Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation



Similar documents
Data Management Policies. Sage ERP Online

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Supplier Security Assessment Questionnaire

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

Data Security Incident Response Plan. [Insert Organization Name]

HIPAA Compliance Evaluation Report

Document Title: System Administrator Policy

HIPAA and Mental Health Privacy:

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

Office of Inspector General

Information Security Program Management Standard

Information Technology Cyber Security Policy

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Incident Response Plan for PCI-DSS Compliance

Utica College. Information Security Plan

Network Security Policy

INFORMATION TECHNOLOGY SECURITY STANDARDS

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Access to Electronic Health Records Policy Franciscan Health System

ISO Information Security Management Systems Foundation

SUPPLIER SECURITY STANDARD

The Internet and 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

DIOCESE OF DALLAS. Computer Internet Policy

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

Weighted Total Mark. Weighted Exam Mark

HIPAA Security Alert

Your Agency Just Had a Privacy Breach Now What?

CITY OF BOULDER *** POLICIES AND PROCEDURES

This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.

Procedure for Managing a Privacy Breach

UF IT Risk Assessment Standard

Domain 5 Information Security Governance and Risk Management

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security. Topics

How To Audit The Mint'S Information Technology

Wright State University Information Security

Information Resources Security Guidelines

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

How To Use A College Computer System Safely

Computer Security: Principles and Practice

NIST National Institute of Standards and Technology

Security Is Everyone s Concern:

Guidelines 1 on Information Technology Security

Information Security Policy

Information Security Policy

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Security Practices for Online Collaboration and Social Media

The Protection Mission a constant endeavor

Newcastle University Information Security Procedures Version 3

Social Media Risk Assessment. The Unique Alternative to the Big Four

University Information Technology Security Program Standard

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter

HIPAA Security COMPLIANCE Checklist For Employers

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Acceptable Use Policy

CSC 474 Information Systems Security

Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002

Hengtian Information Security White Paper

California State University, Chico. Information Security Incident Management Plan

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

Law & Ethics, Policies & Guidelines, and Security Awareness

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

Technical Standards for Information Security Measures for the Central Government Computer Systems

Title: Data Security Policy Code: Date: rev Approved: WPL INTRODUCTION

DUVAL COUNTY PUBLIC SCHOOLS (DCPS) INFORMATION SECURITY PROGRAM SUBJECT: ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71

ELECTRONIC INFORMATION SECURITY A.R.

PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS DA-1

Business Case. for an. Information Security Awareness Program

HIPAA and Health Information Privacy and Security

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

INTERNET ACCEPTABLE USE POLICY

Chapter 6: Fundamental Cloud Security

REGION 19 HEAD START. Acceptable Use Policy

DATA SECURITY AGREEMENT. Addendum # to Contract #

Iowa Health Information Network (IHIN) Security Incident Response Plan

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

ITS HIPAA Security Compliance Recommendations

The Ministry of Information & Communication Technology MICT

Transcription:

Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 14 Risk Mitigation

Objectives Explain how to control risk List the types of security policies Describe how awareness and training can provide increased security Security+ Guide to Network Security Fundamentals, Fourth Edition 2

Introduction Risk Concept at the heart of information security Multifaceted approach to information security Control risk through different management techniques Develop a security policy User awareness and training Security+ Guide to Network Security Fundamentals, Fourth Edition 3

Controlling Risk Threat Type of action that has potential to cause harm Threat agent Person or element with power to carry out a threat Vulnerability Flaw or weakness that allows threat agent to bypass security Risk Likelihood threat agent will exploit the vulnerability Security+ Guide to Network Security Fundamentals, Fourth Edition 4

Table 14-1 Risk classifications Security+ Guide to Network Security Fundamentals, Fourth Edition 5

Controlling Risk (cont d.) Privilege Subject s access level over an object, such as a file Privilege management Process of assigning and revoking privileges to objects Privilege auditing Periodically reviewing a subject s privileges over an object Objective: determine if subject has the correct privileges Security+ Guide to Network Security Fundamentals, Fourth Edition 6

Figure 14-1 Sample user access and rights review Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition 7

Controlling Risk (cont d.) Change management Methodology for making modifications and keeping track of changes Ensures proper documentation of changes so future changes have less chance of creating a vulnerability Involves all types of changes to information systems Two major types of changes that need proper documentation Changes to system architecture Changes to file or document classification Security+ Guide to Network Security Fundamentals, Fourth Edition 8

Controlling Risk (cont d.) Change management team (CMT) Body responsible for overseeing the changes Composed of representatives from all areas of IT, network security, and upper management Proposed changes must first be approved by CMT CMT duties Review proposed changes Ensure risk and impact of planned change are understood Security+ Guide to Network Security Fundamentals, Fourth Edition 9

Controlling Risk (cont d.) CMT duties (cont d.) Recommend approval, disapproval, deferral, or withdrawal of a requested change Communicate proposed and approved changes to coworkers Incident management Response to an unauthorized incident Components required to identify, analyze, and contain an incident Security+ Guide to Network Security Fundamentals, Fourth Edition 10

Controlling Risk (cont d.) Incident handling Planning, coordination, communications, and planning functions needed to resolve incident Incident management objective Restore normal operations as quickly as possible with least impact to business or users Security+ Guide to Network Security Fundamentals, Fourth Edition 11

Reducing Risk Through Policies Security policy Another means of reducing risks Important considerations regarding security policies Understanding what it is Knowing how to balance trust and control Understanding the process for designing a policy Knowing what the different types of policies are Security+ Guide to Network Security Fundamentals, Fourth Edition 12

What Is a Security Policy? Document that outlines protections to ensure organization s assets face minimal risks Higher level definition Set of management statements that define organization s philosophy of how to safeguard information Lower level definition Rules for computer access and how the rules are carried out Security+ Guide to Network Security Fundamentals, Fourth Edition 13

What Is a Security Policy? (cont d.) Security policy functions Documents management s overall intention and direction Details specific risks and how to address them Provides controls to direct employee behavior Helps create a security-aware organizational culture Helps ensure employee behavior is directed and monitored Security+ Guide to Network Security Fundamentals, Fourth Edition 14

Balancing Trust and Control Three approaches to trust Trust everyone all of the time Trust no one at any time Trust some people some of the time Security policy attempts to provide right amount of trust Trust some people some of the time Builds trust over time Level of control must also be balanced Influenced by security needs and organization s culture Security+ Guide to Network Security Fundamentals, Fourth Edition 15

Designing a Security Policy Standard Collection of requirements specific to system or procedure that must be met by everyone Guideline Collection of suggestions that should be implemented Policy Document that outlines specific requirements that must be met Security+ Guide to Network Security Fundamentals, Fourth Edition 16

Designing a Security Policy (cont d.) Characteristics of a policy Communicates a consensus of judgment Defines appropriate user behavior Identifies needed tools and procedures Provides directives for Human Resource action in response to inappropriate behavior Helps if necessary to prosecute violators Security+ Guide to Network Security Fundamentals, Fourth Edition 17

Designing a Security Policy (cont d.) Three phases of the security policy cycle Vulnerability assessment Asset identification Threat identification Vulnerability appraisal Risk assessment Risk mitigation Create the policy using information from risk management study Review the policy for compliance Security+ Guide to Network Security Fundamentals, Fourth Edition 18

Figure 14-2 Security policy cycle Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition 19

Table 14-2 Security policy must and should statements Security+ Guide to Network Security Fundamentals, Fourth Edition 20

Designing a Security Policy (cont d.) Security policy design should be the work of a team Development team representatives Senior level administrator Member of management who can enforce the policy Member of the legal staff Representative from the user community Team should first decide on policy goals and scope Also how specific the policy should be Security+ Guide to Network Security Fundamentals, Fourth Edition 21

Designing a Security Policy (cont d.) Due care Obligations imposed on owners and operators of assets Owners must exercise reasonable care of assets and take precautions to protect them Examples of due care policy statements Employees should exercise due care in opening attachments received from unknown sources Students will exercise due care when using computers in a crowded lab setting Security+ Guide to Network Security Fundamentals, Fourth Edition 22

Designing a Security Policy (cont d.) Policy development guidelines Notify users in advance of development of and reasons for a new security policy Provide affected users an opportunity to review and comment on policy prior to deployment Give users with responsibility the authority to carry out their responsibilities Security+ Guide to Network Security Fundamentals, Fourth Edition 23

Types of Security Policies Security policies often broken down into subpolicies Acceptable use policy Privacy policy Security-related human resource policy Password management and complexity policy Disposal and destruction policy Classification of information policy Ethics policy Security+ Guide to Network Security Fundamentals, Fourth Edition 24

Table 14-3 Types of security policies Security+ Guide to Network Security Fundamentals, Fourth Edition 25

Types of Security Policies (cont d.) Acceptable use policy Policy that defines actions users may perform while accessing systems Users include employees, vendors, contractors, and visitors Typically covers all computer use Generally considered most important information security policy Security+ Guide to Network Security Fundamentals, Fourth Edition 26

Types of Security Policies (cont d.) Privacy policy Also called personally identifiable information policy Outlines how organization uses personal information it collects Security-related human resource policy Includes statements about how an employee s information technology resources will be addressed Typically presented at employee orientation session after employee is hired Security+ Guide to Network Security Fundamentals, Fourth Edition 27

Figure 14-3 Sample privacy policy Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition 28

Types of Security Policies (cont d.) Security-related human resource policy (cont d.) May include statements regarding due process and/or due diligence May include statements regarding actions to be taken when employee is terminated Password management and complexity policy Addresses how passwords are created and managed Reminds users of differences between strong and weak passwords Security+ Guide to Network Security Fundamentals, Fourth Edition 29

Figure 14-4 Weak password information Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition 30

Figure 14-5 Strong password information Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth Edition 31

Types of Security Policies (cont d.) Disposal and destruction policy Addresses disposal of confidential resources Describes how to dispose of equipment, records, and data Classification of information policy Designed to produce standardized framework for classifying information assets Generally involves creating classification categories Example: high, medium, low Security+ Guide to Network Security Fundamentals, Fourth Edition 32

Types of Security Policies (cont d.) Defining ethics can be difficult Values A person s fundamental beliefs and principles Morals Values attributed to a belief system that helps individuals distinguish right from wrong Ethics Study of what a group of people understand to be good and right behavior Security+ Guide to Network Security Fundamentals, Fourth Edition 33

Types of Security Policies (cont d.) An organization does not set an employee s values Does set ethical behavior standards Ethics policy Written code of conduct Guides employees in decision making Serves as a communication tool to reflect organization s commitments Security+ Guide to Network Security Fundamentals, Fourth Edition 34

Awareness and Training Providing users with security awareness training Key defense in information security Awareness and training topics Compliance Secure user practices Awareness of threats Security+ Guide to Network Security Fundamentals, Fourth Edition 35

Compliance Users should be informed regarding: Security policy training and procedures Personally identifiable information Information classification Data labeling, handling, and disposal Compliance with laws, best practices, and standards Security+ Guide to Network Security Fundamentals, Fourth Edition 36

User Practices Table 14-4 User practices Security+ Guide to Network Security Fundamentals, Fourth Edition 37

Threat Awareness Peer-to-peer (P2P) networks Similar to instant messaging Users connect directly to each other Typically used for sharing audio, video, data files Tempting targets for attackers Viruses, worms, Trojans, and spyware can be sent using P2P Most organizations prohibit use of P2P High risk of infection Legal consequences Security+ Guide to Network Security Fundamentals, Fourth Edition 38

Threat Awareness (cont d.) Social networking Grouping individuals based on some sort of affiliation Can be physical or online Web sites that facilitate social networking called social networking sites Increasingly becoming prime targets of attacks Reasons social networking sites are popular with attackers Lots of personal data is available Security+ Guide to Network Security Fundamentals, Fourth Edition 39

Threat Awareness (cont d.) Reasons social networking sites are popular with attackers (cont d.) Users are generally trusting Sites are vulnerable Security tips for using social networking sites Consider carefully who is accepted as a friend Show limited friends a reduced version of your profile Disable options and reopen only as necessary Security+ Guide to Network Security Fundamentals, Fourth Edition 40

Table 14-5 Recommended Facebook profile settings Security+ Guide to Network Security Fundamentals, Fourth Edition 41

Table 14-6 Recommended Facebook contact information settings Security+ Guide to Network Security Fundamentals, Fourth Edition 42

Training Techniques Opportunities for security education and training When new employee is hired After computer attack has occurred When employee promoted During annual department retreat When new user software is installed When user hardware is upgraded Security+ Guide to Network Security Fundamentals, Fourth Edition 43

Training Techniques (cont d.) Learner traits impact how people learn Examples of learning styles Visual Auditory Kinesthetic Training styles impact how people learn Pedagogical approach Classic teaching method Andragogical approach Art of helping an adult learn Security+ Guide to Network Security Fundamentals, Fourth Edition 44

Table 14-7 Traits of learners Security+ Guide to Network Security Fundamentals, Fourth Edition 45

Table 14-8 Approaches to training Security+ Guide to Network Security Fundamentals, Fourth Edition 46

Summary A risk is the likelihood that a threat agent will exploit a vulnerability Privilege management and change management are risk management approaches A security policy states how an organization plans to protect its information technology assets Development and maintenance of a security policy follows a three-phase cycle Security+ Guide to Network Security Fundamentals, Fourth Edition 47

Summary (cont d.) Security policies are often broken into subpolicies Acceptable use policy Privacy policy Password management and complexity policy Disposal and destruction policy Classification of information policy Ongoing awareness training provides users with knowledge and skills necessary to support information security Security+ Guide to Network Security Fundamentals, Fourth Edition 48