SlideShare a Scribd company logo
1 of 56
TransformingLives. InventingtheFuture. www.iit.edu
I ELLINOIS T UINS TI T
OF TECHNOLOGY
ITM 578 1
Implementing Security
Ray Trygstad
ITM 478/578
Spring 2004
Information Technology & Management Degree Programs
CenterforProfessional Development
Slides based on Whitman, M. and Mattord, H., Principles of InformationSecurity; Thomson Course Technology 2003
ITM 578 2
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives
Upon completion of this lesson the
student should be able to:
– Describe how the organization’s security
blueprint becomes a project plan
– Discuss the numerous organizational
considerations that must be addressed by
the project plan
– Discribe the significant role and
importance of the project manager in the
success of an information security project
ITM 578 3
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives
Upon completion of this lesson the
student should be able to:
– Discuss the need for professional project
management for complex projects
– Describe technical strategies and models
for implementing the project plan
– Recognize nontechnical problems that
organizations face in times of rapid
change
ITM 578 4
ILLINOIS INSTITUTE OF TECHNOLOGY
ITM 578 5
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
 In general the implementation phase is
accomplished by changing the configuration
and operation of the organization’s
information systems to make them more
secure.
 It includes changes to:
– Procedures (through policy)
– People (through training)
– Hardware (through firewalls)
– Software (through encryption)
– Data (perhaps through classification)
ITM 578 6
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
During the implementation phase,
the organization translates its
blueprint for information security
into a concrete project plan
The project plan delivers instructions
to the individuals who are executing
the implementation
ITM 578 7
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
 These instructions focus on the security
control changes needed to the hardware,
software, procedures, data, and people that
make up the organization’s information
systems
 But before a project plan can be developed,
management should have articulated and
coordinated the information security vision
and objectives involved in the execution of
the plan
ITM 578 8
ILLINOIS INSTITUTE OF TECHNOLOGY
Analyze
Physical Design
Implementa tion:
Implementing Security
Chapter 10
Logical Design
Maintain
FIG URE 10-1 Implementation Phase within the SecSDLC
Implementa tion:
Personnel & Security
Chapter 11
Implementation Phase
ITM 578 9
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
Once the organization’s vision and
objectives are documented and
understood, the blueprint can be
turned into a project plan
The major steps in executing the
project plan are:
– Planning the project
– Supervising tasks and maintaining
control
– Wrapping up the project plan
ITM 578 10
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
The project plan can be developed in
any number of ways
Each organization has to determine
its own project management
methodology for IT and information
security projects
ITM 578 11
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
Whenever possible, information
security projects should follow the
organizational practices of project
management.
If your organization does not have
clearly defined project management
practices, the following general
guidelines on project management
practices can be applied
ITM 578 12
ILLINOIS INSTITUTE OF TECHNOLOGY
Developing the Project Plan
 Creation of a detailed project plan using a
simple planning tool, such as the work
breakdown structure (WBS)
– Common task attributes are:
• Work to be accomplished (activities and deliverables)
• Individuals (or skills set) assigned to perform the task
• Start and end dates for the task (when known)
• Amount of effort required for completion in hours or
work days
• Estimated capital expenses for the task
• Estimated non-capital expenses for the task
• Other tasks on which the task depends
– Each major task is then further divided into
either smaller tasks or specific action steps
ITM 578 13
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Planning
 As the project plan is developed, adding
detail to the plan not always straightforward
 Special considerations include:
– financial
– priority
– time
– staff
– scope
– procurement
– organizational feasibility
– training and indoctrination
– change control and technology governance
ITM 578 14
ILLINOIS INSTITUTE OF TECHNOLOGY
Developing the Project Plan
Each major task is then further
divided into either smaller tasks or
specific action steps.
Key components of the project plan
are:
– Identify Work To Be Accomplished.
– Describe the skill set or individual
person needed to accomplish the task.
– Focus on determining only completion
dates for major milestones.
ITM 578 15
ILLINOIS INSTITUTE OF TECHNOLOGY
Developing the Project Plan
– Estimate the expected capital expenses
for the completion of this task, subtask,
or action item.
– Estimate the expected non-capital
expenses for the completion of the task,
subtask, or action item.
– Note wherever possible the
dependencies of other tasks or action
steps on the task or action step at hand.
ITM 578 16
ILLINOIS INSTITUTE OF TECHNOLOGY
Financial
No matter what information security
needs exist in the organization, the
amount of effort that can be expended
depends on the funds available
Cost-benefit analysis must be verified
prior to development of the project plan
ITM 578 17
ILLINOIS INSTITUTE OF TECHNOLOGY
Financial
Both public and private organizations
have budgetary constraints, albeit of a
different nature
To justify an amount budgeted for a
security project at either public or
for-profit organizations, it may be
useful to benchmark expenses of
similar organizations
ITM 578 18
ILLINOIS INSTITUTE OF TECHNOLOGY
Priority
 In general, the most important information
security controls should be scheduled first
 The implementation of controls is guided by
the prioritization of threats and the value of
the information assets threatened
 A control that costs a little more and is a
little lower on the prioritization list but
addresses many more specific vulnerabilities
and threats have higher priority than a less
expensive, higher priority component that
only addresses one particular vulnerability
ITM 578 19
ILLINOIS INSTITUTE OF TECHNOLOGY
Time and Scheduling
 Time is another constraint that has a broad
impact on the development of the project
plan
 Time can impact dozens of points in the
development of a project plan including the
following:
– time to order and receive a security control due to
backlogs of the vendor or manufacturer
– time to install and configure the control
– time to train the users
– time to realize the return on investment of the
control
ITM 578 20
ILLINOIS INSTITUTE OF TECHNOLOGY
Staffing
 The lack of enough qualified, trained, and
available personnel also constrains the
project plan
 Experienced staff is often needed to
implement available technologies and to
develop and implement policies and training
programs
 If no staff members are trained to configure
a firewall that is being purchased, someone
must be trained, or someone must be hired
who is experienced with that particular
technology
ITM 578 21
ILLINOIS INSTITUTE OF TECHNOLOGY
Scope
 It is unrealistic for an organization to install
all information security components at once
 In addition to the constraints of handling so
many complex tasks at one time, there are
the problems of interrelated conflicts
between the installation of information
security controls and the daily operations of
the organization
 The installation of new information security
controls may also conflict with existing
controls
ITM 578 22
ILLINOIS INSTITUTE OF TECHNOLOGY
Procurement
 All IT and information security planners
must consider the acquisition of goods and
services
 There are a number of constraints on the
selection process for equipment and services
in most organizations, specifically in the
selection of certain service vendors or
products from manufacturers and suppliers
 These constraints may change the specifics
of a particular technology or even eliminate
it from the realm of possibilities
ITM 578 23
ILLINOIS INSTITUTE OF TECHNOLOGY
Organizational Feasibility
Policies require time to develop and
new technologies require time to be
installed, configured, and tested
Employees need to understand how a
new program impacts their working
lives
ITM 578 24
ILLINOIS INSTITUTE OF TECHNOLOGY
Organizational Feasibility
The goal of the project plan is to avoid
new security components from directly
impacting the day-to-day operations of
the individual employees
Changes should be transparent to
users, unless the new technology
causes changes to procedures, such as
requiring additional authentication or
verification
ITM 578 25
ILLINOIS INSTITUTE OF TECHNOLOGY
Training and Indoctrination
The size of the organization and the
normal conduct of business may
preclude a single large training
program
As a result, the organization should
conduct a phased in or pilot approach
to implementation, such as “roll-out”
training for one department at a time
ITM 578 26
ILLINOIS INSTITUTE OF TECHNOLOGY
Training and Indoctrination
In the case of policies, it may be
sufficient to brief all supervisors on
new policy and then have the
supervisors update end users in
normal meetings
Ensure that compliance documents
are also distributed, requiring all
employees to read, understand, and
agree to the new policies
ITM 578 27
ILLINOIS INSTITUTE OF TECHNOLOGY
Change Control & Technology Governance
In organizations that have IT
infrastructures of significant size, the
change control and technology
governance issues become essential
ITM 578 28
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
Project management requires a unique
set of skills and a thorough
understanding of a broad body of
specialized knowledge
It is a realistic assumption that most
information security projects require a
trained project manager, CISO, or
skilled IT manager versed in project
management techniques to oversee the
project
ITM 578 29
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
In addition, when selecting advanced
or integrated technologies or
outsourced services even experienced
project managers are advised to seek
expert assistance when engaging in a
formal bidding process
ITM 578 30
ILLINOIS INSTITUTE OF TECHNOLOGY
Supervising Implementation
Some organizations may designate a
champion from general management to
supervise the implementation of the
project plan
An alternative is to designate a senior
IT manager or the CIO of the
organization to lead the
implementation
ITM 578 31
ILLINOIS INSTITUTE OF TECHNOLOGY
Supervising Implementation
The optimal solution is to designate a
suitable person from the information
security community of interest, since
the inherent focus is on the
information security needs of the
organization
It is up to each organization to find
the leadership for a successful project
implementation
ITM 578 32
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
Using negative feedback loop to control
project execution:
– Progress is measured periodically
– Measured results are compared against
expected results
– When significant deviation occurs,
corrective action taken
•When corrective action is required either the
estimate was flawed or performance has lagged
ITM 578 33
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
– When an estimate is flawed the plan should be
corrected and downstream tasks updated to reflect
the change
– When performance has lagged add resources,
lengthen the schedule, or reduce the quality or
quantity of the deliverables
•The decisions are usually expressed in terms
of trade-offs
•Often a project manager can adjust one of the
three planning parameters
ITM 578 34
ILLINOIS INSTITUTE OF TECHNOLOGY
Negative Feedback Loop
FIGURE 10-2 Negative Feedback Loop
Plan is developedPlan is developed
WorkWork
Progress is measuredProgress is measured
Corrective actionCorrective action
Complete?Complete?
Project isProject is
completecomplete
On target?On target?
YesYes
YesYes
NoNo
NoNo
ITM 578 35
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
When corrective action is required,
there are two basic situations: either
the estimate was flawed or
performance has lagged
When an estimate is flawed, for
example a faulty estimate for effort
hours is discovered, the plan should
be corrected and downstream tasks
updated to reflect the change
ITM 578 36
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
When performance has lagged, for
example due to high turnover of
skilled employees, correction is
required by adding resources,
lengthening the schedule, or by
reducing the quality or quantity of
the deliverable
ITM 578 37
ILLINOIS INSTITUTE OF TECHNOLOGY
Technical Topics of Implementation
Some parts of the implementation
process are technical in nature,
dealing with the application of
technology, while others are not,
dealing instead with the human
interface to technical systems
ITM 578 38
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
Decisions are usually expressed in
terms of trade-offs
Often a project manager can adjust
one of the three planning parameters
for the task being corrected:
– Effort and money allocated
– Elapsed time or scheduling impact
– Quality or quantity of the deliverable
ITM 578 39
ILLINOIS INSTITUTE OF TECHNOLOGY
Wrap-up
 Project wrap-up is usually handled as a
procedural task assigned to a mid-level IT or
information security manager
 These managers collect documentation,
finalize status reports, and deliver a final
report and a presentation at a wrap-up
meeting
 The goal of the wrap-up is to resolve any
pending issues, critique the overall effort of
the project, and draw conclusions about how
to improve the process for the future
ITM 578 40
ILLINOIS INSTITUTE OF TECHNOLOGY
Conversion Strategies
As the components of the new
security system are planned,
provisions must be made for the
changeover from the previous
method of performing a task to
the new methods
ITM 578 41
ILLINOIS INSTITUTE OF TECHNOLOGY
Conversion Strategies
– Direct changeover: also known as
going “cold turkey,” involves stopping
the old method and beginning the new.
– Phase implementation: the most
common approach, involves rolling out a
piece of the system across the entire
organization.
ITM 578 42
ILLINOIS INSTITUTE OF TECHNOLOGY
Conversion Strategies (continued)
– Pilot implementation: involves
implementing all security improvements
in a single office, department, or
division, and resolving issues within
that group before expanding to the rest
of the organization.
– Parallel operations: involve running
the new methods alongside the old
methods.
ITM 578 43
ILLINOIS INSTITUTE OF TECHNOLOGY
The Bull’s-Eye Model
 By reviewing the information security
blueprint and the current state of the
organization’s information security efforts
in terms of the four layers of the bulls-eye
model, project planners can find guidance
about where to lobby for expanded
information security capabilities
 This approach relies on a process of
evaluating project plans in a progression
through four layers: policy, network,
systems and applications
ITM 578 44
ILLINOIS INSTITUTE OF TECHNOLOGY
The Bull’s-Eye Model
 Use the blueprint and the current state of
information security efforts and the four
layers of the bull’s-eye model, to find
guidance about where to focus - progressing
through policy, networks, systems, and
applications.
– Sound and useable IT and information security
policy comes first
– Network controls are designed and deployed next
– Information, process, and manufacturing
systems of the organization are secured next
– Assessment and remediation of the security of
the organization’s applications is the final step
ITM 578 45
ILLINOIS INSTITUTE OF TECHNOLOGY
The Bull’s-Eye Model
FIGURE 10-3 The Bull’s-Eye Model
PoliciesPolicies
NetworksNetworks
SystemsSystems
ApplicationsApplications
ITM 578 46
ILLINOIS INSTITUTE OF TECHNOLOGY
To Outsource or Not
 Just as some organizations outsource IT
operations, organizations can outsource part
or all of their information security programs
 When an organization has outsourced IT
services, information security should be part
of the contract arrangement with the
outsourcer
 Because of the complex nature of
outsourcing, the best advice is to hire the
best outsourcing specialists, and then have
the best attorney possible negotiate and
verify the legal and technical intricacies of
the outsourcing contract
ITM 578 47
ILLINOIS INSTITUTE OF TECHNOLOGY
Technology Governance & Change Control
Other factors that determine the
success of an organization’s IT and
information security are technology
governance and change control
processes
Technology governance is a complex
process that an organization uses to
manage the impacts and costs caused
by technology implementation,
innovation, and obsolescence
ITM 578 48
ILLINOIS INSTITUTE OF TECHNOLOGY
Technology Governance & Change Control
Technology governance also
facilitates the communication about
technical advances and issues across
the organization
Medium or large organizations deal
with the impact of technical change
on the operation of the organization
through a change control process
ITM 578 49
ILLINOIS INSTITUTE OF TECHNOLOGY
Technology Governance & Change Control
 By managing the process of change:
– Improve communication about change
– Enhance coordination between organizational
groups as change is scheduled and completed
– Reduce unintended consequences by having a
process to resolve potential conflict and
disruption
– Improve quality of service as potential failures
are eliminated and groups work together
– Assure management that all groups are
complying with the organization’s policies
regarding technology governance, procurement,
accounting, and information security
ITM 578 50
ILLINOIS INSTITUTE OF TECHNOLOGY
Nontechnical Topics of Implementation
Other parts of the implementation
process are not technical in nature,
dealing with the human interface to
technical systems
These include the topics of creating a
culture of change management as well
as some considerations for
organizations facing change
ITM 578 51
ILLINOIS INSTITUTE OF TECHNOLOGY
Culture of Change
The prospect of change can cause
employees to unconsciously or
consciously resist
The stress of change can increase the
probability of mistakes or create
vulnerabilities
Resistance to change can be lowered by
building resilience for change
ITM 578 52
ILLINOIS INSTITUTE OF TECHNOLOGY
Culture of Change
One of the oldest models of making
change is the Lewin change model:
– Unfreezing: “thawing out” hard and
fast habits and established procedures.
– Moving: the transition between the old
way and the new.
– Refreezing: the integration of the new
methods into the organizational culture.
ITM 578 53
ILLINOIS INSTITUTE OF TECHNOLOGY
Considerations in Change
In order to make an organization
more amenable to change, some steps
can be taken:
– reducing resistance to change from the
beginning of the planning process
– steps taken to modify the organization
to be more accepting of change
ITM 578 54
ILLINOIS INSTITUTE OF TECHNOLOGY
Reducing Resistance
 The more ingrained the previous methods
and behaviors, the more difficult the change
 The primary mechanism used to overcome
this resistance to change is to improve the
interaction between the affected members of
the organization and the project planners in
the earlier phases of the SecSDLC
 The guideline to improve this interaction is a
three-step process:
– communicate
– educate
– involve
ITM 578 55
ILLINOIS INSTITUTE OF TECHNOLOGY
Developing Support for Change
 The best situation is an organization with a
culture that is beyond low resistance to
change but fosters resilience for change
 This resilience means the organization has
come to expect that change is a necessary
part of organizational culture, and that to
embrace change is more productive than
fighting it
 To develop such a culture the organization
must successfully accomplish many projects
that require change
ITM 578 56
ILLINOIS INSTITUTE OF TECHNOLOGY
The End…
Questions?

More Related Content

What's hot

The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1MLG College of Learning, Inc
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.pptZaheer720515
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Security models
Security models Security models
Security models LJ PROJECTS
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Securityvishnukp34
 

What's hot (20)

The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
The need for security
The need for securityThe need for security
The need for security
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Security models
Security models Security models
Security models
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 

Viewers also liked

Chapter19 rapid application development
Chapter19 rapid application developmentChapter19 rapid application development
Chapter19 rapid application developmentDhani Ahmad
 
Chap01 introduction to project management
Chap01 introduction to project managementChap01 introduction to project management
Chap01 introduction to project managementDhani Ahmad
 
Project scope management
Project scope managementProject scope management
Project scope managementDhani Ahmad
 
Chap03 the project management process groups
Chap03 the project management process groupsChap03 the project management process groups
Chap03 the project management process groupsDhani Ahmad
 
Staffing and personal management
Staffing and personal managementStaffing and personal management
Staffing and personal managementDhani Ahmad
 
Project management and information technology context
Project management and information technology contextProject management and information technology context
Project management and information technology contextDhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Chapter20 object oriented analysis and design
Chapter20 object oriented analysis and designChapter20 object oriented analysis and design
Chapter20 object oriented analysis and designDhani Ahmad
 

Viewers also liked (9)

Chapter19 rapid application development
Chapter19 rapid application developmentChapter19 rapid application development
Chapter19 rapid application development
 
Chap01 introduction to project management
Chap01 introduction to project managementChap01 introduction to project management
Chap01 introduction to project management
 
Project scope management
Project scope managementProject scope management
Project scope management
 
Chap03 the project management process groups
Chap03 the project management process groupsChap03 the project management process groups
Chap03 the project management process groups
 
Staffing and personal management
Staffing and personal managementStaffing and personal management
Staffing and personal management
 
Project management and information technology context
Project management and information technology contextProject management and information technology context
Project management and information technology context
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Chapter20 object oriented analysis and design
Chapter20 object oriented analysis and designChapter20 object oriented analysis and design
Chapter20 object oriented analysis and design
 

Similar to Implementing security

Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effortDhani Ahmad
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3MLG College of Learning, Inc
 
Подборка о рисках ИТ-проектов
Подборка о рисках ИТ-проектовПодборка о рисках ИТ-проектов
Подборка о рисках ИТ-проектовAlexey Ivasyuk
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...bikheet
 
Module 2 - IDP.pptx
Module 2 - IDP.pptxModule 2 - IDP.pptx
Module 2 - IDP.pptxRAJESH S
 
Security in DevOps_ What are the Latest Strategies and Best Practices (1).pdf
Security in DevOps_ What are the Latest Strategies and Best Practices (1).pdfSecurity in DevOps_ What are the Latest Strategies and Best Practices (1).pdf
Security in DevOps_ What are the Latest Strategies and Best Practices (1).pdfishansharma200107
 
Comparitive Analysis of Secure SDLC Models
Comparitive Analysis of Secure SDLC ModelsComparitive Analysis of Secure SDLC Models
Comparitive Analysis of Secure SDLC ModelsIRJET Journal
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
IT1204- Software Engineering - L3
IT1204- Software Engineering - L3IT1204- Software Engineering - L3
IT1204- Software Engineering - L3BakerTilly US
 
IT Project Management
IT Project ManagementIT Project Management
IT Project ManagementSravan Banka
 
Project Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptxProject Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptxStanleyChabata1
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Sessionengtsze
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4MLG College of Learning, Inc
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitTakishaPeck109
 
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxCIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxclarebernice
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTScsandit
 

Similar to Implementing security (20)

Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Подборка о рисках ИТ-проектов
Подборка о рисках ИТ-проектовПодборка о рисках ИТ-проектов
Подборка о рисках ИТ-проектов
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
Module 2 - IDP.pptx
Module 2 - IDP.pptxModule 2 - IDP.pptx
Module 2 - IDP.pptx
 
Security in DevOps_ What are the Latest Strategies and Best Practices (1).pdf
Security in DevOps_ What are the Latest Strategies and Best Practices (1).pdfSecurity in DevOps_ What are the Latest Strategies and Best Practices (1).pdf
Security in DevOps_ What are the Latest Strategies and Best Practices (1).pdf
 
Comparitive Analysis of Secure SDLC Models
Comparitive Analysis of Secure SDLC ModelsComparitive Analysis of Secure SDLC Models
Comparitive Analysis of Secure SDLC Models
 
The information security audit
The information security auditThe information security audit
The information security audit
 
IT1204- Software Engineering - L3
IT1204- Software Engineering - L3IT1204- Software Engineering - L3
IT1204- Software Engineering - L3
 
IT Project Management
IT Project ManagementIT Project Management
IT Project Management
 
Project Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptxProject Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptx
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
 
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxCIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 

More from Dhani Ahmad

Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuityDhani Ahmad
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentationsDhani Ahmad
 
Topic 11 data management
Topic 11   data managementTopic 11   data management
Topic 11 data managementDhani Ahmad
 
Topic 10 sample designs & procedures
Topic 10   sample designs & proceduresTopic 10   sample designs & procedures
Topic 10 sample designs & proceduresDhani Ahmad
 

More from Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentations
 
Topic 11 data management
Topic 11   data managementTopic 11   data management
Topic 11 data management
 
Topic 10 sample designs & procedures
Topic 10   sample designs & proceduresTopic 10   sample designs & procedures
Topic 10 sample designs & procedures
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 

Recently uploaded (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 

Implementing security

  • 1. TransformingLives. InventingtheFuture. www.iit.edu I ELLINOIS T UINS TI T OF TECHNOLOGY ITM 578 1 Implementing Security Ray Trygstad ITM 478/578 Spring 2004 Information Technology & Management Degree Programs CenterforProfessional Development Slides based on Whitman, M. and Mattord, H., Principles of InformationSecurity; Thomson Course Technology 2003
  • 2. ITM 578 2 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives Upon completion of this lesson the student should be able to: – Describe how the organization’s security blueprint becomes a project plan – Discuss the numerous organizational considerations that must be addressed by the project plan – Discribe the significant role and importance of the project manager in the success of an information security project
  • 3. ITM 578 3 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives Upon completion of this lesson the student should be able to: – Discuss the need for professional project management for complex projects – Describe technical strategies and models for implementing the project plan – Recognize nontechnical problems that organizations face in times of rapid change
  • 4. ITM 578 4 ILLINOIS INSTITUTE OF TECHNOLOGY
  • 5. ITM 578 5 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction  In general the implementation phase is accomplished by changing the configuration and operation of the organization’s information systems to make them more secure.  It includes changes to: – Procedures (through policy) – People (through training) – Hardware (through firewalls) – Software (through encryption) – Data (perhaps through classification)
  • 6. ITM 578 6 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction During the implementation phase, the organization translates its blueprint for information security into a concrete project plan The project plan delivers instructions to the individuals who are executing the implementation
  • 7. ITM 578 7 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction  These instructions focus on the security control changes needed to the hardware, software, procedures, data, and people that make up the organization’s information systems  But before a project plan can be developed, management should have articulated and coordinated the information security vision and objectives involved in the execution of the plan
  • 8. ITM 578 8 ILLINOIS INSTITUTE OF TECHNOLOGY Analyze Physical Design Implementa tion: Implementing Security Chapter 10 Logical Design Maintain FIG URE 10-1 Implementation Phase within the SecSDLC Implementa tion: Personnel & Security Chapter 11 Implementation Phase
  • 9. ITM 578 9 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management Once the organization’s vision and objectives are documented and understood, the blueprint can be turned into a project plan The major steps in executing the project plan are: – Planning the project – Supervising tasks and maintaining control – Wrapping up the project plan
  • 10. ITM 578 10 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management The project plan can be developed in any number of ways Each organization has to determine its own project management methodology for IT and information security projects
  • 11. ITM 578 11 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management Whenever possible, information security projects should follow the organizational practices of project management. If your organization does not have clearly defined project management practices, the following general guidelines on project management practices can be applied
  • 12. ITM 578 12 ILLINOIS INSTITUTE OF TECHNOLOGY Developing the Project Plan  Creation of a detailed project plan using a simple planning tool, such as the work breakdown structure (WBS) – Common task attributes are: • Work to be accomplished (activities and deliverables) • Individuals (or skills set) assigned to perform the task • Start and end dates for the task (when known) • Amount of effort required for completion in hours or work days • Estimated capital expenses for the task • Estimated non-capital expenses for the task • Other tasks on which the task depends – Each major task is then further divided into either smaller tasks or specific action steps
  • 13. ITM 578 13 ILLINOIS INSTITUTE OF TECHNOLOGY Project Planning  As the project plan is developed, adding detail to the plan not always straightforward  Special considerations include: – financial – priority – time – staff – scope – procurement – organizational feasibility – training and indoctrination – change control and technology governance
  • 14. ITM 578 14 ILLINOIS INSTITUTE OF TECHNOLOGY Developing the Project Plan Each major task is then further divided into either smaller tasks or specific action steps. Key components of the project plan are: – Identify Work To Be Accomplished. – Describe the skill set or individual person needed to accomplish the task. – Focus on determining only completion dates for major milestones.
  • 15. ITM 578 15 ILLINOIS INSTITUTE OF TECHNOLOGY Developing the Project Plan – Estimate the expected capital expenses for the completion of this task, subtask, or action item. – Estimate the expected non-capital expenses for the completion of the task, subtask, or action item. – Note wherever possible the dependencies of other tasks or action steps on the task or action step at hand.
  • 16. ITM 578 16 ILLINOIS INSTITUTE OF TECHNOLOGY Financial No matter what information security needs exist in the organization, the amount of effort that can be expended depends on the funds available Cost-benefit analysis must be verified prior to development of the project plan
  • 17. ITM 578 17 ILLINOIS INSTITUTE OF TECHNOLOGY Financial Both public and private organizations have budgetary constraints, albeit of a different nature To justify an amount budgeted for a security project at either public or for-profit organizations, it may be useful to benchmark expenses of similar organizations
  • 18. ITM 578 18 ILLINOIS INSTITUTE OF TECHNOLOGY Priority  In general, the most important information security controls should be scheduled first  The implementation of controls is guided by the prioritization of threats and the value of the information assets threatened  A control that costs a little more and is a little lower on the prioritization list but addresses many more specific vulnerabilities and threats have higher priority than a less expensive, higher priority component that only addresses one particular vulnerability
  • 19. ITM 578 19 ILLINOIS INSTITUTE OF TECHNOLOGY Time and Scheduling  Time is another constraint that has a broad impact on the development of the project plan  Time can impact dozens of points in the development of a project plan including the following: – time to order and receive a security control due to backlogs of the vendor or manufacturer – time to install and configure the control – time to train the users – time to realize the return on investment of the control
  • 20. ITM 578 20 ILLINOIS INSTITUTE OF TECHNOLOGY Staffing  The lack of enough qualified, trained, and available personnel also constrains the project plan  Experienced staff is often needed to implement available technologies and to develop and implement policies and training programs  If no staff members are trained to configure a firewall that is being purchased, someone must be trained, or someone must be hired who is experienced with that particular technology
  • 21. ITM 578 21 ILLINOIS INSTITUTE OF TECHNOLOGY Scope  It is unrealistic for an organization to install all information security components at once  In addition to the constraints of handling so many complex tasks at one time, there are the problems of interrelated conflicts between the installation of information security controls and the daily operations of the organization  The installation of new information security controls may also conflict with existing controls
  • 22. ITM 578 22 ILLINOIS INSTITUTE OF TECHNOLOGY Procurement  All IT and information security planners must consider the acquisition of goods and services  There are a number of constraints on the selection process for equipment and services in most organizations, specifically in the selection of certain service vendors or products from manufacturers and suppliers  These constraints may change the specifics of a particular technology or even eliminate it from the realm of possibilities
  • 23. ITM 578 23 ILLINOIS INSTITUTE OF TECHNOLOGY Organizational Feasibility Policies require time to develop and new technologies require time to be installed, configured, and tested Employees need to understand how a new program impacts their working lives
  • 24. ITM 578 24 ILLINOIS INSTITUTE OF TECHNOLOGY Organizational Feasibility The goal of the project plan is to avoid new security components from directly impacting the day-to-day operations of the individual employees Changes should be transparent to users, unless the new technology causes changes to procedures, such as requiring additional authentication or verification
  • 25. ITM 578 25 ILLINOIS INSTITUTE OF TECHNOLOGY Training and Indoctrination The size of the organization and the normal conduct of business may preclude a single large training program As a result, the organization should conduct a phased in or pilot approach to implementation, such as “roll-out” training for one department at a time
  • 26. ITM 578 26 ILLINOIS INSTITUTE OF TECHNOLOGY Training and Indoctrination In the case of policies, it may be sufficient to brief all supervisors on new policy and then have the supervisors update end users in normal meetings Ensure that compliance documents are also distributed, requiring all employees to read, understand, and agree to the new policies
  • 27. ITM 578 27 ILLINOIS INSTITUTE OF TECHNOLOGY Change Control & Technology Governance In organizations that have IT infrastructures of significant size, the change control and technology governance issues become essential
  • 28. ITM 578 28 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management Project management requires a unique set of skills and a thorough understanding of a broad body of specialized knowledge It is a realistic assumption that most information security projects require a trained project manager, CISO, or skilled IT manager versed in project management techniques to oversee the project
  • 29. ITM 578 29 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management In addition, when selecting advanced or integrated technologies or outsourced services even experienced project managers are advised to seek expert assistance when engaging in a formal bidding process
  • 30. ITM 578 30 ILLINOIS INSTITUTE OF TECHNOLOGY Supervising Implementation Some organizations may designate a champion from general management to supervise the implementation of the project plan An alternative is to designate a senior IT manager or the CIO of the organization to lead the implementation
  • 31. ITM 578 31 ILLINOIS INSTITUTE OF TECHNOLOGY Supervising Implementation The optimal solution is to designate a suitable person from the information security community of interest, since the inherent focus is on the information security needs of the organization It is up to each organization to find the leadership for a successful project implementation
  • 32. ITM 578 32 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan Using negative feedback loop to control project execution: – Progress is measured periodically – Measured results are compared against expected results – When significant deviation occurs, corrective action taken •When corrective action is required either the estimate was flawed or performance has lagged
  • 33. ITM 578 33 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan – When an estimate is flawed the plan should be corrected and downstream tasks updated to reflect the change – When performance has lagged add resources, lengthen the schedule, or reduce the quality or quantity of the deliverables •The decisions are usually expressed in terms of trade-offs •Often a project manager can adjust one of the three planning parameters
  • 34. ITM 578 34 ILLINOIS INSTITUTE OF TECHNOLOGY Negative Feedback Loop FIGURE 10-2 Negative Feedback Loop Plan is developedPlan is developed WorkWork Progress is measuredProgress is measured Corrective actionCorrective action Complete?Complete? Project isProject is completecomplete On target?On target? YesYes YesYes NoNo NoNo
  • 35. ITM 578 35 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan When corrective action is required, there are two basic situations: either the estimate was flawed or performance has lagged When an estimate is flawed, for example a faulty estimate for effort hours is discovered, the plan should be corrected and downstream tasks updated to reflect the change
  • 36. ITM 578 36 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan When performance has lagged, for example due to high turnover of skilled employees, correction is required by adding resources, lengthening the schedule, or by reducing the quality or quantity of the deliverable
  • 37. ITM 578 37 ILLINOIS INSTITUTE OF TECHNOLOGY Technical Topics of Implementation Some parts of the implementation process are technical in nature, dealing with the application of technology, while others are not, dealing instead with the human interface to technical systems
  • 38. ITM 578 38 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan Decisions are usually expressed in terms of trade-offs Often a project manager can adjust one of the three planning parameters for the task being corrected: – Effort and money allocated – Elapsed time or scheduling impact – Quality or quantity of the deliverable
  • 39. ITM 578 39 ILLINOIS INSTITUTE OF TECHNOLOGY Wrap-up  Project wrap-up is usually handled as a procedural task assigned to a mid-level IT or information security manager  These managers collect documentation, finalize status reports, and deliver a final report and a presentation at a wrap-up meeting  The goal of the wrap-up is to resolve any pending issues, critique the overall effort of the project, and draw conclusions about how to improve the process for the future
  • 40. ITM 578 40 ILLINOIS INSTITUTE OF TECHNOLOGY Conversion Strategies As the components of the new security system are planned, provisions must be made for the changeover from the previous method of performing a task to the new methods
  • 41. ITM 578 41 ILLINOIS INSTITUTE OF TECHNOLOGY Conversion Strategies – Direct changeover: also known as going “cold turkey,” involves stopping the old method and beginning the new. – Phase implementation: the most common approach, involves rolling out a piece of the system across the entire organization.
  • 42. ITM 578 42 ILLINOIS INSTITUTE OF TECHNOLOGY Conversion Strategies (continued) – Pilot implementation: involves implementing all security improvements in a single office, department, or division, and resolving issues within that group before expanding to the rest of the organization. – Parallel operations: involve running the new methods alongside the old methods.
  • 43. ITM 578 43 ILLINOIS INSTITUTE OF TECHNOLOGY The Bull’s-Eye Model  By reviewing the information security blueprint and the current state of the organization’s information security efforts in terms of the four layers of the bulls-eye model, project planners can find guidance about where to lobby for expanded information security capabilities  This approach relies on a process of evaluating project plans in a progression through four layers: policy, network, systems and applications
  • 44. ITM 578 44 ILLINOIS INSTITUTE OF TECHNOLOGY The Bull’s-Eye Model  Use the blueprint and the current state of information security efforts and the four layers of the bull’s-eye model, to find guidance about where to focus - progressing through policy, networks, systems, and applications. – Sound and useable IT and information security policy comes first – Network controls are designed and deployed next – Information, process, and manufacturing systems of the organization are secured next – Assessment and remediation of the security of the organization’s applications is the final step
  • 45. ITM 578 45 ILLINOIS INSTITUTE OF TECHNOLOGY The Bull’s-Eye Model FIGURE 10-3 The Bull’s-Eye Model PoliciesPolicies NetworksNetworks SystemsSystems ApplicationsApplications
  • 46. ITM 578 46 ILLINOIS INSTITUTE OF TECHNOLOGY To Outsource or Not  Just as some organizations outsource IT operations, organizations can outsource part or all of their information security programs  When an organization has outsourced IT services, information security should be part of the contract arrangement with the outsourcer  Because of the complex nature of outsourcing, the best advice is to hire the best outsourcing specialists, and then have the best attorney possible negotiate and verify the legal and technical intricacies of the outsourcing contract
  • 47. ITM 578 47 ILLINOIS INSTITUTE OF TECHNOLOGY Technology Governance & Change Control Other factors that determine the success of an organization’s IT and information security are technology governance and change control processes Technology governance is a complex process that an organization uses to manage the impacts and costs caused by technology implementation, innovation, and obsolescence
  • 48. ITM 578 48 ILLINOIS INSTITUTE OF TECHNOLOGY Technology Governance & Change Control Technology governance also facilitates the communication about technical advances and issues across the organization Medium or large organizations deal with the impact of technical change on the operation of the organization through a change control process
  • 49. ITM 578 49 ILLINOIS INSTITUTE OF TECHNOLOGY Technology Governance & Change Control  By managing the process of change: – Improve communication about change – Enhance coordination between organizational groups as change is scheduled and completed – Reduce unintended consequences by having a process to resolve potential conflict and disruption – Improve quality of service as potential failures are eliminated and groups work together – Assure management that all groups are complying with the organization’s policies regarding technology governance, procurement, accounting, and information security
  • 50. ITM 578 50 ILLINOIS INSTITUTE OF TECHNOLOGY Nontechnical Topics of Implementation Other parts of the implementation process are not technical in nature, dealing with the human interface to technical systems These include the topics of creating a culture of change management as well as some considerations for organizations facing change
  • 51. ITM 578 51 ILLINOIS INSTITUTE OF TECHNOLOGY Culture of Change The prospect of change can cause employees to unconsciously or consciously resist The stress of change can increase the probability of mistakes or create vulnerabilities Resistance to change can be lowered by building resilience for change
  • 52. ITM 578 52 ILLINOIS INSTITUTE OF TECHNOLOGY Culture of Change One of the oldest models of making change is the Lewin change model: – Unfreezing: “thawing out” hard and fast habits and established procedures. – Moving: the transition between the old way and the new. – Refreezing: the integration of the new methods into the organizational culture.
  • 53. ITM 578 53 ILLINOIS INSTITUTE OF TECHNOLOGY Considerations in Change In order to make an organization more amenable to change, some steps can be taken: – reducing resistance to change from the beginning of the planning process – steps taken to modify the organization to be more accepting of change
  • 54. ITM 578 54 ILLINOIS INSTITUTE OF TECHNOLOGY Reducing Resistance  The more ingrained the previous methods and behaviors, the more difficult the change  The primary mechanism used to overcome this resistance to change is to improve the interaction between the affected members of the organization and the project planners in the earlier phases of the SecSDLC  The guideline to improve this interaction is a three-step process: – communicate – educate – involve
  • 55. ITM 578 55 ILLINOIS INSTITUTE OF TECHNOLOGY Developing Support for Change  The best situation is an organization with a culture that is beyond low resistance to change but fosters resilience for change  This resilience means the organization has come to expect that change is a necessary part of organizational culture, and that to embrace change is more productive than fighting it  To develop such a culture the organization must successfully accomplish many projects that require change
  • 56. ITM 578 56 ILLINOIS INSTITUTE OF TECHNOLOGY The End… Questions?

Editor's Notes

  1. LEARNING OBJECTIVES: Upon completion of this material you should be able to: Understand how the organization’s security blueprint becomes a project plan Identify the main components of a project using the work breakdown structure (WBS) method Grasp the significant role and importance of the project manger in the success of an information security project Understand the need for professional project management for complex projects Identify the key elements of the bull’s-eye method as presented in this chapter Grasp the problems that organizations face in times of rapid change
  2. LEARNING OBJECTIVES: Upon completion of this material you should be able to: Understand how the organization’s security blueprint becomes a project plan Identify the main components of a project using the work breakdown structure (WBS) method Grasp the significant role and importance of the project manger in the success of an information security project Understand the need for professional project management for complex projects Identify the key elements of the bull’s-eye method as presented in this chapter Grasp the problems that organizations face in times of rapid change
  3. In general the implementation phase is accomplished by changing the configuration and operation of the organization’s information systems to make them more secure. It includes changes to: Procedures (through policy) People (through training) Hardware (through firewalls) Software (through encryption) Data (perhaps through classification)
  4. During the implementation phase, the organization translates its blueprint for information security into a concrete project plan The project plan delivers instructions to the individuals who are executing the implementation
  5. These instructions focus on the security control changes needed to the hardware, software, procedures, data, and people that make up the organization’s information systems But before a project plan can be developed, management should have articulated and coordinated the information security vision and objectives involved in the execution of the plan
  6. Introduction Implementation is accomplished through translating its blueprint into a concrete project plan including changes to: Procedures (through policy) People (through training) Hardware (through firewalls) Software (through encryption) Data (perhaps through classification) But before a project plan can be developed, management should have articulated and coordinated the information security vision and objectives involved in the execution of the plan
  7. Project Management In the Implementation Phase Once the organization’s vision and objectives are documented and understood, the processes for translating the blueprint into a project plan can be defined. Organizational change is not easily accomplished. The major steps in executing the project plan are: Planning the project Supervising tasks and action steps within the project plan Wrapping up the project plan The project plan can be developed in any number of ways. Each organization has to determine its own project management methodology for IT and information security projects. Whenever possible, information security projects should follow the organizational practices of project management. If your organization does not have clearly defined project management practices, the following general guidelines on project management practices can be applied.
  8. The project plan can be developed in any number of ways Each organization has to determine its own project management methodology for IT and information security projects
  9. Whenever possible, information security projects should follow the organizational practices of project management. If your organization does not have clearly defined project management practices, the following general guidelines on project management practices can be applied
  10. Developing the Project Plan Planning for the implementation phase involves the creation of a detailed project plan. The creation of the project plan can be accomplished using a simple planning tool, such as the work breakdown structure (WBS). Common task attributes are: Work to be accomplished (activities and deliverables) Individuals (or skills set) assigned to perform the task Start and end dates for the task (when known) Amount of effort required for completion in hours or work days Estimated capital expenses for the task Estimated non-capital expenses for the task Other tasks on which the task depends Each major task is then further divided into either smaller tasks or specific action steps. Key components of the project plan are: Identify Work To Be Accomplished. Describe the skill set or individual person needed to accomplish the task. Focus on determining only completion dates for major milestones. Estimate the expected capital expenses for the completion of this task, subtask, or action item. Estimate the expected non-capital expenses for the completion of the task, subtask, or action item. Note wherever possible the dependencies of other tasks or action steps on the task or action step at hand.
  11. Project Planning Considerations As the project plan is developed, adding detail to the plan is not always straightforward. Special considerations include: financial, priority, time, staff, scope, procurement, organizational feasibility, training and indoctrination and change control and technology governance
  12. Financial Considerations No matter what information security needs exist in the organization, the amount of effort that can be expended depends on the funds available. A cost-benefit analysis prepared earlier in the life cycle, must be verified prior to development of the project plan. In many organizations, the information security budget is a subsection of the overall IT budget. In others, information security is a separate budget category that may have parity with the IT budget.
  13. Both public and private organizations have budgetary constraints, albeit of a different nature. To justify an amount budgeted for a security project at either public or for-profit organizations, it may be useful to benchmark expenses of similar organizations.
  14. Priority Considerations In general, the most important information security controls should be scheduled first. The implementation of controls is guided by the prioritization of threats and the value of the information assets threatened. A control that costs a little more and is a little lower on the prioritization list but addresses many more specific vulnerabilities and threats have higher priority than a less expensive, higher priority component that only addresses one particular vulnerability.
  15. Time and Scheduling Considerations Time is another constraint that has a broad impact on the development of the project plan. Time can impacts dozens of points in the development of a project plan including the following: time to order and receive a security control due to backlogs of the vendor or manufacturer; time to install and configure the control; time to train the users; and time to realize the return on investment of the control.
  16. Staffing Considerations The lack of enough qualified, trained, and available personnel also constrains the project plan. Experienced staff is often needed to implement available technologies and to develop and implement policies and training programs. If no staff members are trained to configure a firewall that is being purchased, someone must be trained, or someone must be hired who is experienced with that particular technology.
  17. Scope Considerations It is unrealistic for an organization to install all information security components at once. The project plan should not attempt to implement the entire security system at one time. In addition to the constraints of handling so many complex tasks at one time, there are the problems of interrelated conflicts between the installation of information security controls and the daily operations of the organization. The installation of new information security controls may also conflict with existing controls.
  18. Procurement Considerations All IT and information security planners must consider the acquisition of goods and services. There are a number of constraints on the selection process for equipment and services in most organizations, specifically in the selection of certain service vendors or products from manufacturers and suppliers. These constraints may change the specifics of a particular technology or even eliminate it from the realm of possibilities.
  19. Organizational Feasibility Considerations Policies require time to develop and new technologies require time to be installed, configured, and tested. Employees need to understand how a new infosec program impacts their working lives. The goal of the project plan is to avoid new security components from directly impacting the day-to-day operations of the individual employees. This means that changes should be transparent to systems users, unless the new technology causes changes to procedures, such as requiring additional authentication or verification.
  20. Training and Indoctrination Considerations The size of the organization and the normal conduct of business may preclude a single large training program on security procedures or technologies. As a result, the organization should conduct a phased in or pilot approach to implementation, such as “roll-out” training for one department at a time.
  21. In the case of policies, it may be sufficient to brief all supervisors on new policy and then have the supervisors update end users in normal meetings. Ensure that compliance documents are also distributed, requiring all employees to read, understand, and agree to the new policies.
  22. Change Control and Technology Governance Considerations In organizations that have IT infrastructures of significant size, the change control and technology governance issues become essential.
  23. The Need for Project Management Project management requires a unique set of skills and a thorough understanding of a broad body of specialized knowledge. It is a realistic assumption that most information security projects require a trained project manager, CISO, or skilled IT manager versed in project management techniques to oversee the project.
  24. In addition, when selecting advanced or integrated technologies or outsourced services even experienced project managers are advised to seek expert assistance when engaging in a formal bidding process.
  25. Supervising Implementation Some organizations may designate a champion from general management to supervise the implementation of the project plan for security information. An alternative is to designate a senior IT manager or the CIO of the organization to lead the implementation.
  26. The optimal solution is to designate a suitable person from the information security community of interest, since the inherent focus is on the information security needs of the organization. In the final analysis, it is up to each organization to find the leadership for a successful project implementation that best suits its specific needs and the personalities and politics of the organizational culture.
  27. Executing the Plan Once a project is underway, it is managed to completion using a process known as a negative feedback loop or cybernetic loop, which ensures that progress is measured periodically. The measured results are compared against expected results. When significant deviation occurs, corrective action is taken to bring the task that is deviating from plan back into compliance with the projection, or else the estimate is revised in light of new information. When corrective action is required, there are two basic situations: either the estimate was flawed or performance has lagged.
  28. When an estimate is flawed, for example a faulty estimate for effort hours is discovered, the plan should be corrected and downstream tasks updated to reflect the change. When performance has lagged, for example due to high turnover of skilled employees, correction is required by adding resources, lengthening the schedule, or by reducing the quality or quantity of the deliverable. The decisions are usually expressed in terms of trade-offs. Often a project manager can adjust one of the three planning parameters for the task being corrected: 1.Effort and money allocated 2.Elapsed time or scheduling impact 3.Quality or quantity of the deliverable
  29. Technical Topics Of Implementation Some parts of the implementation process are technical in nature, dealing with the application of technology, while others are not, dealing instead with the human interface to technical systems.
  30. Wrap-up Project wrap-up is usually handled as a procedural task assigned to a mid-level IT or information security manager. These managers collect documentation, finalize status reports, and deliver a final report and a presentation at a wrap-up meeting. The goal of the wrap-up is to resolve any pending issues, critique the overall effort of the project, and draw conclusions about how to improve the process for the future.
  31. Conversion Strategies As the components of the new security system are planned, provisions must be made for the changeover from the previous method of performing a task to the new methods. 1. Direct changeover: Also known as going “cold turkey,” involves stopping the old method and beginning the new. 2. Phase implementation: the most common approach, involves rolling out a piece of the system across the entire organization. 3. Pilot implementation: involves implementing all security improvements in a single office, department, or division, and resolving issues within that group before expanding to the rest of the organization. 4. Parallel operations: involve running the new methods alongside the old methods.
  32. The Bull’s-eye Model for InfoSec Project Planning By reviewing the information security blueprint and the current state of the organization’s information security efforts in terms of the four layers of the bulls-eye model, project planners can find guidance about where to lobby for expanded information security capabilities. This approach relies on a process of evaluating project plans in a progression through four layers: policy, network, systems and applications. The bull’s-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan, meaning that: Until sound and useable IT and information security policy is developed, communicated, and enforced, no additional resources should be spent on other controls. Until effective network controls are designed and deployed, all resources should be spent to achieve that goal. After policy and network controls are implemented, implementation should focus on the information, process, and manufacturing systems of the organization. Once there is assurance that policy is in place, networks are secure, and systems are safe, attention should move to the assessment and remediation of the security of the organization’s applications.
  33. To Outsource or Not Just as some organizations outsource IT operations, so too can organizations outsource part of or all of their information security programs. When an organization has outsourced IT services, information security should be part of the contract arrangement with the outsourcer. Because of the complex nature of outsourcing, the best advice is to hire the best outsourcing specialists, and then have the best attorney possible negotiate and verify the legal and technical intricacies of the outsourcing contract.
  34. Non-Technical Topics Of Implementation Other parts of the implementation process are not technical in nature, dealing with the human interface to technical systems. These include the topics of creating a culture of change management as well as a some considerations for organizations facing change.
  35. The Culture of Change Management In any major project, the prospect of change, the familiar shifting to the unfamiliar, can cause employees to unconsciously or consciously resist. Even when employees embrace changes, the stress of making changes and adjusting to the new procedures can increase the probability of mistakes or create vulnerabilities in the system. By understanding and applying some of the basic tenets of change management, the resistance to change can be lowered, and you can even build resilience for changes, making ongoing change more palatable to the entire organization.
  36. One of the oldest models of making change is the Lewin change model , which consists of: Unfreezing: “thawing out” hard and fast habits and established procedures. Moving: the transition between the old way and the new. Refreezing: the integration of the new methods into the organizational culture, by creating an atmosphere in which the changes are accepted as the preferred way of accomplishing the requisite tasks.
  37. Considerations for Organizational Change In order to make an organization more amenable to change, some steps can be taken. This includes reducing resistance to change fro the beginning of the planning process and steps taken to modify the organization to be more accepting of change.
  38. Reducing Resistance to Change from the Start The level of resistance to change impacts the ease with which an organization works through the process described. The more ingrained the previous methods and behaviors, the more difficult the change. The primary mechanism used to overcome this resistance to change is to improve the interaction between the affected members of the organization and the project planners in the earlier phases of the SecSDLC. The guideline to improve this interaction is a three-step process: communicate, educate, and involve.
  39. Reducing Resistance to Change from the Start The level of resistance to change impacts the ease with which an organization works through the process described. The more ingrained the previous methods and behaviors, the more difficult the change. The primary mechanism used to overcome this resistance to change is to improve the interaction between the affected members of the organization and the project planners in the earlier phases of the SecSDLC. The guideline to improve this interaction is a three-step process: communicate, educate, and involve.