MUKESH CHINTA
ASST PROF, CSE, VRSEC
CISCO NETACAD
INSTRUCTOR
Chapter 2:
The Cybersecurity Cube
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2
Chapter 2:
The Cybersecurity Cube
Cybersecurity Essentials v1.1
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2 - Sections & Objectives
2.1 The Cybersecurity Cube
Describe the three dimensions of the McCumber Cube.
2.2 CIA TRIAD
Describe the principles of confidentiality, integrity, and availability.
2.3 States of Data
Differentiate the three states of data.
2.4 Cybersecurity Countermeasures
Compare the types of cybersecurity countermeasures.
2.5 IT Security Management Framework
Describe the ISO Cybersecurity Model
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
2.1 The Three Dimensions of
the Cybersecurity Cube
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Three Dimensions of the Cybersecurity Cube
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 The first dimension of the cybersecurity cube identifies the goals to protect
cyberspace. The goals identified in the first dimension are the foundational
principles. These three principles are confidentiality, integrity and availability.
prevents the disclosure of information to unauthorized people,
resources, or processes. refers to the accuracy, consistency, and
trustworthiness of data. Finally, ensures that information is accessible by
authorized users when needed. (CIA Triad)
 The second dimension of the Cybersecurity Cube focuses on the problems of
protecting all of the in cyberspace. Data has three possible states:
Data in transit, Data at rest or in storage and Data in process.
 The third dimension of the Cybersecurity Cube identifies the three types of
powers used to protect the cyber world. The three types of powers of:
- devices, and products available to protect information systems
and fend off cyber criminals.
- procedures, and guidelines that enable the citizens of the
cyber world to stay safe and follow good practices.
- Aware and knowledgeable about their world and the dangers that
threaten their world.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7
2.2 CIA TRIAD
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The concept of AAA is similar to using a credit card
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Confidentiality and privacy seem interchangeable, but from a
legal standpoint, they mean different things.
⁂ Most privacy data is confidential, but not all confidential data is private.
Access to confidential information occurs after confirming proper
authorization. Financial institutions, hospitals, medical professionals,
law firms, and businesses handle confidential information.
⁂ Confidential information has a non-public status. Maintaining
confidentiality is more of an ethical duty.
⁂ Privacy is the appropriate use of data. When organizations collect
information provided by customers or employees, they should only use
that data for its intended purpose.
⁂ Policies are the best way for an organization to comply with the growing
number of privacy related laws. Policies enable organizations to enforce
specific rules, procedures, and processes when collecting, storing, and
sharing data.
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrity Checks
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
One of the most popular high availability practices is five nines. The five
nines refer to 99.999%. This means that downtime is less than 5.26 minutes
per year.
Organizations can ensure availability by implementing the following:
Equipment maintenance
OS and system updates
Test backups
Plan for disasters
Implement new technologies
Monitor unusual activity
Test to verify availability
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18
2.3 States of Data
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
. Data at rest means that a type of storage device
retains the data when no user or process is using it.
 A storage device can be local (on a computing device) or centralized (on the network).
A number of options exist for storing data.
is storage connected to a computer. A hard drive or
USB flash drive is an example of direct-attached storage.
uses multiple hard drives in an array,
which is a method of combining multiple disks so that the operating system sees them
as a single disk. RAID provides improved performance and fault tolerance.
 A device is a storage device connected to a network
that allows storage and retrieval of data from a centralized location by authorized
network users. NAS devices are flexible and scalable, meaning administrators can
increase the capacity as needed.
 A architecture is a network-based storage system. SAN
systems connect to the network using high-speed interfaces allowing improved
performance and the ability to connect multiple servers to a centralized disk storage
repository.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 The third state of data is . This refers to data during initial
input, modification, computation, or output.
 Protection of data integrity starts with the initial input of data.
 Organizations use several methods to collect data, such as manual data
entry, scanning forms, file uploads, and data collected from sensors. Each of
these methods pose potential threats to data integrity.
refers to any changes to the original data such as users
manually modifying data, programs processing and changing data, and
equipment failing resulting in data modification.
 Processes like encoding/decoding, compression/decompression and
encryption/decryption are all examples of data modification.
 Malicious code also results in data corruption. also occurs
during the data output process. Data output refers to outputting data to
printers, electronic displays or directly to other devices. The accuracy of
output data is critical because output provides information and influences
decision-making.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Data transmission involves sending information from one device to another.
There are numerous methods to transmit information between devices including:
– uses removable media to physically move data from one
computer to another
– uses cables to transmit data
– uses the airwaves to transmit data
 The protection of transmitted data is one of the most challenging jobs of a
cybersecurity professional. The greatest challenges are:
- cyber criminals can capture, save and steal
data in-transit.
- cyber criminals can intercept and alter data in-
transit.
- cyber criminals can use rogue or unauthorized
devices to interrupt data availability.
 Protecting the confidentiality, integrity, and availability of transmitted data is
one of the most important responsibilities of a cybersecurity professional.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22
2.4 Cybersecurity
Countermeasures
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Technologies
- Software safeguards include programs
and services that protect operating systems, databases, and other services
operating on workstations, portable devices, and servers. There are several
software-based technologies used to safeguard an organization’s assets.
 Software firewalls control remote access to a system. Operating systems
typically include a firewall or a user can purchase or download software from
a third party.
 Network and port scanners discover and monitor open ports on a host or
server.
 Protocol analyzers, or signature analyzers, are devices that collect and
examine network traffic.
 Vulnerability scanners are computer programs designed to assess weaknesses
on computers or networks.
 Host-based intrusion detection systems (IDS) examine activity on host
systems only. An IDS generates log files and alarm messages when it detects
unusual activity.
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Technologies
- Hardware based
technologies are appliances that are installed within the network
faculties. They can include: Firewall appliances, Intrusion Detection
Systems (IDS),Intrusion Prevention Systems (IPS) and Content
filtering systems.
block unwanted traffic. Firewalls contain rules that
define the traffic allowed into and out of a network.
(IDS) detect signs of attacks or
unusual traffic on a network and send an alert.
detect signs of attacks or unusual traffic
on a network, generate an alert and take corrective actions.
control access and transmission of objectionable or
offensive content.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Technologies
► There are several used to protect
the organization’s assets:
block unwanted traffic. Firewalls contain rules that
define the traffic allowed into and out of a network.
is a secure virtual network that uses the public
network (i.e., the Internet). The security of a VPN lies in the encryption of
packet content between the endpoints that define the VPN.
requires a set of checks before allowing a
device to connect to a network. Some common checks include up-to-data
antivirus software or operating system updates installed.
includes the implementation of authentication
and encryption.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Technologies
► Technological countermeasures now also include cloud-based
technologies. Cloud-based technologies shift the technology component
from the organization to the cloud provider :
allows users to gain access to application software
and databases. Cloud providers manage the infrastructure. Users store data on the
cloud provider’s servers.
provides virtualized computing resources over
the Internet. The provider hosts the hardware, software, servers, and storage
components.
provides access to the development tools and
services used to deliver the applications.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Investing a lot of money in technology will not make a difference if the people
within the organization are the weakest link in cybersecurity.
 A security awareness program is extremely important for an organization. An
employee may not be purposefully malicious but just unaware of what the proper
procedures are. There are several ways to implement a formal training program:
 Security awareness should be an ongoing process since new threats and
techniques are always on the horizon.
 The members of an organization must be aware of security policies and have the
knowledge to make security part of their day-to-day activities.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 A security policy is a set of security objectives for a company that includes rules
of behavior for users and administrators and specifies system requirements. These
objectives, rules, and requirements collectively ensure the security of a network,
the data, and the computer systems within an organization.
 A comprehensive security policy accomplishes several tasks:
 Security policies inform users, staff, and managers of an organization’s
requirements for protecting technology and information assets. A security policy
also specifies the mechanisms needed to meet security requirements.
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
A security policy typically includes:
-
Specifies authorized persons that can have access
to network resources and outlines verification
procedures.
- Ensures passwords meet
minimum requirements and are changed regularly.
- Identifies network
resources and usage that are acceptable to the
organization. It may also identify ramifications for
policy violations.
- Identifies how remote
users can access a network and what is remotely
accessible.
- Specifies network
device operating systems and end user application
update procedures.
- Describes how
security incidents are handled.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
help an IT staff maintain consistency in operating the network.
Standards provide the technologies that specific users or programs need in
addition to any program requirements or criteria that an organization must
follow.
o One of the most important security principles is consistency. For this reason, it is necessary
for organizations to establish standards
are a list of suggestions on how to do things more efficiently
and securely. They are similar to standards, but are more flexible and are
not usually mandatory. Guidelines define how standards are developed and
guarantee adherence to general security policies.
o In addition to an organization’s defined best practices, guidelines are also available from
National Institute of Standards and Technology (NIST) Computer Security Resource Center,
National Security Agency (NSA) Security Configuration Guides & The Common Criteria
standard
documents are longer and more detailed than standards and
guidelines. Procedure documents include implementation details that
usually contain step-by-step instructions and graphics.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 31
2.5 IT Security Management
Framework
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 The International Organization for Standardization
(ISO)/International Electrotechnical Commission (IEC) developed a
comprehensive framework to guide information security
management.
 ISO/IEC 27000 is an information security standard published in
2005 and revised in 2013. ISO publishes the ISO 27000 standards.
 The ISO 27000 standards describe the implementation of a
comprehensive information security management system (ISMS).
 An ISMS consists of all of the administrative, technical and
operational controls to keep information safe within an organization.
 Twelve independent domains represent the components of the ISO
27000 standard and serve to organize, at a high level, the vast areas
of information under the umbrella of information security.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 The twelve domains serve as a common basis for developing organizational
security standards and effective security management practices. They also help to
facilitate communication between organizations.
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Security Management Framework
Using the ISO Cybersecurity Model
 The ISO/IEC 27002 defines information security management system
controls. Controls are more detailed than objectives. Control objectives
tell the organization what to do. Controls define how to accomplish the
objective. Cybersecurity professionals recognize the following:
 Controls are not mandatory, but they are widely accepted and adopted.
 Controls must maintain vendor-neutrality to avoid the appearance of endorsing a
specific product or company.
 Controls are like guidelines. This means that there can be more than one way to
comply with the objective.
 The ISO 27000 is a universal framework for every type of organization. In
order to use the framework effectively, an organization must narrow down
which domains, control objectives, and controls apply to its environment
and operations.
 The ISO 27001 control objectives serve as a checklist. The first step an
organization takes is to determine if these control objectives are
applicable to the organization.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Security Management Framework
Using the ISO Cybersecurity Model (Cont.)
The ISO Cybersecurity Model and the States
of Data
 Different groups within an organization may be
responsible for data in each of the various
states.
 For example, the network security group is
responsible for data during transmission.
 Programmers and data entry people are
responsible for data during processing.
 The hardware and server support specialists
are responsible for stored data. The ISO
Controls specifically address security objectives
for data in each of the three states.
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Security Management Framework
Using the ISO Cybersecurity Model (Cont.)
The ISO Cybersecurity Model and Safeguards
 The ISO 27001 control objectives relate directly to the organization’s
cybersecurity policies, procedures and guidelines which upper management
determines.
 The ISO 27002 controls provide technical direction. For example, upper
management establishes a policy specifying the protection of all data coming
in to or out of the organization. Implementing the technology to meet the policy
objectives would not involve upper management.
 It is the responsibility of IT professionals to properly implement and configure
the equipment used to fulfill the policy directives set by upper management.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
At last !!!!!!!!!!!!!!!!!!!!!!!!!

Cisco cybersecurity essentials chapter - 2

  • 1.
    MUKESH CHINTA ASST PROF,CSE, VRSEC CISCO NETACAD INSTRUCTOR Chapter 2: The Cybersecurity Cube
  • 2.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2 Chapter 2: The Cybersecurity Cube Cybersecurity Essentials v1.1
  • 3.
    Presentation_ID 3© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2 - Sections & Objectives 2.1 The Cybersecurity Cube Describe the three dimensions of the McCumber Cube. 2.2 CIA TRIAD Describe the principles of confidentiality, integrity, and availability. 2.3 States of Data Differentiate the three states of data. 2.4 Cybersecurity Countermeasures Compare the types of cybersecurity countermeasures. 2.5 IT Security Management Framework Describe the ISO Cybersecurity Model
  • 4.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 2.1 The Three Dimensions of the Cybersecurity Cube
  • 5.
    Presentation_ID 5© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential The Three Dimensions of the Cybersecurity Cube
  • 6.
    Presentation_ID 6© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential  The first dimension of the cybersecurity cube identifies the goals to protect cyberspace. The goals identified in the first dimension are the foundational principles. These three principles are confidentiality, integrity and availability. prevents the disclosure of information to unauthorized people, resources, or processes. refers to the accuracy, consistency, and trustworthiness of data. Finally, ensures that information is accessible by authorized users when needed. (CIA Triad)  The second dimension of the Cybersecurity Cube focuses on the problems of protecting all of the in cyberspace. Data has three possible states: Data in transit, Data at rest or in storage and Data in process.  The third dimension of the Cybersecurity Cube identifies the three types of powers used to protect the cyber world. The three types of powers of: - devices, and products available to protect information systems and fend off cyber criminals. - procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices. - Aware and knowledgeable about their world and the dangers that threaten their world.
  • 7.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7 2.2 CIA TRIAD
  • 8.
    Presentation_ID 8© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 9.
    Presentation_ID 9© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 10.
    Presentation_ID 10© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 11.
    Presentation_ID 11© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential The concept of AAA is similar to using a credit card
  • 12.
    Presentation_ID 12© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Confidentiality and privacy seem interchangeable, but from a legal standpoint, they mean different things. ⁂ Most privacy data is confidential, but not all confidential data is private. Access to confidential information occurs after confirming proper authorization. Financial institutions, hospitals, medical professionals, law firms, and businesses handle confidential information. ⁂ Confidential information has a non-public status. Maintaining confidentiality is more of an ethical duty. ⁂ Privacy is the appropriate use of data. When organizations collect information provided by customers or employees, they should only use that data for its intended purpose. ⁂ Policies are the best way for an organization to comply with the growing number of privacy related laws. Policies enable organizations to enforce specific rules, procedures, and processes when collecting, storing, and sharing data.
  • 13.
    Presentation_ID 13© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 14.
    Presentation_ID 14© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrity Checks
  • 15.
    Presentation_ID 15© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 16.
    Presentation_ID 16© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential One of the most popular high availability practices is five nines. The five nines refer to 99.999%. This means that downtime is less than 5.26 minutes per year. Organizations can ensure availability by implementing the following: Equipment maintenance OS and system updates Test backups Plan for disasters Implement new technologies Monitor unusual activity Test to verify availability
  • 17.
    Presentation_ID 17© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 18.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18 2.3 States of Data
  • 19.
    Presentation_ID 19© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential . Data at rest means that a type of storage device retains the data when no user or process is using it.  A storage device can be local (on a computing device) or centralized (on the network). A number of options exist for storing data. is storage connected to a computer. A hard drive or USB flash drive is an example of direct-attached storage. uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk. RAID provides improved performance and fault tolerance.  A device is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. NAS devices are flexible and scalable, meaning administrators can increase the capacity as needed.  A architecture is a network-based storage system. SAN systems connect to the network using high-speed interfaces allowing improved performance and the ability to connect multiple servers to a centralized disk storage repository.
  • 20.
    Presentation_ID 20© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential  The third state of data is . This refers to data during initial input, modification, computation, or output.  Protection of data integrity starts with the initial input of data.  Organizations use several methods to collect data, such as manual data entry, scanning forms, file uploads, and data collected from sensors. Each of these methods pose potential threats to data integrity. refers to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failing resulting in data modification.  Processes like encoding/decoding, compression/decompression and encryption/decryption are all examples of data modification.  Malicious code also results in data corruption. also occurs during the data output process. Data output refers to outputting data to printers, electronic displays or directly to other devices. The accuracy of output data is critical because output provides information and influences decision-making.
  • 21.
    Presentation_ID 21© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential  Data transmission involves sending information from one device to another. There are numerous methods to transmit information between devices including: – uses removable media to physically move data from one computer to another – uses cables to transmit data – uses the airwaves to transmit data  The protection of transmitted data is one of the most challenging jobs of a cybersecurity professional. The greatest challenges are: - cyber criminals can capture, save and steal data in-transit. - cyber criminals can intercept and alter data in- transit. - cyber criminals can use rogue or unauthorized devices to interrupt data availability.  Protecting the confidentiality, integrity, and availability of transmitted data is one of the most important responsibilities of a cybersecurity professional.
  • 22.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22 2.4 Cybersecurity Countermeasures
  • 23.
    Presentation_ID 23© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Technologies - Software safeguards include programs and services that protect operating systems, databases, and other services operating on workstations, portable devices, and servers. There are several software-based technologies used to safeguard an organization’s assets.  Software firewalls control remote access to a system. Operating systems typically include a firewall or a user can purchase or download software from a third party.  Network and port scanners discover and monitor open ports on a host or server.  Protocol analyzers, or signature analyzers, are devices that collect and examine network traffic.  Vulnerability scanners are computer programs designed to assess weaknesses on computers or networks.  Host-based intrusion detection systems (IDS) examine activity on host systems only. An IDS generates log files and alarm messages when it detects unusual activity.
  • 24.
    Presentation_ID 24© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Technologies - Hardware based technologies are appliances that are installed within the network faculties. They can include: Firewall appliances, Intrusion Detection Systems (IDS),Intrusion Prevention Systems (IPS) and Content filtering systems. block unwanted traffic. Firewalls contain rules that define the traffic allowed into and out of a network. (IDS) detect signs of attacks or unusual traffic on a network and send an alert. detect signs of attacks or unusual traffic on a network, generate an alert and take corrective actions. control access and transmission of objectionable or offensive content.
  • 25.
    Presentation_ID 25© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Technologies ► There are several used to protect the organization’s assets: block unwanted traffic. Firewalls contain rules that define the traffic allowed into and out of a network. is a secure virtual network that uses the public network (i.e., the Internet). The security of a VPN lies in the encryption of packet content between the endpoints that define the VPN. requires a set of checks before allowing a device to connect to a network. Some common checks include up-to-data antivirus software or operating system updates installed. includes the implementation of authentication and encryption.
  • 26.
    Presentation_ID 26© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Technologies ► Technological countermeasures now also include cloud-based technologies. Cloud-based technologies shift the technology component from the organization to the cloud provider : allows users to gain access to application software and databases. Cloud providers manage the infrastructure. Users store data on the cloud provider’s servers. provides virtualized computing resources over the Internet. The provider hosts the hardware, software, servers, and storage components. provides access to the development tools and services used to deliver the applications.
  • 27.
    Presentation_ID 27© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential  Investing a lot of money in technology will not make a difference if the people within the organization are the weakest link in cybersecurity.  A security awareness program is extremely important for an organization. An employee may not be purposefully malicious but just unaware of what the proper procedures are. There are several ways to implement a formal training program:  Security awareness should be an ongoing process since new threats and techniques are always on the horizon.  The members of an organization must be aware of security policies and have the knowledge to make security part of their day-to-day activities.
  • 28.
    Presentation_ID 28© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential  A security policy is a set of security objectives for a company that includes rules of behavior for users and administrators and specifies system requirements. These objectives, rules, and requirements collectively ensure the security of a network, the data, and the computer systems within an organization.  A comprehensive security policy accomplishes several tasks:  Security policies inform users, staff, and managers of an organization’s requirements for protecting technology and information assets. A security policy also specifies the mechanisms needed to meet security requirements.
  • 29.
    Presentation_ID 29© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential A security policy typically includes: - Specifies authorized persons that can have access to network resources and outlines verification procedures. - Ensures passwords meet minimum requirements and are changed regularly. - Identifies network resources and usage that are acceptable to the organization. It may also identify ramifications for policy violations. - Identifies how remote users can access a network and what is remotely accessible. - Specifies network device operating systems and end user application update procedures. - Describes how security incidents are handled.
  • 30.
    Presentation_ID 30© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential help an IT staff maintain consistency in operating the network. Standards provide the technologies that specific users or programs need in addition to any program requirements or criteria that an organization must follow. o One of the most important security principles is consistency. For this reason, it is necessary for organizations to establish standards are a list of suggestions on how to do things more efficiently and securely. They are similar to standards, but are more flexible and are not usually mandatory. Guidelines define how standards are developed and guarantee adherence to general security policies. o In addition to an organization’s defined best practices, guidelines are also available from National Institute of Standards and Technology (NIST) Computer Security Resource Center, National Security Agency (NSA) Security Configuration Guides & The Common Criteria standard documents are longer and more detailed than standards and guidelines. Procedure documents include implementation details that usually contain step-by-step instructions and graphics.
  • 31.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 31 2.5 IT Security Management Framework
  • 32.
    Presentation_ID 32© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential  The International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) developed a comprehensive framework to guide information security management.  ISO/IEC 27000 is an information security standard published in 2005 and revised in 2013. ISO publishes the ISO 27000 standards.  The ISO 27000 standards describe the implementation of a comprehensive information security management system (ISMS).  An ISMS consists of all of the administrative, technical and operational controls to keep information safe within an organization.  Twelve independent domains represent the components of the ISO 27000 standard and serve to organize, at a high level, the vast areas of information under the umbrella of information security.
  • 33.
    Presentation_ID 33© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential  The twelve domains serve as a common basis for developing organizational security standards and effective security management practices. They also help to facilitate communication between organizations.
  • 34.
    Presentation_ID 34© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Security Management Framework Using the ISO Cybersecurity Model  The ISO/IEC 27002 defines information security management system controls. Controls are more detailed than objectives. Control objectives tell the organization what to do. Controls define how to accomplish the objective. Cybersecurity professionals recognize the following:  Controls are not mandatory, but they are widely accepted and adopted.  Controls must maintain vendor-neutrality to avoid the appearance of endorsing a specific product or company.  Controls are like guidelines. This means that there can be more than one way to comply with the objective.  The ISO 27000 is a universal framework for every type of organization. In order to use the framework effectively, an organization must narrow down which domains, control objectives, and controls apply to its environment and operations.  The ISO 27001 control objectives serve as a checklist. The first step an organization takes is to determine if these control objectives are applicable to the organization.
  • 35.
    Presentation_ID 35© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Security Management Framework Using the ISO Cybersecurity Model (Cont.) The ISO Cybersecurity Model and the States of Data  Different groups within an organization may be responsible for data in each of the various states.  For example, the network security group is responsible for data during transmission.  Programmers and data entry people are responsible for data during processing.  The hardware and server support specialists are responsible for stored data. The ISO Controls specifically address security objectives for data in each of the three states.
  • 36.
    Presentation_ID 36© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential Security Management Framework Using the ISO Cybersecurity Model (Cont.) The ISO Cybersecurity Model and Safeguards  The ISO 27001 control objectives relate directly to the organization’s cybersecurity policies, procedures and guidelines which upper management determines.  The ISO 27002 controls provide technical direction. For example, upper management establishes a policy specifying the protection of all data coming in to or out of the organization. Implementing the technology to meet the policy objectives would not involve upper management.  It is the responsibility of IT professionals to properly implement and configure the equipment used to fulfill the policy directives set by upper management.
  • 37.
    Presentation_ID 37© 2008Cisco Systems, Inc. All rights reserved. Cisco Confidential At last !!!!!!!!!!!!!!!!!!!!!!!!!