13
Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Embed Size (px)

Citation preview

Page 1: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Foundations of Organizational Information Assurance

Fall 2007

Dr. Barbara Endicott-PopovskyIMT551

Page 2: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Implementing IA and Cybersecurity

Secure System

Page 3: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Implementing IA and Cybersecurity

Secure System

Page 4: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Policies

• Policies drive security solutions

• Range from standards to guidelines; general to procedural

• Controls derive from policies

• Consequences tied to policies

Page 5: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Role for Procedures:When We Trust Controls…. Assumes:

• Design implements policies

• Sum total of controls implement all policies

• Implementation is correct

• Installation/administration arecorrect

Page 6: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

CISO Procedure Dashboard

• Employee termination checklist• Employee provisioning checklist• Data backup• Emergency contacts• Change management procedure• Instant messaging procedures• PCI data security standard• PCI self-assessment checklist• Credit card handling procedure• Data breach response procedure• Procedure for request/access to personnel files• Procedure for outside request for information• Data classification procedure• Media disposal procedure• Privacy procedure

Page 7: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

CISO Procedure Dashboard (cont’d.)

• Cyber incident response procedure

• Procedure on disposal of media/memory

• PKI management

• Appropriate use procedure

• Top 10 list

• Security manual

• Metrics

• ISO17799, ISO27001

• VPN procedure

• Outsourcing security requirements/contract terms

• Contractor security requirements /contract terms

Page 8: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

IMPLEMENTING IA AND CYBERSECURITY ISO17799 EVALUATION (Rev 1, 11 Sep 07)

ISO 17799 Section Policy Procedures &

Practices Mechanisms Security

Awareness Training

IA Audit Feedback

3.1 Information Security Policy

Objective: To provide management direction and support for information security. Management should set a clear policy direction and demonstrate support for, and commitment to, information security through the issue and maintenance of an information security policy across the organization.

Information Security Policy

4.1 Information Security Infrastructure

Objective: To manage information security within the organization. A management framework should be established to initiate and control the implementation of information security within the organization. Suitable management forums with management leadership should be established to approve the information security policy, assign security roles

A management authorization process for new information processing facilities should be established.

A management forum to ensure that there is clear direction and visible management support for security initiatives should therefore be considered. Appropriate contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications operators should be maintained to ensure that appropriate action can be quickly taken, and advice obtained, in the event of a security incident.

The information security policy document sets out the policy and responsibilities for information security. Its implementation should be reviewed independently to provide assurance that organizational practices properly reflect the policy, and that it is feasible and effective. Such a review may be carried out by the internal audit function, an independent manager or a third party organization specializing in such reviews, where these

Page 10: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Labor Force Composition

0%

10%

20%

30%

40%

50%

60%

70%

1900

1910

1920

1930

1940

1950

1960

1970

1980

1997

YEAR

% SERVICE

% WHITE COLLAR

% BLUE COLLAR

% FARMING

Source: K. Lauden & Lauden

Page 11: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Attribute

Agricultural Age

Industrial Age Information Age

Wealth Land Capital Knowledge

Advancement Conquest Invention Paradigm Shifts

Time Sun/Seasons Factory Whistle Time Zones

Workplace Farm Capital equipment

Networks

Organization

StructureFamily Corporation Collaborations

Tools Plow Machines Computers

Problem-solving Self Delegation Integration

Knowledge Generalized Specialized Interdisciplinary

Learning Self-taught Classroom Online

Page 12: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Technology

 

Individual

Community

StateEco

nom

ics

Politics &

Law

Culture

Education

At th

e he

art…

IMPACTS

Page 13: Foundations of Organizational Information Assurance Fall 2007 Dr. Barbara Endicott-Popovsky IMT551

Questions?