SlideShare a Scribd company logo
1 of 35
Chapter 5 Maintaining Security of Operations
Objectives ,[object Object],[object Object],[object Object]
Security of Operations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Aims: Aligning Purpose with Practice ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Aims: Aligning Purpose with Practice ,[object Object],[object Object]
Threat Response: Keeping the Organization on Its Toes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Staying Alert: Elements of the Operational Security Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sensing: Understanding the Threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sensing: Understanding the Threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Analyzing: Making Smart Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Responding: Ensuring a Disciplined Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Managing: Maintaining an Effective Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation: Setting Up the Security of Operations Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Planning ,[object Object]
Steps for a Secure Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anticipating Potential Incidents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working with Active Incidents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ensuring Continuing Integrity: Configuration Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human-based: Configuration Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human-based: Configuration Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human-based: Configuration Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Housekeeping ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparing an Operational Procedure Manual ,[object Object],[object Object],[object Object],[object Object],[object Object]
Managing Security Patches ,[object Object],[object Object],[object Object],[object Object]
Back Up Your Data, Back Up Your Job ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enforcing Personal Security Discipline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Maintaining Your Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Making Your Software Behave ,[object Object],[object Object],[object Object],[object Object]
Watching Your Back ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disposing of Assets in a Secure Manner ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Locking Down Electronic Office Systems ,[object Object],[object Object],[object Object],[object Object]
Defining Good Security Practice for an E-Mail System ,[object Object],[object Object]

More Related Content

What's hot

Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-PracticesMarco Raposo
 
Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Nicole Valerio
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2 Jayant Dalvi
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
 
HIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesHIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesCole Libby
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleDonald E. Hester
 
Security
SecuritySecurity
Securitya1aass
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Donald E. Hester
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...Dr. Rosemarie Sibbaluca-Guirre
 
MIS 22 Disaster Management
MIS 22 Disaster ManagementMIS 22 Disaster Management
MIS 22 Disaster ManagementTushar B Kute
 

What's hot (20)

Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
IS audit checklist
IS audit checklistIS audit checklist
IS audit checklist
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Chapter003
Chapter003Chapter003
Chapter003
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
HIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesHIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician Practices
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 
Security
SecuritySecurity
Security
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
 
MIS 22 Disaster Management
MIS 22 Disaster ManagementMIS 22 Disaster Management
MIS 22 Disaster Management
 

Viewers also liked (20)

Goods receiving process1
Goods receiving process1Goods receiving process1
Goods receiving process1
 
Receiving Controls
Receiving ControlsReceiving Controls
Receiving Controls
 
Receiving Procedures Template 001_Show
Receiving Procedures Template 001_ShowReceiving Procedures Template 001_Show
Receiving Procedures Template 001_Show
 
Honey
HoneyHoney
Honey
 
Henz new
Henz newHenz new
Henz new
 
ISM424 RM
ISM424 RMISM424 RM
ISM424 RM
 
Chapter006
Chapter006Chapter006
Chapter006
 
01 Introduction
01 Introduction01 Introduction
01 Introduction
 
Basic operating procedure – haveli kitchen
Basic operating procedure – haveli kitchenBasic operating procedure – haveli kitchen
Basic operating procedure – haveli kitchen
 
02 Computer Evolution And Performance
02  Computer  Evolution And  Performance02  Computer  Evolution And  Performance
02 Computer Evolution And Performance
 
Introduction to credit control
Introduction to credit controlIntroduction to credit control
Introduction to credit control
 
Credit control tips
Credit control tipsCredit control tips
Credit control tips
 
All about housekeeeping
All about housekeeepingAll about housekeeeping
All about housekeeeping
 
abc
abcabc
abc
 
02 computer evolution and performance
02 computer evolution and performance02 computer evolution and performance
02 computer evolution and performance
 
Powerpoint Exercise 2
Powerpoint Exercise 2Powerpoint Exercise 2
Powerpoint Exercise 2
 
03 Buses
03 Buses03 Buses
03 Buses
 
10 Instruction Sets Characteristics
10  Instruction  Sets Characteristics10  Instruction  Sets Characteristics
10 Instruction Sets Characteristics
 
Training Manual and SOP
Training Manual and SOPTraining Manual and SOP
Training Manual and SOP
 
Simple example of a photo based SOP
Simple example of a photo based SOPSimple example of a photo based SOP
Simple example of a photo based SOP
 

Similar to Chapter005

Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and ResponsibilitiesMahesh Hiremath
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and ResponsibilitiesMahesh Hiremath
 
LEADERSHIP for DRIVING SAFETY OUTCOMES
LEADERSHIP for DRIVING SAFETY OUTCOMESLEADERSHIP for DRIVING SAFETY OUTCOMES
LEADERSHIP for DRIVING SAFETY OUTCOMESLloyd Hanson
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and ResponsibilitiesMahesh Hiremath
 
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk ManagementFISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Managementdanphilpott
 
Health and Safety Management System
Health and Safety Management SystemHealth and Safety Management System
Health and Safety Management SystemSam Woodhouse
 
Safety System Process
Safety System ProcessSafety System Process
Safety System ProcessEdward Jones
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1wallstreet1
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1wallstreet1
 
Access Controls Capability Maturity Model (CMM).pptx
Access Controls Capability Maturity Model (CMM).pptxAccess Controls Capability Maturity Model (CMM).pptx
Access Controls Capability Maturity Model (CMM).pptxComplianceSPE
 
Risk management in pharmaceutical Industry
Risk management in pharmaceutical IndustryRisk management in pharmaceutical Industry
Risk management in pharmaceutical IndustryMahesh shinde
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfpriyanshamadhwal2
 
Hpe program rating #1 con ops
Hpe program rating #1 con opsHpe program rating #1 con ops
Hpe program rating #1 con opsPMHaas
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Security-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptxSecurity-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptxMuhammadAbdullah311866
 

Similar to Chapter005 (20)

Chapter004
Chapter004Chapter004
Chapter004
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and Responsibilities
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and Responsibilities
 
LEADERSHIP for DRIVING SAFETY OUTCOMES
LEADERSHIP for DRIVING SAFETY OUTCOMESLEADERSHIP for DRIVING SAFETY OUTCOMES
LEADERSHIP for DRIVING SAFETY OUTCOMES
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and Responsibilities
 
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk ManagementFISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
 
Leadership Performance in Safety Management Systems.pdf
Leadership Performance in Safety Management Systems.pdfLeadership Performance in Safety Management Systems.pdf
Leadership Performance in Safety Management Systems.pdf
 
Health and Safety Management System
Health and Safety Management SystemHealth and Safety Management System
Health and Safety Management System
 
Safety System Process
Safety System ProcessSafety System Process
Safety System Process
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1
 
Access Controls Capability Maturity Model (CMM).pptx
Access Controls Capability Maturity Model (CMM).pptxAccess Controls Capability Maturity Model (CMM).pptx
Access Controls Capability Maturity Model (CMM).pptx
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Risk management in pharmaceutical Industry
Risk management in pharmaceutical IndustryRisk management in pharmaceutical Industry
Risk management in pharmaceutical Industry
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
 
Hpe program rating #1 con ops
Hpe program rating #1 con opsHpe program rating #1 con ops
Hpe program rating #1 con ops
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Security-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptxSecurity-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptx
 

More from Jeanie Delos Arcos (16)

105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt
 
Pentium II
Pentium IIPentium II
Pentium II
 
Celeron
CeleronCeleron
Celeron
 
80486
8048680486
80486
 
Pentium 3
Pentium 3Pentium 3
Pentium 3
 
07 Input Output
07  Input  Output07  Input  Output
07 Input Output
 
06 External Memory
06  External  Memory06  External  Memory
06 External Memory
 
08 Operating System Support
08  Operating  System  Support08  Operating  System  Support
08 Operating System Support
 
05 Internal Memory
05  Internal  Memory05  Internal  Memory
05 Internal Memory
 
09 Arithmetic
09  Arithmetic09  Arithmetic
09 Arithmetic
 
04 Cache Memory
04  Cache  Memory04  Cache  Memory
04 Cache Memory
 
Taralets
TaraletsTaralets
Taralets
 
six part invention
six part inventionsix part invention
six part invention
 
Accidentally InLove
Accidentally InLoveAccidentally InLove
Accidentally InLove
 
Like A Virgin
Like A VirginLike A Virgin
Like A Virgin
 
Awit sa mga Bata
Awit sa mga BataAwit sa mga Bata
Awit sa mga Bata
 

Chapter005

  • 1. Chapter 5 Maintaining Security of Operations
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.