39
Information Security Essentials Information Security Essentials Confidentiality, Integrity and Availability of Information in Networked Workplace www.facebook.com/groups/manageictservices [email protected]

Information Security at the Workplace

Embed Size (px)

Citation preview

Page 1: Information Security at the Workplace

Information Security Essentials Information Security Essentials Confidentiality, Integrity and Availability

of Information in Networked Workplace

www.facebook.com/groups/[email protected]

Page 2: Information Security at the Workplace

AGENDA

• Networked Workplace

• Information Security Essential Questions

• Information Security Basic Methods and Tools

www.facebook.com/groups/[email protected]

Page 3: Information Security at the Workplace

Networked Workplace

Network is a decentralized matrix of “nodes” through which communication can occur with a multidirectional freedom to flow text, document, images, sound and

video of information which is neither time-bound nor spatially-restricted to change.

Knowledge Relationship Participation Development

Page 4: Information Security at the Workplace

Networked Workplace

Networked workplace is context of performance whose functional structure is made of networks of people and

connected information enabled by information and communication technology infrastructure and services.

www.facebook.com/groups/[email protected]

Page 5: Information Security at the Workplace

Networked Workplace

In the networked workplace, information comes as a critical asset being created, utilized, stored and shared. Availability, immediacy and quality of information dictates the condition of what is created, what is consumed, what is believed, what is recorded, what is known, what is decided, what is acted, and what is reused.

Document

Contacts

Conversation Records

Identity

www.facebook.com/groups/[email protected]

Page 6: Information Security at the Workplace

Networked Workplace

Being connected to the networked workplace means enabling the condition of safety and security in information

Creation Storage

Use Sharing

Safety

Security

www.facebook.com/groups/[email protected]

Page 7: Information Security at the Workplace

Networked Workplace

The information managers and workers in the networked workplace are obligated to make safe and secure the person (organization), process, data, application and infrastructure of information.

PersonProcess

DataApplication

Infrastructure

www.facebook.com/groups/[email protected]

Page 8: Information Security at the Workplace

Networked Workplace

On-lineorganization,are yourinformationsecured?

Data Privacy Cybercrime Access Availability System Integrity

https://www.youtube.com/watch?v=sdpxddDzXfE

Page 9: Information Security at the Workplace

Networked Society

On-lineorganization,are yourinformationsecured?

Access Reliability System Integrity

Secure Partially Secure

I do not Know

Data Privacy

AccessAvailability

UserControl

SystemIntegrity

Cybercrime

Page 10: Information Security at the Workplace

Networked Workplace

On-lineorganization,are yourinformationsecured?

Access Reliability System Integrity

Fully Known

PartiallyKnown

I do not Know

1. Standards & Policies

2. Physical Facility

3. Access &Identification

4. Data Processing

5. RecordsHandling

6. Computer Network

Page 11: Information Security at the Workplace

ESSENTIAL QUESTIONS

Information Security

www.facebook.com/groups/[email protected]

Page 12: Information Security at the Workplace

Cyber Security Risk Landscape

https://www.youtube.com/watch?v=fyh05k83js8

Page 13: Information Security at the Workplace

Information Security Questions…

1. Who leads, directs and controls information security?

2. What are the available and status of competencies on information security management?

3. What are the information assets?

– What are their rated confidential value, integrity metrics and availability parameters?

– What are their security risks, vulnerabilities and threats (People, Process, Data, Application, Infrastructure)?

4. What is information security policy making guidelines for the process, standards, content, format, participation, communication, implementation, monitoring and control of the covered domains of information security?

5. What is the information security plan, the agreed and subscribed methodology, standards, technology and toolkit for both proactive and reactive response to safety and security risks of information?

Page 14: Information Security at the Workplace

Information Security Question…

6. What particular procedure that everybody must know to identify the security risk of information being produced, kept, shared and re-used?

7. What particular policy that everybody must know to speak of principles and guidance of assuring confidentiality, availability and integrity in the creation, safekeeping and release of information?

8. Who is responsible in auditing the compliance of in-house and out-source develop information systems to the defined information security requirements?

9. How is the integrity of information system validated and verified?

10. How is the confidential value of information defined and assured?

11. Who investigates when information is compromised?

12. What process insures the detection of breach in confidentiality of information?

13. When do you consider information is misrepresented?

Page 15: Information Security at the Workplace

Enterprise Architecture Information Security

Questions

InformationSecurityPrinciples

InformationSecurity

Risks

Information Security

Methodology

BUSINESSFUNCTIONPROCESS

BUSINESSDATA &

APPLICATION

BUSINESSTECHNOLOGY

INFRASTRUCTURE

ENTERPRISEINFORMATION

SECURITYInformation

SecurityGovernance

NETWORKED INFORMATION SUPPLIER & CUSTOMER

www.facebook.com/groups/[email protected]

Page 16: Information Security at the Workplace

Information Security Means…

Information Security

Confidentiality

Availability

Integrity

Secrecy, Privacy and Authority

Accurate, Complete and Compliant

Accessible, Immediate and Uptime

www.facebook.com/groups/[email protected]

Page 17: Information Security at the Workplace

BUSINESS CONTEXT OF INFORMATION SECURITY

MEMBERSHIPMANAGEMENT

COLLECTIONMANAGEMENT

BENEFITSMANAGEMENT

ACCREDITATIONMANAGEMENT

payment

identificationclaims

certification

[email protected] www.facebook.com/groups/[email protected]

Page 18: Information Security at the Workplace

BUSINESS CONTEXT OF INFORMATION SECURITY

FINANCIALMANAGEMENT

PERSONNELMANAGEMENT

ASSETMANAGEMENT

LEGALMANAGEMENT

www.facebook.com/groups/[email protected]

Page 19: Information Security at the Workplace

BUSINESS CONTEXT OF INFORMATION SECURITY

AUDITMANAGEMENT

STRATEGYMANAGEMENT

RISKMANAGEMENT

PROJECTMANAGEMENT

www.facebook.com/groups/[email protected]

Page 20: Information Security at the Workplace

BUSINESS CONTEXT OF INFORMATION SECURITY

INFRASTRUCTUREMANAGEMENT

NETWORKMANAGEMENT

APPLICATIONMANAGEMENT

DATAMANAGEMENT

www.facebook.com/groups/[email protected]

Page 21: Information Security at the Workplace

[email protected]

Information Insecurity Means…

StolenMisrepresented

Breached

Information is not secure

when something is

Misused

IncompleteUnauthorized

Compromised Denied

www.facebook.com/groups/[email protected]

Page 22: Information Security at the Workplace

Information SecurityRisk Landscape…

Hacking &Cybercrime

HumanError

DataSharing& Reuse

Insider&

Third PartyThreat

PeopleAwareness

& Capability

Infrastructure& SystemStandards

Compliance

User AccessManagement

Governance& ControlManagement

UsableApplicable

Policies

Funds

Acquisition& Support

www.facebook.com/groups/[email protected]

Page 23: Information Security at the Workplace

Is government at risk?

https://www.youtube.com/watch?v=yDSni9AjX8Q

Page 24: Information Security at the Workplace

Information Security Risk Assessment

Example of Information Security Risk Assessment Template

www.facebook.com/groups/[email protected]

Page 25: Information Security at the Workplace

Information Security Compliance Checklist

[email protected]

https://www.youtube.com/watch?v=AxUzDfekIOE

Page 26: Information Security at the Workplace

Information Security Compliance Checklist

Example of Agency Information Security Compliance Checklist

www.facebook.com/groups/[email protected]

Page 27: Information Security at the Workplace

BASIC METHODS & TOOLS OF INFORMATION SECURITY

www.facebook.com/groups/[email protected]

Page 28: Information Security at the Workplace

What it means to secure information…

1. Establish the governance and management organization of information security that comply to best practice standards.

www.facebook.com/groups/[email protected]

Page 29: Information Security at the Workplace

What it means to secure information…

2. Identify the information assets, and perform the assessment of vulnerabilities and threats that surround the creation, storage, use and sharing of information.

www.facebook.com/groups/[email protected]

Page 30: Information Security at the Workplace

What it means to secure information…

3. Develop, document and implement policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability in the person, process, data, application and infrastructure of information.

www.facebook.com/groups/[email protected]

Page 31: Information Security at the Workplace

What it means to secure information…

4. Evaluate, acquire and use security management tools to classify data and risk, to audit information system, to assess and analyze risks in the solution development and infrastructure, to monitor and control areas of vulnerabilities. and implement security controls and appropriate reactive responses to threats.

www.facebook.com/groups/[email protected]

Page 32: Information Security at the Workplace

Layered Approach to Security

Policies

Physical Security

Access Control

Anti Virus and Malware

Segmentation

Device Hardening

Intrusion Defense

Awareness and Training

www.facebook.com/groups/[email protected]

Page 33: Information Security at the Workplace

Mitigating InformationSecurity Risk

Information Security

Risk Mitigation

Assessment

Policy Governance

Technology

Why Who

What How

www.facebook.com/groups/[email protected]

Page 34: Information Security at the Workplace

Security Policy Requirement

Governance

•Functional Organization

•Roles and Responsibilities

Competencies

•Knowledge, Skills and Attitudes Requirements

•Training Program and Certification

Process

•Business Workflow, Procedures and Rules

•Risk Audit and Control Procedures

Data

Infrastructure

•Acceptable Use

•Data Management•Risk Audit and Control Procedures

•Infrastructure Management

•Sourcing & Procurement

•Risk Audit and Control

GovernanceGuidance andImplementation

CompetencyReference andAssessment

FunctionsProcessModels andControlGuidance

Data and ApplicationSecurity Models andAcceptable Use

Physical ConfigurationNetwork ModelsService SourcingTrusted TechnologyAcceptable Use

No Need toReinvent the Wheel

1. Recognize security needs & question2. Find the fitted practitioner standards3. Apply standards to real life condition4. Assess and improve the practice

Governance

Competency

Process

Data

Infrastructure

[email protected]

Page 35: Information Security at the Workplace

Information Security Risk Assessment

Information Asset

Inventory

(Information Systems)

Risk Mitigation

Treatment

Prevention

Impact Rating of

Vulnerability

Identification

Vulnerability

Threat Source

1. Organization2. Process3. Data4. Application5. Infrastructure

www.facebook.com/groups/[email protected]

Page 36: Information Security at the Workplace

Information Security Plan

[email protected]

Page 37: Information Security at the Workplace

Basic Security Steps

Authorized Access

Device Integrity

Data ExchangeProtocol

Monitoring& Audit

NetworkHardening

Service Agreements

InformationSystemsSecurity

Standards

RiskAssessment& Policies

SecurityServices

UserTraining

[email protected]

Page 38: Information Security at the Workplace

Basic Security Steps

Password Anti-Malware File Cleaners Encryption Firewall Backup Network Scan

https://www.youtube.com/watch?v=eUxUUarTRW4

Page 39: Information Security at the Workplace

Thank You!Thank You!

JOHN J. [email protected]

[email protected]

0917-329-7993

www.facebook.com/groups/manageictservices