How To Study Information Security
|
|
|
- Peregrine Sharp
- 5 years ago
- Views:
Transcription
1 Assessing The Relative Importance of Information Security Governance Processes Master Thesis Stockholm, Sweden 2011 XR-EE-ICS 2011:002
2 ASSESSING THE RELATIVE IMPORTANCE OF INFORMATION SECURITY GOVERNANCE PROCESSES ON REDUCING NEGATIVE IMPACTS FROM INFORMATION SECURITY INCIDENTS A Master Thesis Report written in collaboration with Royal Institute of Technology Stockholm, Sweden December, 2010
3 Master Thesis December Abstract Today the extent and value of electronic data is constantly growing. Dealing across the internet depends on how secure consumers believe their personal data are. And therefore, information security becomes essential to any business with any form of web strategy, from simple business-to-consumer, or business-to-business to the use of extranets, and instants messaging. It matters too any organization that depends on computers for its daily existence. This master thesis has its focus on Information Security Governance. The goal of this thesis was to study different Information Security processes within the five objectives for Information Security Governance in order to identify which processes that organizations should prioritize in order to reduce negative consequences on the data, information and software of a business from security incidents. By surveying IT experts, it was possible to gather their relative opinion regarding the relationship between Information Security Governance processes and security incidents. By studying the five desired objectives for Information Security Governance, Strategic Alignment, Risk Management, Resource Management, Performance Measurement and Value Delivery the result indicated that some processes within Performance Measurements have a difference in relation to other processes. For those processes a conclusion can be made that they are not as important as the processes which they were compared to. A reason for this can be that the processes within performance measurement are different in such a way that they measure an incident after it has actually happened. While other processes within the objectives for ISG are processes which needs to be fulfilled in order to prevent that an incident happens. This could obviously explain why the expert s choose to value the processes within performance measurement less important compared to other processes. However, this conclusion cannot be generalized, since the total amount of completed responses where less than expected. More respondents would have made the result more reliable. The majority of the respondents were academicals and their opinion and experience may be different from the IT experts within the industry, which have a better understanding of how it actually works in reality within an organization. Keywords Information Technology, Information Security, Information Security Governance I
4 Master Thesis December Table of Contents Abstract... I Keywords... I Table of Figures... IV List of Acronyms... V 1 Introduction Background Research Question Purpose and Goals Scope and Delimitations Outline Theory Information Security Confidentiality Integrity Availability Information Security Governance Desired Outcome Knowledge and Protection of Information Assets Benefits of Information Security Governance Process Integration The Relationship Between IT Governance and ISG The Importance of Information Security Governance The Outcome of Information Security Governance Methodology Theory Collection Data Collection Survey Research The Selection of Experts Validity & Reliability Statistical Methods Confidence Interval Box Plot Empirical Data The Studied ISG processes Analysis Strategic Alignment Risk Management Resource Management Performance Measurement Value Delivery Summary of the Analysis Discussion and Conclusions Validity Construct Validity External Validity II
5 Master Thesis December Reliability Future Work References III
6 Master Thesis December Table of Figures Figure 1 Outline of the master thesis... 4 Figure 2 Security layers... 6 Figure 3 Impact of a Security Incident [6]... 7 Figure 4 Relationship between ISG and ITG Figure 5 Desired outcomes from Information Security Governance Figure 6 Box plot Figure 7 Respondents divided by Industry Figure 8 Box plot for the processes within Strategic Alignment Figure 9 Box plot for the processes within Risk Management Figure 10 Box plot for the processes within Resource Management Figure 11 Box plot for the processes within Performance Measurement Figure 12 Box plot for the processes within Value Delivery Table 1 Different strategies and aspects Table 2 Result from the survey Table 3 Box Plot data summary for Strategic Alignment Table 4 Strategic Alignment data Table 5 Box Plot data summary for Risk Management Table 6 Risk Management data Table 7 Box Plot data summary for Resource Management Table 8 Resource Management data Table 9 Box Plot data summary for Performance Measurement Table 10 Performance Measurement data Table 11 Box Plot data summary for Value Delivery Table 12 Performance Measurement data Table 13 Mean value range for Strategic Alignment processes Table 14 Mean value range for Risk Management processes Table 15 Mean value range for Resource Management processes Table 16 Mean value range for Performance Measurement processes Table 17 Mean value range for Value Delivery processes Table 18 Not equal processes between Strategic Alignment and Performance Measurement Table 19 Not equal processes between Risk Management and Performance Measurement Table 20 Not equal processes between Resource Management and Performance Measurement Table 21 Not equal processes between Value delivery and Performance Measurement. 37 IV
7 Master Thesis December List of Acronyms IT Information Technology ISG Information Security Governance ITG Information Technology Governance COBIT - The Control Objectives for Information and Related Technology Framework IS Information Security V
8 1 Introduction This initial chapter presents the background, the research question, purpose and goals, and clarifies the delimitation as well as the disposition of the thesis. 1.1 Background Corporation s needs to provide secure, accurate and reliable information when dependency on IT (Information Technology) becomes greater for each day. Today organizations use technology in managing, developing and communicating important assets such as information and knowledge, this makes IT Governance (ITG) a key factor for each organization. [8] Good ITG makes the use of information more effective and reduces cost and complex threats that are related to information and information security. [1] The purpose of IT Governance is to ensure that IT is handled strategically and that strategy and goals for IT is in congruence with the enterprise strategy and objective. This means that the core activity must define and communicate their business requirements and needs concerning IT. [1] Information Security Governance (ISG) is an essential element of enterprise governance and consists of the leadership, organizational structures, and processes involved in the protection of informational assets. ISG helps organizations to address the questions regarding information security from a corporate governance point of view. [3] Governing information security is an essential part in the largely part of information security environment. It is important that the information assets are well secured in order to achieve the objectives of ISG and the overall objectives of the organization. [14] The purpose of ISG is to ensure that all requirements which are enforced on the system not only protect the resources and information of the organization, but also guarantees that the system is controlled in such a way that security requirements can be assured. [15] ISG is the responsibility of the board of directors and senior executives. They have the responsibility to evaluate and take action to the concerns and sensitivities raised by information security, and to make ISG an essential and transparent part of corporate governance and aligned with the IT Governance framework. [8] To be able to govern effective enterprise and ISG, boards and senior executives must have a full understanding of what to expect from their enterprise information security program. They need to know how to manage the implementation of an information security program and how to decide the strategy and objectives of an effective security program. [8] 1
9 However, in order to increase the information security and address any information security-related issue it is essential for organization s to know what ISG processes that needs to be prioritized in order to achieve the desired objective for ISG. [23] It is therefore the aim of this thesis to evaluate what ISG processes reduces the negative consequences on the data, information and software of a business from security incidents. One way of doing this assessment is to use the knowledge and expertise of IT professionals. By interviewing them and obtaining their relatively judgment, we can create an understanding of which ISG processes that needs to be more focused on in order to achieve the goals of ISG. 2
10 1.2 Research Question The task given was to answer the following question: What Information Security Governance processes reduces the negative consequences on the data, information and software of a business from security incidents? In order to solve this question literature, scientific articles and surveying IT experts on the relative importance of the different ISG processes needed to be gathered. 1.3 Purpose and Goals The purpose of this master thesis was to identify Information Security Governance processes that organizations should prioritize in order to reduce negative consequences on the data, information and software of a business from security incidents. In order to fulfill its purpose the following objectives were identified: Gather all relevant information concerning the research area from articles and literature. Define the concept of Information Security Governance and create an understanding of its theoretical structure. Assess the relative importance of Information Security Governance processes by surveying IT experts. 1.4 Scope and Delimitations The entire focus of this master thesis lies on the framework of Information Security Governance and its processes. The empirical data was collected from a group of experts which had expertise in the following areas; Information Technology, Information Security Governance and Information Security. This thesis is delimited to only study the impact of Information Security Governance on security incident which affects the data, information and software of a business. 3
11 1.5 Outline In this master thesis there will be a method on how to solve the research questions, and that method is developed in an early stage so that the strategy is clear the whole way through the thesis. The master thesis is divided into different steps that can be seen in figure 1 and that picture also reflects the outline of the master thesis which is described below. Figure 1 Outline of the master thesis Introduction The first section describes some background information regarding of what the master thesis is about, it sorts out the goals and the purpose and creates a research question. The reader will also get a brief introduction to the research area. Theory In the theory chapter the concept of Information Security Governance and other concepts related to it, are explored and defined, based on the theory from adequate literature. Methodology In the methodology chapter the methods are presented and described, and will be incorporated and used to confront the problem. This is done to simplify for the reader and increase the understandability of the report and allow the reader to follow the structure of the report. 4
12 Empirical Data A presentation and explanation of what empirics that has been gathered is highlighted in this section. From the method chapter it is known how the survey will be conducted and important factors to consider when doing surveys. The collected data from the surveys are shown in this chapter. Analysis An analysis is conducted after the gathering of empirical data has been achieved. In this chapter statistical methods will be used in order to analyze the difference between the collected data. Discussion and Conclusions In this section, a discussion regarding the validity and reliability of this study will be brought up. A set of conclusions regarding the results and discussion will also be presented in this chapter. 5
13 2 Theory In this chapter the concept of Information Security Governance and other concepts related to it, are explored and defined, based on the theory from adequate literature. 2.1 Information Security Information plays a major role in supporting organization s business operations, and therefore one of the most important questions is what efforts should be made to protect such information against harm from threats leading to different types of impacts, such as loss, inaccessibility, alteration or wrongful disclosure. [4] Security relates to the protection of valuable and important assets. Assets are data or information recorded on, processed by, stored in, shared by, transmitted or retrieved from an electronic medium. The protection of these assets arise from different technological and non-technological safeguards such as physical security measures, background checks, user identifiers, passwords, smart cards, biometrics and correctly implemented and managed firewall. Figure 2 shows in what way the different security layers in an organization, were data security became computer security, and computer security became IT security and IT security became information security. Data Security Computer Security IT Security Information Security Figure 2 Security layers The objective of information security is to protect the interests of those relying on information, and the systems and communications that deliver the information, from harm resulting from failures of availability, confidentiality and integrity. [6] According to [6] the security objective is met when: Information systems are available and usable when required, can appropriately resist attacks and recover from failures (availability). Data and information are disclosed only to those who have a right to know (confidentiality). Data and information are protected against unauthorized modification (integrity). Business transactions can be trusted (authenticity and non-repudiation). 6
14 2.1.1 Confidentiality In order to protect the confidentiality of information assets they must be kept secret. All business information which is sensitive for the organization should not be available to whoever may wish to gain access to it. The information must only be given to those who have been given authorization. There is two approaches which may protect the confidentiality of information, these include restricting access to confidential information or additionally, encrypting sensitive business information. [7] Integrity Protecting the integrity of information resources implies maintaining the correctness and comprehensiveness of that information. Information integrity is important because information plays a major role in the decision making process. If such information is not correct or complete this could initiate misguided decisions on the part of executive management. Eventually such misguided decisions could lead towards unwanted situations in an organization. A violation of integrity could result from planned modification of information by unauthorized parties or it could also be from its unintentional modification while information is being stored, processed or transmitted. [7] Availability In order to protect the availability of the information resources, an organization must ensure that such resources are available for use by the relevant parties, at the right time. If the availability of information is not appeasing an organization would be unable of continuing its normal operations. Correct information at the right time gives the management the possibility to make well-timed business decisions, which will give the organization competitive advantage. Figure 3 illustrates some of the ramifications if an incident occurs. Information Criteria Information Availability Integrity Confidentiality A security incident happens Information is no longer available when and where required. Information is corrupt and incomplete. Information is exposed to unauthorized people. Consequence(s): Competitive disadvantage Loss of business Reputational damage Fraud Faulty management decision Legal liability Poor morale Operational disruption Safety Privacy breach Figure 3 Impact of a Security Incident [6] Impact on Information Impact on Business Objectives 7
15 2.2 Information Security Governance Enterprise governance is about actions from the executive management that provide strategic direction to the firm in order to achieve its objectives, improving risk, and managing resources in the most successful and efficient way possible. [10] Information Security Governance (ISG) is an essential part of enterprise governance and be aligned with the IT Governance framework. ISG consider leadership, organizational structures, and processes that which can protect informational assets. With ISG firms can effectively track the subject of information security leading to [9]: Desired outcomes of Information Security Governance Knowledge and protection of information assets Benefits of Information Security Governance Process integration Desired Outcome The five fundamental outcomes from Information Security Governance include: [9] 1. Strategic Alignment; ISG allows firms to align security with business strategy to support organizational objectives. 2. Risk Management; Firms also execute appropriate measures to minimize the risks and potential impacts to an acceptable level and combine all essential aspects to ensure processes to operate correctly. 3. Resource Management; ISG allows the firm to use security knowledge and infrastructure in the most efficient and effective way. 4. Performance Measurement; ISG enables the measuring, monitoring and reporting of security processes to ensure the achievement of objectives. 5. Value delivery; ISG supports the optimization of security investment in support of business objectives. 8
16 2.2.2 Knowledge and Protection of Information Assets Data are raw material that holds information and only provide information when they are organized and manipulated. Information contains data that has a meaning, importance and a purpose which is the basis for knowledge. Knowledge is, in turn, detained, transferred and stored as organized information. Information and knowledge is becoming a business asset which enables the business for any organization. To provide adequate protection for this essential resource, the security over information assets must be addressed at the top level of the organization. [9] Benefits of Information Security Governance Good Information Security Governance generates benefits such as reduction in risk, reduction in the impact if a security accident occurs. It can also improve reputation, confidence and improve efficiency by avoiding wasted time and effort recovering from a security accident. Here are some benefits which add value to the organization [9]: Improving trust in customer relationships Protecting the organization s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions Reducing operational costs by providing predictable outcomes - mitigating risk factors that may interrupt the process Process Integration Process integration focuses on the integration of organizations management assurance processes regarding security. Assessing management processes from start to finish, along with their controls, can mitigate the tendency for security gaps to exist amongst various functions. 9
17 2.2.5 The Relationship Between IT Governance and ISG One of the big topics in ITG is information security. ISG includes IT Security element, physical security and paper security. [22] IT security element is one example of intersection between ITG and ISG. IT security element is a computer access control system which indentifies the accessed personnel by ID and password and permits her to access the protected data. [22] See figure 4 IT Governance Corporate Governance Information Security Governance IT Security Element Figure 4 Relationship between ISG and ITG 2.3 The Importance of Information Security Governance The main purpose of information security is to reduce the negative impacts on the organization to an acceptable level of risk. Information security protects not only information assets, but also prevents the increasing potential for civil or legal liability. All information processes, physical and electronic, whether they involve people and technology or relationships with trading partners, costumers and third parties are protected by information security. Information security structures information protection, confidentiality, availability, and integrity all the way through the life cycle of the information. [8] Information security must be a connected part of enterprise governance, aligned with IT Governance and integrated into strategy, concept design, implementation and operation. Thus, the Information Security Governance involves senior management commitment, security awareness, and good security performance and compliance with policy. To ensure that all relevant factors are addressed in an organizational security strategy several security standards have been developed, such as COBIT, ISO and others. [8] 10
18 Together with the security standards, an efficient security management program ensures the protection of information assets through a series of technological and nontechnological safeguards and controls. These safeguards and controls are necessary in order to prevent threats and vulnerabilities. To achieve effective Information Security Governance, management must establish and maintain a framework to guide the development and maintenance of an information security management program. [8] Information Security Governance framework consists of: An information security risk management methodology A comprehensive security strategy explicitly linked with business and IT objectives An effective security organizational structure A security strategy that talks about the value of information protected and delivered Security policies that address each aspect of strategy, control and regulation A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk A process to ensure continued evaluation and update of security policies, standards, procedures and risks 11
19 2.3.1 The Outcome of Information Security Governance Information Security Governance includes leadership, organizational structures and processes that secure information. These structures and processes can only be implemented successfully only when there is effective communication amongst all parties based on constructive relationships, a common language and shared commitment to addressing the issue. [8] These following outcomes are desired objectives for Information Security Governance when having properly implemented processes: See figure 5 Objective 1 Strategic Alignment Information security policies must be aligned with business strategy in order to support organizational objectives. Objective 2 Risk Management Execute appropriate measures in order to manage and mitigate risks and reduce potential impacts on information resources to an acceptable level. Objective 3 Resource Management Utilizing the information security, knowledge and infrastructure in order to be more efficiently and effectively. Objective 4 Performance Measurement Measuring, monitoring and reporting information security governance metrics to ensure that organizational goals s are achieved. Objective 5 Value Delivery Optimizing information security investments in support of organizational goals. 12
20 Strategic Alignment These are the processes that needs to be properly implemented, conducted and controlled in order to achieve the goals of Information Security Governance: [8] Ensure transparency and understanding of IT security costs, benefits, strategy, policies and service levels. Develop a common and comprehensive set of IT security policies. Communicate the IT strategy, policies and control framework. Enforce IT security policies. Define security incidents in business impact terms. Establish clarity on the business impact of risks to IT objectives and resources. Establish IT continuity plan that supports business continuity plans. Risk Management These are the processes that needs to be properly implemented, conducted and controlled in order to achieve the goals of Information Security Governance: [8] Establish and reduce the likelihood and impact of IT security risks. Perform regular risk assessments with senior managers and key staff. Permit access to critical and sensitive data only to authorized users. Ensure critical and confidential information is withheld from those who should not have access to it. Identify, monitor and report security vulnerabilities and incidents. Develop IT continuity plans that can be executed and are tested and maintained. Resource Management These are the processes that needs to be properly implemented, conducted and controlled in order to achieve the goals of Information Security Governance: [8] Maintain the integrity of information and processing infrastructure. Ensure that IT services and infrastructure can resist and recover from failures due to error, deliberate attack or disaster. Ensure proper use and performance of the applications and technology solutions. 13
21 Performance Measurement These are the processes that needs to be properly implemented, conducted and controlled in order to achieve the goals of Information Security Governance: [8] Number of incidents damaging reputation with the public. Number of systems where security requirements are not met. Number and type of suspected and actual access violation. Number and type of malicious code prevented. Number and type of security incidents. Number and type of obsolete accounts. Number of unauthorized IP addresses, ports and traffic types denied. Number of access rights authorized, revoked, reset or changed. Value Delivery These are the processes that needs to be properly implemented, conducted and controlled in order to achieve the goals of Information Security Governance: [8] Ensure automated business transactions and information exchanges can be trusted. Make sure that IT services are available as required. Minimize the probability of IT service interruption. Minimize the impact of security vulnerabilities and incidents. Ensure minimum business impact in the event of an IT service disruption or change. Establish cost-effective action plans for critical IT risks. Information Security Governance Strategic Alignment Risk Management Resource Management Performance Measurement Value Delivery Figure 5 Desired outcomes from Information Security Governance 14
22 3 Methodology In this chapter the methods are presented and described, and will be incorporated and used to confront the problem. This is done to simplify for the reader and increase understandability of the report and allow the reader to follow the structure of the report. In order to achieve the objectives and fulfill its purpose this master thesis needed to complete following stages. The first step was to review the academic literature and scientific articles on the research area. Secondly the theory needed to be developed based on the knowledge which was gained from the literature. The third step was to collect data from experts, using the methods selected. The fourth step was to analyze the data and present the result. 3.1 Theory Collection In the first phase of this master thesis, theory collection, all the significant information regarding the research area was gathered. The theory has been supported by former research by multiple sources in order to increase the reliability. For the use of important and numerous sources in this master thesis different sources were used: Academic literature Scientific articles IT Governance Institute The IT Governance Institute was established in 1998 to advance international thinking and standards in directing and controlling an enterprise s information Technology. Effective IT governance helps ensure that IT supports business goals, optimizes business investment in IT, and appropriately manages IT-related risks and opportunities. The IT Governance Institute offers original research, electronic resources and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities. [8] When the theory was collected the theory phase could be initiated. This included defining all concepts regarding IT Governance and information security in order to create a better understanding of Information Security Governance. The relationship between effective ISG processes that enables the goals of ISG were also analyzed and presented to envision these interrelations. 15
23 3.2 Data Collection There are two types of methods to perform a study and what type to use is deducted from the problem formulation. These two methods are inductive and deductive methods. An inductive study implies that the study proceeds from empirical data, and the gathered data is used afterwards to create a theory. A deductive study implies that theory and postulates are a basis for the study. Empirical data is important for the success of the thesis. To be able to solve the research question in this master thesis surveys was implemented as a research strategy, since the empirical data was gathered from a large extent of experts. [12] Survey Research Doing a science research it is important to choose the most suitable research strategy in order to solve the problem. There are many examples of research methods, such as, case study, experiments, surveys, and archival analysis. And every one of them has their own way of collecting and analyzing empirical data. According to Yin the choice should be done based on three aspects; the research question, control over behavior events and the focus on contemporary events. The different methods together with the three aspects can be seen in Table 1. [11] Case study Experiments Surveys Archival Analysis Form of research question Requires control of behavioral events How, why No Yes How, why Yes Yes Who, what, where, how many, how much No Yes Who, what, where, how many, how much No Yes/no Focuses on contemporary events Table 1 Different strategies and aspects Survey research is one of the most important areas of measurement in applied social research. The broad area of survey research covers any measurement procedures that involve asking questions of respondents. A "survey" can be anything from short paperand-pencil feedback to an intensive one-on-one in-depth interview. [13] The term survey refers to the selection of a relatively large sample of people from a predetermined population, followed by the collection of a relatively small amount of data from those individuals. Data is gathered by questionnaire or interviews. [16] Surveys are designed to present a Snapshot of how things are at a specific time [16], and surveys are 16
24 well suited to descriptive studies, but can also be used to explore aspects of a situation, or to seek explanation and provide data for testing hypotheses. [16] There are different types of survey methods and the most common include postal questionnaire, face-to-face interviews, and telephone interviews. [13] Postal questionnaires method involves sending questionnaires to a large sample of people covering a wide geographical area. There is no previous contact between researcher and respondent. The response rate of this type of method is low, approximately 20 percent, depending on the content and length of the questionnaire. It is therefore important that a large sample is gathered when using postal questionnaires, in order to ensure that the demographic profile of survey respondents reflects that of the survey population and to provide an adequately large data set for analysis. [16] The Selection of Experts Expertise is a concept which is used in relation to analysis of human performance, in task analysis, in human reliability analysis, in studies of learning and training, in interface design and in cognitive modeling. The interest in expertise is as an attribute of an individual which will affect their reliability and quality of performance. The definition of are numerous and varied. Expertise can describe skills, knowledge or talent, in tasks, activities, jobs, sport and games. [17] Experts are indentified by referrals from others in the profession. It refers to those considered by colleagues to be the best at making decisions. Experts are those who have reached the top of their profession, thus only those who are the best at what they do should be considered as experts. [19] An expert s judgment should be consistent over repeated trials in order to achieve reliability. [18] An expert judgment must satisfy two essential criteria, the first is that expertise calls for discriminating among the stimuli within the domain. The ability to differentiate between similar but not identical stimuli is a feature of expertise. The second is the internal consistency which is a necessary condition because experts in a given field should agree with each other. [18] These to criteria are necessary in order to establish expertise. In this study experts were selected from different scientific articles and organizations. 17
25 3.3 Validity & Reliability To conduct a master thesis with a high quality it is important that the result is reliable and valid. There are three kinds validity according to [11]: Construct validity Using multiple sources of evidence Establishing a chain of evidence Having key informants review draft of the report Internal validity Do pattern matching Do explanation building Addressing rival explanations Use logic models External validity Use theory Use replication logic (only applicant in multi case studies) Reliability is achieved by avoiding untraceable processes. This means that it must be possible to execute the study again. Every section of the report must be clearly explained and the sources used in the report must also be clearly specified in order to achieve traceability. A discussion regarding the validity and reliability of this master thesis will be given in chapter 6. 18
26 3.4 Statistical Methods In this master thesis statistical methods have been used in order to measure the difference between the object of study, which in this case has been the data collected from the surveys Confidence Interval A confidence interval is an estimated range of values which includes an unknown population parameter. The estimated range is calculated from a given set of sample data. When independent samples are taken repeatedly from the same population and a confidence interval is calculated for each sample, then a certain percentage of the intervals will include the unknown population parameter. [20] Confidence intervals are usually calculated so that this percentage is 95%, 90% or 99%. The width of the confidence interval gives an idea about how uncertain the unknown parameter is. A wide interval indicates that more data should be gathered in order to give more certain answer about the parameter. A confidence interval for a mean indicates a range of values within which the unknown population parameter, in this case is the mean. [20] Box Plot A box and whisker diagram, or boxplot, provides a graphical summary of a set of data based on the quartiles of that data set. See figure 6 Quartiles are used to split the data into four groups, each containing 25% of the measurements. The quartiles are numbers that separate the data into quarters. Within the box, a vertical line is drawn, the median of the data set. Two horizontal lines, called whiskers, extend from the front and back of the box. The front whisker goes from lower quartile to the lower extreme-outlier in the data set, and the back whisker goes from upper quartile to the upper extreme-outlier. [20] Figure 6 Box plot 19
27 4 Empirical Data In this chapter a presentation and explanation of what empirics that has been gathered is highlighted. 4.1 The Studied ISG processes The purpose of the survey was to identify ISG processes that organizations should prioritize in order to reduce negative consequences on the data, information and software of a business from security incidents. By conducting a survey for which the questionnaires aimed to codify the experience and knowledge possessed by IT experts in Sweden, USA and other countries like South Africa, Japan and Spain. The survey was divided into five parts. Each part was based on one of the five basic outcomes of ISG. Each outcome had several different processes and the respondents needed to answer whether if that process was important for achieving the goals of ISG. For each process the experts were asked to answer on a scale from 1 to 5, were 1 = strongly disagree, 2 = disagree, 3 = partly agree, 4 = agree and 5 = strongly agree. The following processes were studied: Strategic Alignment: Ensuring transparency and understanding of IT security costs, benefits, strategy, policies and service levels Developing a common and comprehensive set of IT security policies Communicating the IT strategy, policies and control framework Enforcing IT security policies Defining security incidents in business impact terms Establishing clarity on the business impact of risks to IT objectives and resources Establishing IT continuity plan that supports business continuity plans 20
28 Risk Management Establishing and reduce the likelihood and impact of IT security risks Performing regular risk assessments with senior managers and key staff Permitting access to critical and sensitive data only to authorised users Ensuring critical and confidential information is withheld from those who should not have access to it Identifying, monitor and report security vulnerabilities and incidents Developing IT continuity plans that can be executed and are tested and maintained Resource Management Maintaining the integrity of information and processing infrastructure Ensuring that IT services and infrastructure can resist and recover from failures due to error, deliberate attack or disaster Ensuring proper use and performance of the applications and technology solutions Performance Measurement Measuring number of incidents damaging reputation with the public Measuring number of systems where security requirements are not met Measuring number and type of suspected and actual access violations Measuring number and type of malicious code prevented Measuring number and type of security incidents Measuring number and type of obsolete accounts Measuring number of unauthorised IP addresses, ports and traffic types denied Measuring number of access rights authorised, revoked, reset or changed 21
29 Value Delivery Ensuring that automated business transactions and information exchanges can be trusted Making sure that IT services are available as required Minimising the probability of IT service interruption Minimising the impact of security vulnerabilities and incidents Ensuring minimum business impact in the event of an IT service disruption or change Establishing cost-effective action plans for critical IT risks The selection of the experts was from several scientific articles, universities worldwide and companies. As the experts consulted in this study were widely geographically spread, a mail survey was used. The internet-based application Relationwise [21] was open for 30 days. A reminder was sent to non-responding participants in order to increase the response rate. The survey was ed to 163 respondents. 46 respondents began the survey only 22 of them completed it. See table 2 Targeted Respondents 163 Received Responses 46 Completed Responses 22 Percentage of Completed Responses 13.5% Table 2 Result from the survey 22
30 As shown in figure 7 the majority of the respondents were academicals. The respondents in category Other were from not for profit professional association and IT research. Figure 7 Respondents divided by Industry 23
31 5 Analysis In this chapter the gathered data from the surveys will be analyzed. Different statistical method, such as confidence interval and Box plot are used in order to study and measure the difference between the empirical data. 5.1 Strategic Alignment This section shows the perspective of the respondents towards the processes within Strategic Alignment Process 1 Process 2 Process 3 Process 4 Process 5 Process 6 Process 7 Min Outlier Max Outlier Figure 8 Box plot for the processes within Strategic Alignment Labels Process 1 Process 2 Process 3 Process 4 Process 5 Process 6 Process 7 Min Q Median Q Max IQR Upper Outliers Lower Outliers Table 3 Box Plot data summary for Strategic Alignment 24
32 The Box plot in figure 8 shows the result from the respondents. Processes 1, 5 and 6 have a lower extreme value which is 1 and an upper extreme value which is 5, processes 2, 4 and 7 has a lower extreme value which is 3 and an upper extreme value which is 5, followed by process 3 which has a lower extreme value 2 and an upper extreme value which is 5. This means that the answers varied for processes 1, 5 and 6 from 1 to 5, for processes 2, 4 and 7 from 3 to 5 and for process 3 from 2 to 5. The lower quartile which accounts for 25% of the answers for processes 1, 3 and 5 is 3, and for processes 2, 4, 6 and 7 the lower quartile is 4. The upper quartile which accounts for 75% of the answers for processes 2, 5 and 7 is 4, and for processes 1 and 4 the upper quartile is 4.75 and for processes 3 and 6 the upper quartile is 5. The median for each process is 4. Processes 2 and 7 do not have a box in the chart, due to the same value (4) for the lower quartile, upper quartile and the median. This indicates that greater part of the respondents agreed with these processes. As shown in table 4 below, the mean value for process 6 is 4.18 (which is the highest among the processes) with a standard deviation of and a confidence interval of Standard deviation indicates that there is a variation of 1 from the mean value and a confidence interval value of indicates that the true value of the mean is between 4.60 and 3.76 with a confidence level of Process Strategic Alignment 1.Ensuring transparency and understanding of IT security costs, benefits, strategy, policies and service levels 2. Developing a common and comprehensive set of IT security policies Mean Standard Deviation Confidence Interval Communicating the IT strategy, policies and control framework Enforcing IT security policies Defining security incidents in business impact terms Establishing clarity on the business impact of risks to IT objectives and resources 7. Establishing IT continuity plan that supports business continuity plans Table 4 Strategic Alignment data 25
33 5.2 Risk Management This section shows the perspective of the respondents towards the processes within Risk Management Process 1 Process 2 Process 3 Process 4 Process 5 Process 6 Min Outlier Max Outlier Figure 9 Box plot for the processes within Risk Management Labels Process 1 Process 2 Process 3 Process 4 Process 5 Process 6 Min Q Median Q Max IQR Upper Outliers Lower Outliers Table 5 Box Plot data summary for Risk Management The Box plot in figure 9 shows the result from the respondents. Processes 1, 3, 4, 5 and 6 have a lower extreme value which is 3 and an upper extreme value which is 5. Process 2 has a lower extreme value which is 2 and an upper extreme value which is 5. This means that the answers varied for processes 1, 3, 4, 5, and 6 from 3 to 5, for process 2 from 2 to 5. 26
34 The lower quartile which accounts for 25% of the answers for processes 1, 2, 3 and 6 is 4, and for processes 4 and 5 the lower quartile is 4. The upper quartile which accounts for 75% of the answers for processes 2, 4 and 5 is 4, and for processes 1 and 3 the upper quartile is 4.75 and for process 6 the upper quartile is 5. The median for each process is 4. Process 2 do not have a box in the chart, due to the same value (4) for the lower quartile, upper quartile and the median. This indicates that greater part of the respondents agreed with these processes. As shown in table 6 below, the mean value for process 6 is 4.23 (which is the highest among the processes) with a standard deviation of and a confidence interval of Standard deviation indicates that there is a variation of from the mean value and a confidence interval value of indicates that the true value of the mean is between 4.54 and 3.92 with a confidence level of Risk Management Process 1. Establishing and reduce the likelihood and impact of IT security risks 2. Performing regular risk assessments with senior managers and key staff 3. Permitting access to critical and sensitive data only to authorized users 4. Ensuring critical and confidential information is withheld from those who should not have access to it 5. Identifying, monitor and report security vulnerabilities and Incidents 6. Developing IT continuity plans that can be executed and are tested and maintained Mean Standard Deviation Confidence Interval Table 6 Risk Management data 27
35 5.3 Resource Management This section shows the perspective of the respondents towards the processes within Resource Management Process 1 Process 2 Process 3 Min Outlier Max Outlier Figure 10 Box plot for the processes within Resource Management Labels Process 1 Process 2 Process 3 Min Q Median Q Max IQR Upper Outliers Lower Outliers Table 7 Box Plot data summary for Resource Management The Box plot in figure 10 shows the result from the respondents. Process 1, 2 and 3 have a lower extreme value which is 3 and an upper extreme value which is 5. This means that the answers varied from 3 to 5. 28
36 The lower quartile which accounts for 25% of the answers for process 2 is 3, and for processes 1 and 3 the lower quartile is 4. The upper quartile which accounts for 75% of the answers for processes 1 and 3 is 4, and for process 2 the upper quartile is The median for each process is 4. Process 1 and 3 do not have a box in the chart, due to the same value (4) for the lower quartile, upper quartile and the median. This indicates that greater part of the respondents agreed with these processes. As shown in table 8 below, the mean value for process 1 is 4.14 (which is the highest among the processes) with a standard deviation of and a confidence interval of Standard deviation indicates that there is a variation of from the mean value and a confidence interval value of indicates that the true value of the mean is between 4.37 and 3.91 with a confidence level of Resource Management Process 1. Maintaining the integrity of information and processing infrastructure 2. Ensuring that IT services and infrastructure can resist and recover from failures due to error, deliberate attack or disaster 3. Ensuring proper use and performance of the applications and technology solutions Mean Standard Deviation Confidence Interval Table 8 Resource Management data 29
37 5.4 Performance Measurement This section shows the perspective of the respondents towards the processes within Performance Measurement Process 1 Process 2 Process 3 Process 4 Process 5 Process 6 Process 7 Process 8 Min Outlier Max Outlier Figure 11 Box plot for the processes within Performance Measurement Labels Process 1 Process 2 Process 3 Process 4 Process 5 Process 6 Process 7 Process 8 Min Q Median Q Max IQR Upper Outliers Lower Outliers Table 9 Box Plot data summary for Performance Measurement The Box plot in figure 11 shows the result from the respondents. Process 1, 4, 5, 7 and 8 have a lower extreme value which is 1 and an upper extreme value which is 5 except for process 8 which has an upper extreme value of 4. Process 2, 3 and 6 have a lower extreme value which is 2 and an upper extreme value which is 5. This means that the answers varied for processes 1, 4, 5, and 7 from 1 to 5, for process 8 from 1 to 4 and for processes 2, 3 and 6 from 2 to 5. The lower quartile which accounts for 25% of the answers is 3 for each process. The upper quartile which accounts for 75% of the answers is 4 for each process except for 30
38 process 3 were the upper quartile is 3. The median for processes 1, 3, 4, 6 and 7 is 3, for process 8 the median is 3.50 and for processes 2 and 5 the median is 4. As shown in table 10 below, the mean value for process 2 is 3.77 (which is the highest among the processes) with a standard deviation of and a confidence interval of Standard deviation indicates that there is a variation of from the mean value and a confidence interval value of indicates that the true value of the mean is between 4.13 and 3.41 with a confidence level of Performance Measurement Process 1. Measuring number of incidents damaging reputation with the public 2. Measuring number of systems where security requirements are not met 3. Measuring number and type of suspected and actual access violations 4. Measuring number and type of malicious code prevented 5. Measuring number and type of security incidents 6. Measuring number and type of obsolete accounts 7. Measuring number of unauthorized IP addresses, ports and traffic types denied 8. Measuring number of access rights authorized, revoked, reset or changed Mean Standard Deviation Confidence Interval Table 10 Performance Measurement data 31
39 5.5 Value Delivery This section shows the perspective of the respondents towards the processes within Value Delivery Process 1 Process 2 Process 3 Process 4 Process 5 Process 6 Min Outlier Max Outlier Figure 12 Box plot for the processes within Value Delivery Labels Process1 Process 2 Process 3 Process 4 Process 5 Process 6 Min Q Median Q Max IQR Upper Outliers Lower Outliers Table 11 Box Plot data summary for Value Delivery The Box plot in figure 12 shows the result from the respondents. Processes 1, 2, 3 and 5 have a lower extreme value which is 2 and an upper extreme value which is 5. Processes 4 and 6 have a lower extreme value which is 3 and an upper extreme value which is 5. This means that the answers varied for process 1, 2, 3 and 5 from 2 to 5 and for process 4 and 6 from 3 to 5. 32
40 The lower quartile which accounts for 25% of the answers is 3 for process 2 and 3.25 for process 4. For processes 1, 3, 5 and 6 the lower quartile is 4. The upper quartile which accounts for 75% of the answers for processes 1, 2, 3, 5 and 6 is 4, and for process 4 the upper quartile is The median for each process is 4. Processes 1, 3, 5 and 6 do not have a box in the chart, due to the same value (4) for the lower quartile, upper quartile and the median. This indicates that greater part of the respondents agreed with these processes. As shown in table 12 below, the mean value is 4.00 (which is the highest among the processes) for processes 4, 5 and 6. The standard deviation for processes 4 and 5 is and for process 6. The confidence interval is for processes 4 and 5 and for process 6. The standard deviation for processes 4 and 5 indicates that there is a variation of from the mean value and a confidence interval value of indicates that the true value of the mean is between 4.32 and 3.68 with a confidence level of 0.95 for processes 4 and 5. The standard deviation for processes 6 indicates that there is a variation of from the mean value and a confidence interval value of indicates that the true value of the mean is between 4.29 and 3.71 with a confidence level of 0.95 for processes 6. Value Delivery Process 1. Ensuring that automated business transactions and information exchanges can be trusted 2. Making sure that IT services are available as required 3. Minimizing the probability of IT service interruption 4. Minimizing the impact of security vulnerabilities and incidents 5. Ensuring minimum business impact in the event of an IT service disruption or change 6. Establishing cost-effective action plans for critical IT risks Mean Standard Deviation Confidence Interval Table 12 Performance Measurement data 33
41 5.6 Summary of the Analysis By using confidence interval on the mean value for each process, the range for which the true mean value is between could be determined. By studying the range for each mean value gives an understanding of whether the processes are equaled to each other or not. A process is equal to another process when they have a true mean value that could be in the same range. Notice that equal means that the processes are having the same value of importance. For each ISG outcome there is a table that presents the range of the mean value for that particular process. In the tables below the range of the mean value for each process is presented, measured with a confidence level of Mean Value Strategic Alignment Range Process Process Process Process Process Process Process Table 13 Mean value range for Strategic Alignment processes Mean Value Risk Management Range Process Process Process Process Process Process Table 14 Mean value range for Risk Management processes Mean Value Resource Management Range Process Process Process Table 15 Mean value range for Resource Management processes 34
42 Mean Value Performance Measurement Range Process Process Process Process Process Process Process Process Table 16 Mean value range for Performance Measurement processes Mean Value Value Delivery Range Process Process Process Process Process Process Table 17 Mean value range for Value Delivery processes 35
43 6 Discussion and Conclusions In this section, a discussion regarding the validity and reliability of this study will be brought up. Discussion regarding the results will also be presented in this chapter. By using the relatively opinion of the experts and comparing the one to one relationship between each process within the five objectives for ISG the result indicated that some processes were not as important as other processes when it comes to reducing the negative consequences on the data, information and software of a business from security incidents. According to the expert s some processes within Performance Measurements were less important compared to other processes (see tables below). For those processes within Performance Measurements a conclusion can be made that they are not as important as the processes which they were compared to. All other processes within Strategic Alignment, Risk Management, Resource Management and Value Delivery, were according to the expert s equally important. Those processes should have the same priority when in it comes to implementation in order to reduce negative consequences on the data, information and software of a business from security incidents. The processes within Performance Measurement are different in such a way that they measure an incident after it has actually happened, while other processes within the objectives of ISG are processes which needs to be fulfilled in order to prevent that an incident happens. This can be an explanation of why the result indicated a difference between the processes within Performance Measurement and the other processes. However, this conclusion cannot be general, since the comparison is made between each process. This means that a particular process can be less important when comparing it with one process, but at the same time be equally important with another process. When equally important relationship exists between two processes, the organization should have the same priority for those processes. The result could also be different if a larger number of respondents could have completed the survey, and the result could have been more validated. Also the majority of the respondents were academicals and their opinion and experience may be different from the IT experts within the industry, which have a better understanding of how it actually works in reality within an organization. Confidence interval has been the main statistical tool when analyzing this specific population, if more accurate statistical tool were used then probably the result could have been more reliable. This type of security assessment is relatively because it relies on the relative opinions of the expert s. A natural extension and further research of this study would be to include system statistics instead of the expert s assessments. 36
44 According to the expert s relatively opinions following processes have a difference between each other: See the tables below. Strategic Alignment Performance Measurement Process 2 not equally important as Process 1, 3 and 4 Process 3 not equally important as Process 4 Process 4 not equally important as Process 1, 3, 4 and 8 Process 6 not equally important as Process 1, 3, 4 and 8 Process 7 not equally important as Process 1, 3, 4 and 8 Table 18 Not equal processes between Strategic Alignment and Performance Measurement Risk Management Performance Measurement Process 1 not equally important as Process 1, 3, 4, 6, 7 and 8 Process 2 not equally important as Process 4 Process 3 not equally important as Process 1, 3, 4 and 8 Process 4 not equally important as Process 4 Process 6 not equally important as Process 1, 3, 4, 6, 7 and 8 Table 19 Not equal processes between Risk Management and Performance Measurement Resource Management Performance Measurement Process 1 not equally important as Process 1, 3, 4, 6, 7 and 8 Process 3 not equally important as Process 1, 3, 4 and 8 Table 20 Not equal processes between Resource Management and Performance Measurement Value Delivery Performance Measurement Process 1 not equally important as Process 3 and 4 Process 3 not equally important as Process 3 and 4 Process 4 not equally important as Process 1, 3 and 4 Process 5 not equally important as Process 1, 3 and 4 Process 6 not equally important as Process 1, 3, 4 and 8 Table 21 Not equal processes between Value delivery and Performance Measurement 37
45 6.1 Validity Having a clear and constructive discussion regarding how this master thesis has been performed and how the results have been interpreted is important. It is not only essential to analyze and discuss the validity of the evidence, but also how the evidence have been managed during this master thesis is important. In chapter 3.3, requirements regarding validity and reliability were mentioned. In this section a description will be given on how those requirements have been taken into account in this master thesis. [11] Construct Validity By constructing validity means how well the literature or other methods which are being used in this thesis are correct. It is essential to use multiple sources in order to verify the information several times. The sources which are being used needs to be objective. [11] In this thesis multiple sources were used when collecting evidence. Chain of evidence has been established containing a master thesis report. Also all digital evidence such as results from the online survey has been stored with backup. This master thesis has also been validated by a receiver which in this case has been the supervisor. The supervisor has read through the thesis and has given his opinion regarding sections that was missing, sections that needed to be described more or sections that needed more sources. In that way a receiver has been involved in and informed towards the establishment of this master thesis External Validity External validity means how well the theories are generalized so that the result can be used on other studies. [11] In this thesis a group of experts within the area of IT, ISG and IS were selected, doing so will normally decrease the external validity. Although this will not be considered as a problem since the result is aimed for organizations which deals with those areas mentioned above. A problem which definitely decreases the external validity is the limited amount of respondents. A larger amount of respondents would have increased the external validity. 38
46 6.2 Reliability Reliable study means that if another researcher follows the same procedures then the results must be the same. Every step must be well documented in a comprehensive way. By having a reliable study, the errors and preconceptions will be minimized. [11] The structure of the survey questionnaires was very important when thinking about reliability, since the result is very much depend upon the way they are formulated. The intention was to obtain a very objective perspective as possible. 6.3 Future Work The main purpose with this thesis was to identify the ISG processes that reduce the negative impact of information Security incidents. The author s opinion is that with this study some processes was indentified, however there is room for improvements for future study. More respondents if the timeframe of the online survey were extended maybe more respondents could have completed the survey, and the result could be more validated and reliable. Other industries by including experts from other industries, maybe the difference between the processes within each outcome could be more significant. Other statistical methods by using other statistical method, the difference between the processes could have been even more validated. 39
47 7 References [1] Peter Weill and Jeanne W. Ross IT Governance - How Top Performers Manage IT Decision Rights for Superior Results. 2004, Harvard Business School Press. [2] Calder, Alan & Watkins, Steve. IT Governance A Manager s Guide to Data Security and ISO27001/ISO 27002, 4 th edition, 2008 [3] Allen C. Johnston & Ron Hale Improved Security through Information Security Governance, Communications of the ACM, January 2009, VOL. 52, NO. 1 [4] Shaun Posthumus, Rossouw von Solms A framework for the governance of information security, Computers & Security (2004) 23, [5] Basie von Solms, Rossouw von Solms, From information security to businesssecurity? Computers & Security (2005) 24, [6] COBIT Security Baseline. USA: IT Governance Institute; [7] Gerber M, von Solms R. From risk analysis to security requirements. Computers and Security 2001, 20(7): [8] Board Briefing on IT Governance, 2 nd edition, 2003, IT Governance Institute. [9] Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd edition, IT Governance Institute, ISBN: [10] CIMA/ IFAC. Enterprise governance: Getting the balance right. enterprise_governance.pdf, (Jan. 11, 2005). [11] Yin, Robert K: Case study research, Design and methods Edition 4 Sage Publications, 2008 [12] Bryman, A. (2002). Samhällsvetenskapliga metoder. Malmö: Liber ekonomi. [13] William M.K. Trochim, Research methods Knowledge base Web Center for Social Research Methods, 2006 [14] Finne Thomas, A conceptual Framework for information security management, Computer & Security pp ,
48 [15] Marshall D. Abrams, Sushil Jajodia and Harold J. Podell, Information security; an integrated collection of Essays, IEEE computer Society 1995 [16] Kate Kelley, Belinda Clark, Vivienne Brown, and John Sitza, Good practice in the conduct and reporting of survey research, International Journal for Quality in Health Care, 2003, Vol. 15, No:3, pp [17] Trudi Farrington-Darby, John R. Wilson, The nature of expertise: A review, University of Nottingham, UK, Applied Ergonomics 37, 2006, [18] David J. Weiss and James Shanteau, Empirical Assessment of Expertise, Department of Psychology, California State University, Los Angeles, Vol. 45, No. 1, Spring 2003 [19] James Shanteau, Psychological Characteristics and Strategies of Expert Decision makers, Kansas State University, Manhattan USA, 1988, [20] Korner Svante, Statistiska metoder, 2. Uppl, 2005 [21] [22] Eijiroh Ohki, Yonosuke Harada, Shuji Kawaguchi, Tetsuo Shiozaki, Tetsuyuki Kagaua, Information Security Governance Framework, November 13, 2009, Chicago, Illinois, USA [23] Jan Eloff, Mariki Eloff Information Security Management A New Paradigm, Proceedings of SAICSIT 2003, Pages , South Africa; [email protected] 41
49 2 I am a professional in this industry: Antal Procent 1. Academia % 2. Commerce % 3. Telecommunication % 4. Energy % 5. Banking % 6. Insurance % 7. Public Administration % 8. Software Vendor/Developer % 9. Manufacturing % 10. Other* % * Not for Profit Professional Association and IT Research 3 The following processes REDUCES negative impacts of information security incidents experienced by the organisation: Antal Procent 3.1 Ensuring transparency and understanding of IT security costs, benefits, strategy, policies and service levels 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde Developing a common and comprehensive set of IT security policies 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Communicating the IT strategy, policies and control framework 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Enforcing IT security policies 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4, Defining security incidents in business impact terms 1. Strongly disagree % 2. Disagree %
50 4 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Establishing clarity on the business impact of risks to IT objectives and resources 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4, Establishing IT continuity plan that supports business continuity plans 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4,05 The following processes REDUCES negative impacts of information security incidents experienced by the organisation: Antal Procent 4.1 Establishing and reduce the likelihood and impact of IT security risks 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4, Performing regular risk assessments with senior managers and key staff 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Permiting access to critical and sensitive data only to authorised users 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4, Ensuring critical and confidential information is withheld from those who should not have access to it 1. Strongly disagree % 2. Disagree % 3. Partly agree %
51 Agree % 5. Strongly agree % Medelvärde 3, Identifying, monitor and report security vulnerabilities and incidents 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Developing IT continuity plans that can be executed and are tested and maintained 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4,23 The following processes REDUCES negative impacts of information security incidents experienced by the organisation: Antal Procent 5.1 Maintaining the integrity of information and processing infrastructure 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4, Ensuring that IT services and infrastructure can resist and recover from failures due to error, deliberate attack or disaster 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Ensuring proper use and performance of the applications and technology solutions 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4,00 The following processes REDUCES negative impacts of information security incidents experienced by the organisation: Antal Procent 6.1 Measuring number of incidents damaging reputation with the public 1. Strongly disagree % 2. Disagree % 3. Partly agree %
52 4. Agree % 5. Strongly agree % Medelvärde 3, Measuring number of systems where security requirements are not met 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Measuring number and type of suspected and actual access violations 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Measuring number and type of malicious code prevented 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Measuring number and type of security incidents 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Measuring number and type of obsolete accounts 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Measuring number of unauthorised IP addresses, ports and traffic types denied 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Measuring number of access rights authorised, revoked, reset or changed
53 7 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3,36 The following processes REDUCES negative impacts of information security incidents experienced by the organisation: Antal Procent 7.1 Ensuring that automated business transactions and information exchanges can be trusted 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Making sure that IT services are available as required 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Minimising the probability of IT service interruption 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 3, Minimising the impact of security vulnerabilities and incidents 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4, Ensuring minimum business impact in the event of an IT service disruption or change 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree % 5. Strongly agree % Medelvärde 4, Establishing cost-effective action plans for critical IT risks 1. Strongly disagree % 2. Disagree % 3. Partly agree % 4. Agree %
54 5. Strongly agree % Medelvärde 4,00
55
56
57
58
59
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
ITAG RESEARCH INSTITUTE
ITAG RESEARCH INSTITUTE Cobit s management guidelines revisited: the s / s cascade 1 Wim Van Grembergen, University of Antwerp (UA) Steven De Haes University Antwerp Management School (UAMS) IT Alignment
Practical Overview on responsibilities of Data Protection Officers. Security measures
Practical Overview on responsibilities of Data Protection Officers Security measures Manuel Villaseca Spanish Data Protection Agency [email protected] Security measures Agenda: The rol of DPO on security measures
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Information security risk management using ISO/IEC 27005:2008
Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor [email protected] [email protected] March, 29 th 2011 1
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
INFORMATION SECURITY PROCEDURES
INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
HIPAA Audit Risk Assessment - Risk Factors
I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 14 Risk Mitigation Objectives Explain how to control risk List the types of security policies Describe how awareness and training
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Design of Database Security Policy In Enterprise Systems
Design of Database Security Policy In Enterprise Systems by Krishna R Singitam Database Architect Page 1 of 10 Table of Contents 1. Abstract... 3 2. Introduction... 3 2.1. Understanding the Necessity of
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter
Pennsylvania State System of Higher Education California University of Pennsylvania UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Version [1.0] 1/29/2013 Revision History
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Managing Information Resources and IT Security
Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
Securing the Internet of Things WHITEPAPER
Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible
7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Data Management & Protection: Common Definitions
Data Management & Protection: Common Definitions Document Version: 5.5 Effective Date: April 4, 2007 Original Issue Date: April 4, 2007 Most Recent Revision Date: November 29, 2011 Responsible: Alan Levy,
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1
Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
HIPAA Compliance for Students
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)
Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
INFORMATION TECHNOLOGY POLICY
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY POLICY Name Of : DPW Information Security and Privacy Policies Domain: Security Date Issued: 05/09/2011 Date Revised: 11/07/2013
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
