Raveendran, Molly Coplen Feb 3, 2008

  2. Organization • Overview of Information Security • Defining Security • Information Security Management • The Six P’s of Information Security

  3. Information Security • Risk Analysis is an essential central activity required to secure information assets • Information asset enumeration, • Threat enumeration, • Threat potential and impact and/or damage • Risk Analysis provides rationale (cost justification) for sound business decisions and cross-cuts several communities: • Information Security Community • Information Technology Community • General Business Community

  4. What is Security • The quality or state of being secure – to be free from danger. • Example: National Security • Multiple types of security specialization: • Physical – Protection of people, physical assets, and workplace • Operations – Carrying of the operational activities without interruption or compromise • Communications- Protection of communication media, technology and content • Network – Protection of networking devices, connections and content

  5. Information Security Network Security Policy Management of InfoSec Computer & Data Security Information Security • Information Security (InfoSec) encompasses • Management of information security • Computer & data security • Network Security

  6. Confidentiality Policy Education Technology Integrity Availability Storage Processing Transmission NSTISSC* Security Model • NSTISSC* Security Model • A CNSS model known as McCumber Cube • Purpose: Identify gaps in information security program • Weakness: Addresses only InfoSec Community and leaves out business and broader IT community *-National SecurityTelecommunications and Information Systems Security Committee

  7. Key Concepts of InfoSec • C.I.A Triangle – Basis for CNSS model for InfoSec • Three essential characteristics • Confidentiality, integrity and availability • Limited in scope • Difficult to encompass changing environment • Threats – Accidental or intentional damage, destruction, theft, unintended or unauthorized modification, other human misuses or other threats • Development of a robust model for current IS environment and rapidly changing IT industry with a comprehensive list of critical characteristics

  8. Key Concepts continued… • Confidentiality • Only those with sufficient privileges and demonstrated need may access certain information • Measures to protect it - Information classification, Secure document storage, Application of general security policies, Education of information custodians and end users and Cryptography • Examples: Mailing confidential information outside the organization, Hacker breaking in to an internal database

  9. Key Concepts continued… • Integrity • The quality or state of being whole, complete, and uncorrupted • Corruption can occur while information is being entered, stored, or transmitted • Viruses, worms and even faulty programming can corrupt data • Detection: check file’s state, or file’s hash value or checksum • Prevention: redundancy bits and check bits, file hashing

  10. Key Concepts continued… • Availability • Characteristic of information that enables user access to information without interference in a useable format • Access to only authorized users • Analogy: Library Access • Privacy • Information that is collected, used and stored by an organization is intended only for the purposes stated to the data owner at the time it was collected • Collect, swap and sell personal information • Data used without original owner’s consent

  11. Key Concepts continued… • Identification • Ability to recognize individual users for an IS • First step in gaining access to secured data • Foundation to authentication and authorization • Performed with username and/or password • Authentication • When a control provides proof that a user possesses the identity that he/she claims. • Examples: use of cryptographic certificates to establish SSL

  12. Key Concepts continued… • Authorization • After authentication, this process provides the assurance that the user has been specifically and explicitly authorized by the proper authority • Example: activation and use of ACLs • Accountability • When a control provides assurance that every activity undertaken can be attributed to a person or a process • Example: Audit logs

  13. What is Management? Management is the process of achieving objectives given a set of resources. A manager is a member of the organization assigned to marshal and administer resources, coordinate the completion of tasks, and handle the many roles necessary to meet the desired objectives. 13 8/8/2014

  14. Management Theories 14 • Frederick Winslow Taylor (1900s) • Wandered around factories with a stopwatch and a clipboard to measure worker productivity. • Management’s job is to improve productivity by refining the processes workers perform. • Douglas McGregor - Theory X and Theory Y (1960) • Theory X: Classic command and control – “Carrot-and-the-stick” - workers are basically lazy. • Theory Y: People exercise self-direction and self control in the achievement of organizational objectives. Carrots induce people to stay. 8/8/2014

  15. Management Theories 15 • W. Edwards Deming – Total Quality Management (1980s) • Stressed quality and customer focus in internal operations • Decision making, performance measurement, and compensation • Vertical integration • Business Process Re-engineering (1990s) • Reorganize the business around processes such as purchasing, marketing, and distribution instead of corporate silos based on products and geography. 8/8/2014

  16. Leadership versus Management Leaders Influences employees so that they are willing to accomplish objectives. Leadership provides purpose, direction, and motivation to those who follow. Managers Administers resources of the organization: Create budgets Authorize expenditures Hire employees 16 8/8/2014

  17. Key Characteristic of a Leader 17 A key characteristic of a leader is concern for subordinates as well as strong motivation for accomplishing organizational objectives. Exhibit principles of be..know..and do. As a leader you must be a person of strong and honorable character, be committed to professional ethics, be an example of individual values, and be able to resolve complex ethical dilemmas. You must know the details of your situation, the standards to which you work, yourself, human nature, and your team. You must do by providing purpose, direction, and motivation to your teams. 8/8/2014

  18. Characteristics of a LeaderUS Military Model 18 Bearing Courage Decisiveness Dependability Endurance Enthusiasm Initiative Integrity Judgment Justice Knowledge Loyalty Tact Unselfishness 8/8/2014

  19. Improvement of Leadership Abilities 19 Know yourself and seek self improvement Be technically and tactically proficient See responsibility and take responsibility for your actions Make sound and timely decisions Set the example Know your subordinates and look out for their well-being Keep your subordinates informed Develop a sense of responsibility in your subordinates Ensure the task is understood, supervised, and accomplished Build the team Employ your team in accordance with its capabilities 8/8/2014

  20. Behavioral Types of Leaders Autocratic Reserves all decision-making responsibility for themselves, and are more “do as I say” types of managers. Issues an order to accomplish a task and does not seek or accept alternative viewpoints. Democratic Seeks input from all interested parties, requesting ideas and suggestions, and then formulating a position that can be supported by a majority. Laissez-faire Allows the process to develop as it goes, only making minimal decisions to avoid bringing the process to a complete halt. 20 8/8/2014

  21. The Planning-Controlling Link Planning Goals, Objectives, Strategies, Plans Controlling Standards, Measurements, Comparisons, Action Organizing Structure, Human Resource Management Leading Motivation, Leadership, Communication, Behavior 21 8/8/2014

  22. Planning Strategic Highest level of the organization – Board of Directors, Executive Management Time horizon – five or more years Tactical Mid-level managers – implementation of the strategic plan Time horizon – one to five years Operational Supervisors - Day-to-day operations of local resources Time horizon - immediate 22 8/8/2014

  23. Organizing 23 “The principle of management dedicated to the structuring of resources to support the accomplishments of objectives.” • Organizing tasks: • What is to be done and in what order • Who is doing the work • How is the work being accomplished • When - timeline 8/8/2014

  24. Leadership and Motivation 24 • Peter Drucker • A responsible manager has authority. • Workers are led, not managed. • The workplace is participatory, but not “free-wheeling.” • Workers are not motivated through money alone. • Each worker is motivated differently, according to the individual and the situation. • Management recognizes that workers could leave the organization. 8/8/2014

  25. What Motivates Workers 25 Work with people who treat me with respect Interesting work Recognition Opportunity to develop skills Work for people who will listen to you Ability to think for self, not just carry out instructions Seeing the end results of my work Work for efficient managers Job security High pay Good benefits 8/8/2014

  26. Controlling 26 • This function determines what is monitored, the tools to gather and evaluate information, and the corrective action. • Four categories of control tools: • Information – flow of information in the organization • Financial – guide the expenditure of monetary resources. • Operational – evaluate the efficiency and effectiveness of business process flows. • Behavioral – evaluate the efficiency and effectiveness of human resources. 8/8/2014

  27. Control Process Standard Attained? Yes Continue Process Compare Actual vs Standard No Variance Accepted? Yes Continue Process Actual Performance Performance Standard No Yes Standard Acceptable? Identify cause of variation No Revise Standard Correct Performance 27 8/8/2014

  28. Solving Problems • Step 1: Recognize and Define the Problem • How do I know that I have a problem ? • What is the real cause of the problem ? • Step 2: Gather Facts and Make Assumptions • Interview, collect data, review documentation • Step 3: Develop Possible Solutions • Brian storm, interview experts, review research • Step 4: Analyze and Compare Possible Solution • Financial impact, cost-benefit analysis, operation impact • Unintended consequences ?? • Step 5: Select, Implement, and Evaluate a Solution • Monitor the solution – intended impact? 28 8/8/2014

  29. Six Principles of Information Security • Planning - Draw upon larger business / IT plans to develop InfoSec plans that support business goals and objectives. • Policy – Organizational document(s) specifying acceptable and unacceptable use, actions constituting abuse, and punishments for violators [Panko03] . • Programs – Ongoing operational activities to support goals of information security: Education, Training, Drills, and onsite physical access.

  30. Six Principles continued… • Protection – Ongoing risk management identifies information assets, enumerates threats, and performs risk reduction or transference. • People – Training people within an organization is critical for maintaining proper information security; some of the simplest attacks are social-engineering attacks. • Project Management – Continuously monitoring and measuring progress towards InfoSec goals/objectives and making corrective action when needed.

  31. Questions ?

  32. Bibliography 32 • Anonymous, “The Way We Were,” Management Today, London: June 1998, pp 111-112. • Anonymous, “TGM-A Cornerstone of Quality”, Quality Progress. Milwaukee: November 2006, Vol. 39, Iss. 11; pp 32-33. • William A. Cohen, A Class with Drucker, New York: AMACOM, 2008 • W.E. Deming, Out of the Crisis, MIT Press, 1982 • Richard J. Hackman and Ruth Wageman, “Total Quality Management: Empirical, Conceptual, and Practical Issues,” Administrative Science Quarterly, Ithaca: June 1995, Vol. 40, Iss 2; pp 309-342. • Raymond R. Panko, Corporate Computer and Network Security. New Jersey: Prentice Hall, 2003. pp. 324-330. • Michael E. Whitman and Herbert J. Mattord, Management of Information Security, Thompson Course Technology, 2008. pp 1-20. • “Survey: The X and Y Factors,” The Economist, London: January 21, 2006. Vol. 378, Iss. 8461, pg 19. 8/8/2014

More Related