SlideShare a Scribd company logo
1 of 28
Download to read offline
What is Network Security?
 consists of the provisions
and policies adopted by the network
administrator to prevent and
monitor unauthorized access, misuse, m
odification, or denial of the computer
network and network-accessible
resources.
Security Challenges
 Computer Security Institute (CSI)
 Survey: over 70% networks have
experienced security breach
 From the 70%, 60% have undergone
internal breaches and only 40% are
external or perimeter breaches.
2 Main reasons why security has
became more important as an issue
over time
 The hacking and attack tools have
become more and more
dangerous, where an attack can cause
serious financial damage to a company
 The hacking and attack tools have
become easier to use- in most
cases, they are automated, allowing
even a novice to use them.
Security Roles
 Have changed over the years
 In the past networks were closed to the
outside world, thus attack didn’t cause
much damage
 Mid 1990s, Internet has exploded which
increases the possibility of security
breach
Security Issues
 Security is a business problem not just a
technology problem
 The concept of security is an illusion
 Managing security means managing the
perception of others
 There are many different security
technologies to choose from
 You must create a comprehensive
security policy
Security Goals
 Create and implement a
single, cohesive, company-wide security
policy
 Don’t allow products to dictate security
policies – policies should drive the
products that you choose
 Centralize security management
Security Components
Security is a relative or subjective problem
 Authentication
 Authorization
 Privacy
 Integrity
 Availability
 Nonrepudiation
 Accounting
Authentication
 Verifying a person’s identity (who they
are)
Authorization
 Controlling access to resources (what
they are trying to do)
Privacy
 Protecting confidentiality of information
(what the content of the information is)
Integrity
 Validating that information was not
changed (verifying that the information
that was received has not been modified
or tampered with)
Availability
 Providing redundancy for security
(ensuring that you have a fallback
solution in the event of failure or security
compromise)
Nonrepudiation
 Proving that a transaction took place
between two entities (when using online
transactions, having verifiable proof that
the transaction took place between 2
entities)
Accounting
 Recording information about an
employee’s actions when interacting
with data and systems as well as
information about the operation
(including security events) of your
networking devices
Data Classification for
Public/Government Agencies
 Unclassified data
- data has few or no confidentiality
requirements.
 Sensitive but unclassified (SBU) data
- data could prove embarrassing if
revealed, but no serious security breach
would occur.
 Confidential data
- Lowest level of classified data, where data
protection must meet confidentiality
requirements
Data Classification for
Public/Government Agencies
 Secret data
- A significant effort must be made to
secure data, limiting access to a small
number of people
 Top Secret data
- Great effort and cost is used to secure
data, limiting access to a very small
number of people (need to know access)
Data Classification for private
companies or nongovernment
 Public data - data is publicly
available, as on a website
 Sensitive data - similar to SBU
 Private data – data is important to a
company; an effort must be made to
secure it and verify that it is accurate
 Confidential data – data is very
important to a company, like trade
secrets and employee records
Classification Criteria
 Value
 Personal Association
 Age
 Useful Life
Classification Procedures
 Who is responsible for the data?
 How should the information be
classified, with any exceptions?
 How are the controls used for
classification policies?
 When and how does declassification of
data occur?
Classification Roles
Role Description Performed By
Owner Is ultimately responsible for the
data
Typically a member of the
management staff
Custodian Is responsible for the security of
the data on a day-to-day basis
Typically a member of the IT
staff
User Is responsible for using the data
according to defined policies
and operating procedures
Your typical user, who can
“see the trees, but not the
forest” in the company and
who has a ground-level view
of certain data
Security Controls
 Preventive – used to prevent a data
compromise
 Deterrent – used to scare away a certain
number of ill-doers
 Detective – used to detect access to
data
3 Categories that control the
implementation of the security control
 Administrative – policy and procedural
controls
 Technical – electronics, hardware, and
software controls
 Physical – mechanical controls
Security Breaches: Prosecuting
attackers and hackers
 Motive
 Why did they do it?
 Opportunity
 Were they available to commit the crime?
 Means
 Did they have the capability to commit the
crime?
Liability: Legal and
Governmental Issues
 A company should practice due
diligence and due care when protecting
sensitive data and resources.
 A company can be sued by its
customers or employees if a breach on
sensitive data happens
 Deal with government laws that
requiring a minimal security level when
protecting certain resources.
On the Job
 Examine security in your network from
endpoint to endpoint, from where traffic
enters your network, to where your
users connect (switches, access
points, and remote access VPN
gateways)
 Select a product solution that focuses on
end-to-end security
Questions
 What are the benefits that an
organization would get from properly
classifying data?
 Research about the 10 commandments
of computer ethics by the Computer
Ethics Institute
01-introductiontosecurity-111122004432-phpapp02.pdf

More Related Content

Similar to 01-introductiontosecurity-111122004432-phpapp02.pdf

AgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docxAgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docxdaniahendric
 
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptxIAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptxAngela Arago
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPiBits
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 

Similar to 01-introductiontosecurity-111122004432-phpapp02.pdf (20)

Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
AgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docxAgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docx
 
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptxIAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
 
Information security
Information securityInformation security
Information security
 
Overview
OverviewOverview
Overview
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

01-introductiontosecurity-111122004432-phpapp02.pdf

  • 1.
  • 2. What is Network Security?  consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, m odification, or denial of the computer network and network-accessible resources.
  • 3. Security Challenges  Computer Security Institute (CSI)  Survey: over 70% networks have experienced security breach  From the 70%, 60% have undergone internal breaches and only 40% are external or perimeter breaches.
  • 4. 2 Main reasons why security has became more important as an issue over time  The hacking and attack tools have become more and more dangerous, where an attack can cause serious financial damage to a company  The hacking and attack tools have become easier to use- in most cases, they are automated, allowing even a novice to use them.
  • 5. Security Roles  Have changed over the years  In the past networks were closed to the outside world, thus attack didn’t cause much damage  Mid 1990s, Internet has exploded which increases the possibility of security breach
  • 6. Security Issues  Security is a business problem not just a technology problem  The concept of security is an illusion  Managing security means managing the perception of others  There are many different security technologies to choose from  You must create a comprehensive security policy
  • 7. Security Goals  Create and implement a single, cohesive, company-wide security policy  Don’t allow products to dictate security policies – policies should drive the products that you choose  Centralize security management
  • 8. Security Components Security is a relative or subjective problem  Authentication  Authorization  Privacy  Integrity  Availability  Nonrepudiation  Accounting
  • 9. Authentication  Verifying a person’s identity (who they are)
  • 10. Authorization  Controlling access to resources (what they are trying to do)
  • 11. Privacy  Protecting confidentiality of information (what the content of the information is)
  • 12. Integrity  Validating that information was not changed (verifying that the information that was received has not been modified or tampered with)
  • 13. Availability  Providing redundancy for security (ensuring that you have a fallback solution in the event of failure or security compromise)
  • 14. Nonrepudiation  Proving that a transaction took place between two entities (when using online transactions, having verifiable proof that the transaction took place between 2 entities)
  • 15. Accounting  Recording information about an employee’s actions when interacting with data and systems as well as information about the operation (including security events) of your networking devices
  • 16. Data Classification for Public/Government Agencies  Unclassified data - data has few or no confidentiality requirements.  Sensitive but unclassified (SBU) data - data could prove embarrassing if revealed, but no serious security breach would occur.  Confidential data - Lowest level of classified data, where data protection must meet confidentiality requirements
  • 17. Data Classification for Public/Government Agencies  Secret data - A significant effort must be made to secure data, limiting access to a small number of people  Top Secret data - Great effort and cost is used to secure data, limiting access to a very small number of people (need to know access)
  • 18. Data Classification for private companies or nongovernment  Public data - data is publicly available, as on a website  Sensitive data - similar to SBU  Private data – data is important to a company; an effort must be made to secure it and verify that it is accurate  Confidential data – data is very important to a company, like trade secrets and employee records
  • 19. Classification Criteria  Value  Personal Association  Age  Useful Life
  • 20. Classification Procedures  Who is responsible for the data?  How should the information be classified, with any exceptions?  How are the controls used for classification policies?  When and how does declassification of data occur?
  • 21. Classification Roles Role Description Performed By Owner Is ultimately responsible for the data Typically a member of the management staff Custodian Is responsible for the security of the data on a day-to-day basis Typically a member of the IT staff User Is responsible for using the data according to defined policies and operating procedures Your typical user, who can “see the trees, but not the forest” in the company and who has a ground-level view of certain data
  • 22. Security Controls  Preventive – used to prevent a data compromise  Deterrent – used to scare away a certain number of ill-doers  Detective – used to detect access to data
  • 23. 3 Categories that control the implementation of the security control  Administrative – policy and procedural controls  Technical – electronics, hardware, and software controls  Physical – mechanical controls
  • 24. Security Breaches: Prosecuting attackers and hackers  Motive  Why did they do it?  Opportunity  Were they available to commit the crime?  Means  Did they have the capability to commit the crime?
  • 25. Liability: Legal and Governmental Issues  A company should practice due diligence and due care when protecting sensitive data and resources.  A company can be sued by its customers or employees if a breach on sensitive data happens  Deal with government laws that requiring a minimal security level when protecting certain resources.
  • 26. On the Job  Examine security in your network from endpoint to endpoint, from where traffic enters your network, to where your users connect (switches, access points, and remote access VPN gateways)  Select a product solution that focuses on end-to-end security
  • 27. Questions  What are the benefits that an organization would get from properly classifying data?  Research about the 10 commandments of computer ethics by the Computer Ethics Institute