1
Introduction to information security Lecture #1 Security in - - PowerPoint PPT Presentation
Introduction to information security Lecture #1 Security in - - PowerPoint PPT Presentation
Introduction to information security Lecture #1 Security in Organizations 2011 Eric Verheul 1 Outline The lectures I will give Information Security events in the media What is Information Security? Recap Study for next
2
Outline
- The lectures I will give
- Information Security events in the media
- What is Information Security?
- Recap
- Study for next week
3
Things I will teach
The lectures I will give
- Information security in organizations in practice based
- n the ISO 27001 / ISO 27002 standards
- Conducting IS risk assessments in organizations
- Introduction to EDP audits and auditors
- Writing an information security policy
4
Information Security (IS)
The lectures I will give
- Information Security:
- Preservation of confidentiality, integrity and availability of
information (ISO).
- The protection of information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability (NIST).
- The condition in which confidentiality, integrity and
availability of information and information technology are protected by appropriate safeguards. (BSI).
5
Literature
Main literature for my lectures (apart from the slides): 1. ISO 27001, ISO 27002, ISO 27005 2. How to Achieve 27001 Certification, Sigurjon Thor Arnason, Keith D. Willett, Auerbach publications, 2008. Accessible through SIO webpage 3. Management Issues, Chapter 22 of Security Engineering: A Guide to Building Dependable Distributed Systems, R. Anderson 4. What Is Security Engineering? Chapter 23 of Security Engineering: A Guide to Building Dependable Distributed Systems, R. Anderson
The lectures I will give
6
Outline
- The lectures I will give
- Information Security events in the media
- What is Information Security?
- Recap
- Study for next week
7
C5 C8
Citibank admits: we've lost the backup tape
C13 C7 C14 C11 C12
8
Management commitment
ISO 27002 Chapter 5: SECURITY POLICY
C5
Information Security events in the media
9
Organization of information security
ISO 27002 Chapter 6: Organization of Information Security
Information Security events in the media
C6
10
Organization of information security
Information Security events in the media
C6
ISO 27002 Chapter 6: Organization of Information Security
11
Lost USB sticks
C7
ISO 27002 Chapter 7: ASSET MANAGEMENT
Information Security events in the media
12
Lost backup tapes
ISO 27002 Chapter 7: ASSET MANAGEMENT
Citibank admits: we've lost the backup tape C7
Source http://www.theregister.co.uk
Information Security events in the media
C7
13
Lost tax declarations
ISO 27002 Chapter 7: ASSET MANAGEMENT
C7
Information Security events in the media
14
User awareness
ISO 27002 Chapter 8: HUMAN RESOURCES SECURITY
C8
Information Security events in the media
15
User awareness
ISO 27002 Chapter 8: HUMAN RESOURCES SECURITY
C8
Information Security events in the media
Source http://www.rtl.nl
16
Screening
C8
Information Security events in the media
ISO 27002 Chapter 8: HUMAN RESOURCES SECURITY
17
Physical security
ISO 27002 Chapter 9: PHYSICAL AND ENVIRONMENTAL SECURITY C9
Information Security events in the media
18
Physical security
ISO 27002 Chapter 9: PHYSICAL AND ENVIRONMENTAL SECURITY C9
Information Security events in the media
19
Fire
ISO 27002 Chapter 9: PHYSICAL AND ENVIRONMENTAL SECURITY C9
Information Security events in the media
20
Power failure
ISO 27002 Chapter 9: PHYSICAL AND ENVIRONMENTAL SECURITY C9
Source http://www.webwereld.nl
Information Security events in the media
21
Power failure
ISO 27002 Chapter 9: PHYSICAL AND ENVIRONMENTAL SECURITY C9
Source http://www.nos.nl, August 10 2009
Information Security events in the media
22
Malicious code protection
ISO 27002 Chapter 10: COMMUNICATIONS AND OPERATIONS MANAGEMENT
C10
Information Security events in the media
23
Malicious code protection
ISO 27002 Chapter 10: COMMUNICATIONS AND OPERATIONS MANAGEMENT
C10
Information Security events in the media
24
Patching
ISO 27002 Chapter 10: COMMUNICATIONS AND OPERATIONS MANAGEMENT
C10
Information Security events in the media
25
Password management
ISO 27002 Chapter 11 : ACCESS CONTROL
C11
Source http://www.infosectoday.com
Information Security events in the media
26
Security in software lifecycle
ISO 27002 Chapter 12: INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT AND MAINTENANCE
C12
Source http://news.zdnet.co.uk
Information Security events in the media
27
Security incident handling
ISO 27002 Chapter 13: INFORMATION SECURITY INCIDENT MANAGEMENT
C13
Information Security events in the media
28
Massive loss of information and employees
ISO 27002 Chapter 14: BUSINESS CONTINUITY MANAGEMENT C14
September 9, 2001
Information Security events in the media
29
Non compliance with privacy regulations
ISO 27002 Chapter 15: COMPLIANCE
C15
Information Security events in the media
30
Non compliance with privacy regulations
ISO 27002 Chapter 15: COMPLIANCE
C15
Information Security events in the media
31
ISO 27002
H ISO 27002 NEN Vertaling 5 Security Policy Beveiligingsbeleid 6 Organization of Information Security Beveiligingsorganisatie 7 Asset Management Classificatie en beheer van bedrijfsmiddelen 8 Human resources security Beveiligingseisen ten aanzien van personeel 9 Physical and Environmental Security Fysieke beveiliging en beveiliging van de omgeving 10 Communications and Operations Management Beheer van communicatie- en bedieningsprocessen 11 Access Control Toegangsbeveiliging 12 Information Systems Acquisition, Development and Maintenance Ontwikkeling en onderhoud van systemen 13 Information Security Incident Management Incidentmanagement 14 Business Continuity Management Continuïteitsmanagement 15 Compliance Naleving
Information Security controls (ISO 27002)
32
Outline
- The lectures I will give
- Information Security events in the media
- What is Information Security?
- Recap
- Study for next week
33
Information Security (IS)
What is Information Security?
Do you think that the incidents we have seen would not have occurred when the organizations implemented the 133 controls from ISO 27002?
34
Information Security (IS)
What is Information Security?
Strangely enough the notion of ‘risk’ is not involved in these definitions.
35
Alternative definition of IS
What is Information Security
- Adequately protecting information against possible
threat manifestations.
36
Alternative definition of IS
What is Information Security
- Adequately protecting the confidentiality, integrity and
availability of information against possible threat manifestations.
37
Alternative definition of IS
What is Information Security?
- Threat manifestation (or potential incident): the
successful combination of a threat and a vulnerability:
- A threat is a) something „negative‟ that can accidentally
happen or b) that some party intentionally wants to achieve.
- A vulnerability is a weakness that can be accidentally
triggered or intentionally exploited.
- Threats can be Natural/Environmental or Human.
- Adequately protecting the confidentiality, integrity and
availability of information against possible threat manifestations.
38
Alternative definition of IS
What is Information Security?
- Protection (controls) can be either:
- Preventive
- Detective
- Repressive (e.g. fire extinguishers or punishment), or
- Corrective (repairing the damage)
- Adequately protecting the confidentiality, integrity and
availability of information against possible threat manifestations.
39
Alternative definition of IS
What is Information Security?
- Adequately protecting the confidentiality, integrity and
availability of information against possible threat manifestations.
Threat #1 Threat #2 Threat #3 Threat #4 Threat #n Vulnerability #1 Vulnerability #2 Vulnerability #3 Vulnerability #4 Vulnerability #n
Risk Treatment
Poten tenti tial al incide dents nts
40
Alternative definition of IS
What is Information Security?
- Adequate: as supported by a risk assessment and
treatment analysis whereby all possible manifestations of threats and their impacts („risks‟) are considered and somehow all „relevant‟ ones are sufficiently reduced with controls.
- Risks are typically reduced but can also be accepted,
avoided or transferred.
- Who decides, who provides priority/budget?
- Adequately protecting the confidentiality, integrity and
availability of information against possible threat manifestations.
41
Alternative definition of IS
What is Information Security?
- Adequately protecting the confidentiality, integrity and
availability of information against possible threat manifestations.
Risk Treatment
Risks can be:
- Reduced/removed
- Accepted
- Avoided
- Transferred
Preventive controls Detective controls Repressive controls Corrective controls
42
Outline
- The lectures I will give
- Information Security events in the media
- What is Information Security?
- Recap
- Study for next week
43
Recap
Recap on information security
- Complicating factors in implementing Information Security
(IS) are its multidisciplinary nature and constraints on budget, effort and getting management attention
- ISO 27002 is a (long) of list of 133 IS controls divided over 11
chapters originally dating from the nineties
- Practice shows that „just‟ implementing ISO 27002 is not the
way to secure organizations because not all controls are equally relevant for all organizations and circumstances
- To address this ISO 27002 was supplemented with ISO
27001 which describes „security management‟ that we will discuss next week.
44
Outline
- The lectures I will give
- Information Security events in the media
- What is Information Security?
- Recap
- Study for next week
45
Study for next week
Information Security controls (ISO 27002)
- Study for next week:
- The ISO 27001 and 27002 standards
- First four chapters of “How to Achieve 27001 Certification”, Sigurjon
Thor Arnason, Keith D. Willett, Auerbach publications, 2008. Accessible through SIO webpage
- http://www.iso27001security.com
- Look at the information security policy assignment