Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008
|
|
|
- Dennis Conley
- 10 years ago
- Views:
Transcription
1 Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic served as IT specialist in the North American Treaty Organizationled Stabilization Force in Bosnia and Herzegovina. He is the author of five books and more than 70 articles for business and IT-related publications. Hamidovic is a certified IT expert appointed by the Federal Ministry of Justice of Bosnia and Herzegovina and the Federal Ministry of Physical Planning of Bosnia and Herzegovina. He is a doctoral candidate in critical information infrastructure protection at the Dzemal Bijedic University in Mostar, Bosnia and Herzegovina. Do you have something to say about this article? Visit the Journal pages of the ISACA web site ( org/journal), find the article, and choose the Comments tab to share your thoughts. Go directly to the article: How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS Enhancing cybersecurity and protecting critical information infrastructures are essential to each nation s security and economic well-being. Deterring cybercrime is an integral component of a national cybersecurity and critical information infrastructure protection strategy. In particular, this includes the adoption of appropriate legislation against the misuse of information and communications technologies (ICTs) for criminal or other purposes and activities intended to affect the integrity of national critical infrastructures. 1 Apart from substantive criminal law provisions, law enforcement agencies need the necessary tools and instruments to investigate cybercrime. Such investigations present a number of challenges. Perpetrators can act from nearly any location in the world and take measures to mask their identity. The tools and instruments needed to investigate cybercrime can be quite different from those used to investigate ordinary crimes. 2 Furthermore, as stated by Jerker Danielsson and Ingvar Tjøstheim: In many jurisdictions, it is unclear to organizations which requirements and constraints the legislation sets on collection and preservation of potential digital evidence. Often it s also unclear how the responsibility is shared between law enforcement organizations and organizations affected by criminal activity leaving digital traces. It can be argued that organizations have to take a greater responsibility in the cyber-world than they currently do in the physical world. This is due to the complexity of the environment and consequently the complexity of investigations of crimes in this environment. Law enforcement needs support in getting an overview of affected systems. Additionally, law enforcement can only collect evidence post mortem and is consequently dependent on the fact that organizations affected by crime have collected and preserved potential digital evidence in a way that guarantees that it is authentic, accurate and complete. 3 In most jurisdictions and organizations, digital evidence is governed by three fundamental principles: relevance, reliability and sufficiency. These three principles are important for the digital evidence to be admissible in a court of law, as stated in ISO/IEC DIS Digital evidence is relevant when it goes toward proving or disproving an element of the specific case being investigated. The meaning of reliability varies between jurisdictions; however, a general principle of it is to ensure that the digital evidence is what it purports to be and has not been spoiled. The concept of sufficiency means that digital investigators need only to collect enough evidence to prove or disprove the elements of the matter (ensuring that no exculpatory material has been overlooked). 4 There has been much discussion about the value of information stored electronically when required as evidence in a court of law or for other purposes. British Standard BS specifies the requirements for the implementation and operation of electronic information management systems, where the issues of authenticity, integrity and availability, as required by legal admissibility and evidential weight, are important. 5 This article introduces the basic recommendations, based on BS 10008, for improving the reliability of, and confidence in, electronically stored information. Principles of Good Practice for Information Management Code of Practice for the Implementation of BS is structured according to a set of five principles of good practice, which are defined 1 ISACA JOURNAL VOLUME 4, 2012
2 in PD 0010 The principles of good practice for information management. The five principles (figure 1), as defined in PD 0010, are: 6 1. Recognize and understand all types of information. 2. Understand the legal issues and execute duty-of-care responsibilities. 3. Identify and specify 4. Identify enabling technologies to support business processes 5. Monitor and audit The ordering of the five principles also reflects a cascade from the high-level classification of information streams to responsibilities, and then on to operational, technological and system monitoring considerations. 7 The following sections outline some of the most important processes and procedures that need to be established to ensure compliance with this code. Duty of Care The board of directors (or other equivalent group) of an organization is responsible for the conduct of that organization in every way financially, operationally, legally and ethically. Specifically, it has responsibility for the organization s assets and their use. One such asset is information not information systems, but stored information itself. It is essential that organizations be aware of the value of information that they store. Design for Evidence Traditionally, corporations have considered the evidentiary implications of electronic documents only when it is required Read Electronic Discovery. Read IT Audit and Assurance Guidelines G2 Audit Evidence Requirement and G28 Computer Forensics. Learn more about, discuss and collaborate on cybersecurity and business continuity/disaster recovery planning in the Knowledge Center. for litigation, or forensic practitioners have focused on collecting IT evidence as artifacts of an investigation. Unlike latent evidence that is inadvertently produced when a person contacts something (e.g., fingerprints, DNA), computer systems must be specifically designed to generate electronic records in a manner that maximizes their potential evidentiary value. Once electronic records are created, they must be carefully handled to maximize their evidentiary weight. 8 Security Measures All information, irrespective of the media on which it is stored, is vulnerable to loss or change, whether accidental or malicious. To protect information stored electronically, security measures need to be developed and implemented to reduce the risk of a successful challenge to its authenticity. Figure 1 The Principles of Good Practice for Information Management The Principles of Good Practice for Information Management Recognize and understand all types of information. Understand the legal issues and execute duty-of-care responsibilities. Identify and specify Identify enabling technologies to support Monitor and audit Supporting processes and procedures Source: BSI Group, PD 0010:1997 ISACA JOURNAL VOLUME 4,
3 However, security is not a concern with computer systems only. Security and availability of the operating environment (e.g., buildings, temperature controls, network links, physical media) and the auditable implementation of procedures by all staff are key elements. Security measures are often developed in an unstructured way, by reacting to security incidents and/or to available computer software tools. This approach on its own can easily leave gaps in security, which are filled only at some later date, typically after a security breach. A more structured approach is to review the information assets of the organization, and then assign risk factors based on asset value, potential threats, system vulnerability and likelihood of attack. These should be assigned on the basis of which appropriate, cost-effective security measures can be identified. 9 Access Rights The segregation of roles is a fundamental aspect of duty of care, according to the Code of Practice for the Implementation of BS It provides a check on errors and on the deliberate falsification of records. In this respect, segregation of roles is particularly important in systems where there is risk of fraud or other malicious action. Code of Practice for the Implementation of BS further suggests that it is also important to ensure that the physical and managerial segregation that exists around a system is mirrored by the logic access control within it, via the implementation of an access control system. Only staff with relevant access rights should be permitted to enter data or amend stored data. It is also important to ensure that a suitably granular level of automatic logging is applied to the process to record the activities performed, times and dates. 10 System access rights should be granted only after the members of staff have successfully proved their competence. Some of the electronic data files can have a nonhuman author. A computer-generated record is the output of a computer program untouched by human hands, thus the author can be considered to be a particular computer program or programs executing on a particular computer or multiple computers. One computer program may author many records, and many computer programs may author elements of a single record. Each computer program generating elements of the electronic record must be identified clearly in the record. The key evidentiary issue is demonstrating that the computer program generating the record is functioning properly. 11 Further, some data files, particularly those generated by word processor or spreadsheet programs, may contain automatically executable code (often referred to as macros), which can have the effect of modifying the file each time it is retrieved, viewed or printed out. It may be difficult to assess what evidential weight is attached to such files. 12 Reliable and Trustworthy Systems It is important to be able to demonstrate that the computer system has been functioning properly (i.e., according to agreed-upon procedures) in order to authenticate data stored on the system. Arguments over admissibility of information as evidence can lead to an investigation into the system from which the information came, the method of storage, operation and access control, and even into computer programs and source code. It may be necessary to satisfy the court that the information is stored in a proper manner. This could be a tactic used to try to discredit the evidence and to make inadmissible, or reduce the evidential weight of, that evidence and any similarly stored information that is produced. Questionable hardware reliability, for example, could be used to discredit the information management system. This could call the whole system into question and cause information stored within it to be ruled inadmissible. 13 It is important to utilize reliable and trustworthy technology to store electronic information over a long period of time. Each part of the system needs to be chosen with care, taking into account the possible need to demonstrate the proper and appropriate working of the system some time in the future. This demonstration may need to encompass both technology itself and the methods by which it was configured and used. 14 The information management system should be maintained and corrective maintenance should be carried out only by qualified personnel to ensure that its performance does not deteriorate to such an extent that the integrity of the data captured, created by or stored within it is affected. A maintenance log should be kept, stating the preventive and corrective maintenance procedures completed. The log should include information regarding system downtime and details of action taken. Where system access control can be bypassed during maintenance of hardware and/or software, personnel performing such processes should be strictly controlled, monitored and audited ISACA JOURNAL VOLUME 4, 2012
4 Business Continuity Planning From time to time, problems arise with information management systems that require emergency procedures to be implemented in order for recovery. Such procedures may involve the temporary use of additional or third-party resources. To ensure that the integrity of information is not compromised during these operations, an agreed-upon and approved business continuity plan (sometimes known as a disaster recovery plan) may be implemented. Procedures to be used in cases of major equipment, environmental or personnel failure should be developed, tested, maintained and implemented. Such procedures should ensure that the integrity of stored information is not compromised during implementation. Issues surrounding the security of backup data may be important in the event of a dispute over authenticity. It may be argued that backup media had been compromised, and then used to recover from an information loss, thus affecting the authenticity of stored information. In some cases, the availability of backup data that have been in secure storage, to be used only in the event of a challenge to the authenticity of the live data, can be used to enhance the evidential weight of the stored information. 16 Date and Time Stamps Being able to determine the date and/or time of an event can be an important piece of evidence. Thus, all appropriate events should be date- and/or time-stamped. Where accuracy of date and/or time stamps is important, regular checking of system clocks should be carried out. Any errors should be corrected and any actions taken should be documented. Only authorized personnel should be able to change system clocks. 17 Audit Trails Code of Practice for the Implementation of BS further suggests that when preparing information for use as evidence, it is often necessary to provide further supporting information. This information may include details such as date of storage of the information, details of movement of the information from a medium, and evidence of the controlled operation of the system. These details are known as audit trail information. This audit trail information is needed to demonstrate that the system is working as well as the progress of information through the system. Audit trails need to be comprehensive and properly looked after, because without them, the integrity and authenticity and, thus, the evidential weight of the information stored in the system could be called into question. The audit trail consists of the aggregate of the information necessary to provide a historical record of all significant events associated with stored information and the information management system. As such, it covers the answers to all classic questions concerning the provenance of any piece of information stored within the information management system: 18 Who? What? Where? When? Why? How? Access to the audit trail information needs to be controlled. In some applications, access may be needed only infrequently, so it is important that the interpretation procedures be documented. As audit trail data may be inspected by authorized external personnel (such as auditors) who have little or no familiarity with the system, interpretation procedures should be understandable to nontechnical users. The storage of audit trail data is a topic often not included in an organization s information management policies. As they are frequently created automatically and infrequently accessed, they are forgotten and, thus, not subject to adequate control. 19 Some systems control the size of audit trail data files by the use of looping. Looping sets the maximum size for the data file, and when the size is reached, new data overwrite the oldest data in the file. Thus, old audit trail data are lost. This process may not be in compliance with required retention policy. This should not be the case with audit trail data from information management systems, which should be stored for the same period as that of the data to which they relate. In a general sense, if an attacker gains unlimited access to a system, if the audit trail is not protected by write-only or write-once technology, and if no physical means are used or are effective in determining authenticity of audit trails, it is possible to create a forged audit trail that is not differentiable from a legitimate audit trail. When attackers try to cover up attacks, they tend to do one of three things: 1. Attempt to delete all files on a system to remove all traces of their entry. ISACA JOURNAL VOLUME 4,
5 2. Try to modify selected audit trails to remove any indication of their use. 3. Try to prevent their attack from being audited by avoiding the use of audited events. If they prevent their attacks from being audited by avoiding the use of audited events, there is little that can be done to detect their tampering within the system. 20 Conclusion ICT brings potentially increased, or at least different, risk in terms of civil or criminal wrongdoing, and organizations must be able to protect themselves against such risk. Failure to do so raises governance and accountability issues for which management of the organization could be held responsible. When information is used as evidence in the event of a dispute, the maximum weight of evidence is not affected by the size or shape of the organization and its own view of security risk. It frequently depends on the opinion of an independent arbiter. That view may well be affected by the opposing party in the dispute attempting to discredit evidential value. Legal admissibility concerns whether a piece of evidence would be accepted by a court of law. To ensure the admissibility, information must be managed by a secure system throughout its lifetime (which can be for many years). Where doubt can be placed on the information, the evidential weight may well be reduced, potentially harming the legal case. BS can provide assurance that any electronic information required as evidence of a business transaction is afforded the maximum evidential weight. Compliance with this standard does not guarantee legal admissibility. It defines best practice. The standard pays particular attention to setting up authorized procedures and subsequently being able to demonstrate, in a court of law, that these procedures have been followed. Information security is key when discussing legal admissibility issues. The main discussion on this topic is likely to be the authenticity of the stored information. When the electronic information was captured by the storage system, was the process secure? Was the correct information captured, and was it complete and accurate? During storage, was the information changed in any way, either accidentally or maliciously? When responding to these questions, information security implementation and monitoring are central to demonstrating authenticity. Endnotes 1 International Telecommunication Union (ITU), Understanding Cybercrime: A Guide for Developing Countries, Switzerland, Danielsson, Jerker; Ingvar Tjøstheim; The Need for a Structured Approach to Digital Forensic Readiness: Digital Forensic Readiness and E-commerce, IADIS International Conference e-commerce, International Organization for Standardization, ISO/IEC DIS Information technology Security techniques Guidelines for identification, collection, acquisition and preservation of digital evidence, BSI Group, BS 10008:2008 Evidential weight and legal admissibility of electronic information Specification, UK, BSI Group, PD 0010:1997 The principles of good practice for information management, BSI Group, BIP :2008 Evidential Weight and Legal Admissibility of Information Stored Electronically. Code of Practice for the Implementation of BS 10008, UK, Australian Standards, HB , Guidelines for the management of IT evidence, Australia, Op cit, HB Op cit, BSI Group, BS 10008: Cohen, Fred; Challenges to Digital Forensic Evidence, Fred Cohen & Associates, ISACA JOURNAL VOLUME 4, 2012
The legal admissibility of information stored on electronic document management systems
Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow
ISO IEC 27002 2005 (17799 2005) TRANSLATED INTO PLAIN ENGLISH
13.1 REPORT INFORMATION SECURITY EVENTS AND WEAKNESSES 1 GOAL Make sure that information system security incidents are promptly reported. 2 GOAL Make sure that information system security events and weaknesses
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
An Approach to Records Management Audit
An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
The Information Systems Audit
November 25, 2009 e q 1 Institute of of Pakistan ICAP Auditorium, Karachi Sajid H. Khan Executive Director Technology and Security Risk Services e q 2 IS Environment Back Office Batch Apps MIS Online Integrated
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Practical Overview on responsibilities of Data Protection Officers. Security measures
Practical Overview on responsibilities of Data Protection Officers Security measures Manuel Villaseca Spanish Data Protection Agency [email protected] Security measures Agenda: The rol of DPO on security measures
Why is British Standard BIP0008 important for a Document Management System?
Softology Ltd. Why is British Standard BIP0008 important for a Document Management System? July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow 01925
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Case study on asset tracing
Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
ADMISSIBILITY OF ELECTRONICALLY STORED INFORMATION A presentation for ISACA and IIA. Alex Potts 20 May 2008
The Offshore Law Firm Bermuda & British Virgin Islands & Cayman Islands ADMISSIBILITY OF ELECTRONICALLY STORED INFORMATION A presentation for ISACA and IIA Alex Potts 20 May 2008 www.conyersdillandpearman.com
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Union County. Electronic Records and Document Imaging Policy
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Ten Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
ISO/IEC 27001 Information Security Management. Securing your information assets Product Guide
ISO/IEC 27001 Information Security Management Securing your information assets Product Guide What is ISO/IEC 27001? ISO/IEC 27001 is the international standard for information security management and details
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
INFORMATION SECURITY PROCEDURES
INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2
MASSIVE NETWORKS Online Backup Compliance Guidelines Last updated: Sunday, November 13 th, 2011 Contents MASSIVE NETWORKS Online Backup Compliance Guidelines... 1 Sarbanes-Oxley (SOX)... 2 SOX Requirements...
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E.
Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E. President & CEO Agenda Introduction Who is Malisko Engineering? Title
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Legal view of digital evidence
Chapter 2 Legal view of digital evidence Before developing a model or a theory, it is important to understand the requirements of the domain in which the model or the theory is going to be used. The ultimate
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Strategies for Developing a Document Imaging & Electronic Retention Program
Is it okay to destroy the paper source records? Are there any exceptions? Strategies for Developing a Document Imaging & Electronic Retention Program How do we ensure the program will stand up in court?
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
Spillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
Information security management systems Specification with guidance for use
BRITISH STANDARD BS 7799-2:2002 Information security management systems Specification with guidance for use ICS 03.100.01; 35.020 This British Standard, having been prepared under the direction of the
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
IT Security Management
The Auditor-General Audit Report No.23 2005 06 Protective Security Audit Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036 7632 ISBN 0 642 80882 1 COPYRIGHT INFORMATION This work
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches
The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches Henry Nnoli, Dale Lindskog, Pavol Zavarsky, Shaun Aghili, Ron Ruhl Information Systems Security Management
https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
Information System Audit Guide
Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Executive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25
Information Security Policy Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25 Document Information Trust Policy Number : ULH-IM&T-ISP01 Version : 3.1 Status : Approved Issued by : Information Governance
MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO
E MARITIME SAFETY COMMITTEE 95th session Agenda item 4 MSC 95/4/1 5 March 2015 Original: ENGLISH MEASURES TO ENHANCE MARITIME SECURITY Industry guidelines on cyber security on board ships Submitted by
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Draft ETSI EN 319 401 V1.1.1 (2012-03)
Draft EN 319 401 V1.1.1 (2012-03) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 Draft EN
Electronic Forensics: A Case for First Responders
Title: Electronic Forensics: A Case for First Responders by Dr. Henry B. Wolfe Abstract Almost every aspect of our lives is touched or somehow controlled by technology driven processes, procedures and
Rackspace Archiving Compliance Overview
Rackspace Archiving Compliance Overview Freedom Information Act Sunshine Laws The federal government and nearly all state governments have established Open Records laws. The purpose of these laws is to
