SlideShare a Scribd company logo
Information Security 365/765, Fall Semester, 2014 
Course Instructor, Nicholas Davis 
Lecture 4, Security Policy Development, Data 
Classification Methods, Workplace Controls
NNeexxtt TTiimmee 
Security policies 
Information classification 
Security awareness training 
09/11/14 UNIVERSITY OF WISCONSIN 2
SSeeccuurriittyy PPoolliiccyy 
An overall general statement, produced 
by senior management, which dictates 
the role which security management 
plays in the organization 
Made up of goals and responsibilities 
Shows strategic and tactical value of the 
policy 
Outlines how enforcement should be 
carried out 
09/11/14 UNIVERSITY OF WISCONSIN 3
SSeeccuurriittyy PPoolliiccyy CCoommppoonneennttss 
BBuussiinneessss OObbjjeeccttiivveess 
Business objectives should drive the 
policy’s creation, implementation, 
enforcement. The policy should not 
dictate business objectives 
09/11/14 UNIVERSITY OF WISCONSIN 4
SSeeccuurriittyy PPoolliiccyy CCoommppoonneennttss 
MMaakkee IItt LLeeggiibbllee 
The document should be written in plain 
language, which all the employees can 
easily understand the portions which 
apply to them, without question 
09/11/14 UNIVERSITY OF WISCONSIN 5
SSeeccuurriittyy PPoolliiccyy CCoommppoonneennttss 
UUnniiffoorrmmiittyy 
Make certain it fits all business 
functions and processes 
09/11/14 UNIVERSITY OF WISCONSIN 6
SSeeccuurriittyy PPoolliiccyy 
LLeeggaall CCoonnffoorrmmiittyy 
It should support all legislation and 
regulations which apply to the company, 
local, national and international 
09/11/14 UNIVERSITY OF WISCONSIN 7
SSeeccuurriittyy PPoolliiccyy 
AA LLiivviinngg DDooccuummeenntt 
It should be re-visited on a regular basis 
and updated as necessary, as changes 
occur within the company. 
Make certain that all changes are 
documented and changes are recorded 
09/11/14 UNIVERSITY OF WISCONSIN 8
SSeeccuurriittyy PPoolliiccyy 
AAddaappttaabbiilliittyy 
It should be written in such a way as to 
make it useful for several years at a time, 
under normal circumstances, and 
flexible enough to deal with minor 
changes, as they occur. 
09/11/14 UNIVERSITY OF WISCONSIN 9
SSeeccuurriittyy PPoolliiccyy 
LLaanngguuaaggee 
The tone of the policy must be certain 
and strong. Avoid using the word 
“should”, as it leaves room for 
interpretation. Instead, use the words 
“shall”, “will” and “must”, throughout 
the document 
09/11/14 UNIVERSITY OF WISCONSIN 10
SSeeccuurriittyy PPoolliiccyy 
SSttyyllee 
No frills 
Professional looking 
Consistent presentation 
09/11/14 UNIVERSITY OF WISCONSIN 11
WWhhyy iiss IITT SSeeccuurriittyy PPoolliiccyy 
SSoo IImmppoorrttaanntt?? 
Helps identify company’s valuable assets 
Provides authority to the security team 
and their activities 
Provides a reference to review when 
conflicts pertaining to security arise 
States clearly the company’s goals and 
objectives in the area of security 
Outlines personal responsibility 
09/11/14 UNIVERSITY OF WISCONSIN 12
WWhhyy iiss IITT SSeeccuurriittyy PPoolliiccyy 
SSoo IImmppoorrttaanntt?? 
Helps prevent unanticipated events 
from occurring 
Defines the scope and boundaries for the 
security team and its functions 
Outlines incident response 
responsibilities 
Outlines the company’s response to legal 
and regulatory requirements 
09/11/14 UNIVERSITY OF WISCONSIN 13
TThhrreeee TTyyppeess ooff 
SSeeccuurriittyy PPoolliicciieess EExxiisstt 
Regulatory 
Advisory 
Informative 
09/11/14 UNIVERSITY OF WISCONSIN 14
SSeeccuurriittyy PPoolliiccyy TTyyppeess 
RReegguullaattoorryy 
Ensures that the company is following 
standards set by specific industry 
regulations. It is very detailed and 
specific to a type of industry: 
Finance 
Healthcare 
Government 
09/11/14 UNIVERSITY OF WISCONSIN 15
SSeeccuurriittyy PPoolliiccyy TTyyppee 
AAddvviissoorryy 
Tells employees which types of behaviors 
and activities shall and shall not take place 
within the organization 
How to handle: 
Medical information 
Financial transactions 
Confidential information 
Outlines ramifications for non-compliance 
09/11/14 UNIVERSITY OF WISCONSIN 16
SSeeccuurriittyy PPoolliiccyy TTyyppee 
IInnffoorrmmaattiivvee 
Informs employees on generalities of 
certain topics, but is not enforceable. 
It teaches about issues important to the 
company, such as how the company 
would like employees to interact with 
business partners, the company’s goal 
and mission, or the corporate reporting 
structure 
09/11/14 UNIVERSITY OF WISCONSIN 17
SSeeccuurriittyy PPoolliiccyy 
DDuuee DDiilliiggeennccee FFoorrwwaarrdd 
Due Diligence, is the act of investigating 
and understanding the risks the 
company faces 
09/11/14 UNIVERSITY OF WISCONSIN 18
SSeeccuurriittyy PPoolliiccyy 
DDuuee CCaarree 
Is a statement which demonstrates that 
the company has accepted and taken 
responsibility for activities which take 
place in the organization 
09/11/14 UNIVERSITY OF WISCONSIN 19
HHooww DDuuee DDiilliiggeennccee 
DDuuee CCaarree aarree RReellaatteedd 
Due diligence is the understanding of 
the threats and risks, while due care is 
the countermeasures which the 
company has put in place to address the 
threats and risks 
09/11/14 UNIVERSITY OF WISCONSIN 20
IInnffoorrmmaattiioonn CCllaassssiiffiiccaattiioonn 
In the field of data management, data 
classification is defined as a tool for 
categorization of data to enable/help 
organization to effectively answer following 
questions: 
What data types are available? 
Where are certain data located? 
What access levels are implemented? 
What protection level is implemented and 
does it adhere to compliance regulations? 
09/11/14 UNIVERSITY OF WISCONSIN 21
DDaattaa CCllaassssiiffiiccaattiioonn 
Commercial Enterprise 
Military 
You are business students, so we will 
focus on commercial enterprise data 
classification terminology 
09/11/14 UNIVERSITY OF WISCONSIN 22
DDaattaa CCllaassssiiffiiccaattiioonn 
TTyyppeess 
Public 
Sensitive 
Private 
Confidential 
09/11/14 UNIVERSITY OF WISCONSIN 23
DDaattaa CCllaassssiiffiiccaattiioonn 
PPuubblliicc 
Definition: Disclosure is not welcome, 
but it would not cause an adverse impact 
or damage to the company or its 
employees 
Examples: 
How many people work at the company 
Current job positions posted on the 
website 
09/11/14 UNIVERSITY OF WISCONSIN 24
DDaattaa CCllaassssiiffiiccaattiioonn 
SSeennssiittiivvee 
Definition: Requires special precautions to 
ensure the integrity and confidentiality of 
the data, by preventing it from 
unauthorized modification or deletion. 
Requires higher than normal assurance of 
accuracy and completeness 
Example: 
Financial information 
Details of projects 
Profit earnings and forecasts 
09/11/14 UNIVERSITY OF WISCONSIN 25
DDaattaa CCllaassssiiffiiccaattiioonn 
PPrriivvaattee 
Definition: Personal information, for use 
only within the company. Unauthorized 
disclosure could adversely affect 
employees, the company, its business 
partners or customers 
Examples: 
Work history 
HR information 
Medical information 
09/11/14 UNIVERSITY OF WISCONSIN 26
DDaattaa CCllaassssiiffiiccaattiioonn 
CCoonnffiiddeennttiiaall 
Definition: For use within the company 
only. Exempt from disclosure under the 
Freedom of Information Act. Unauthorized 
disclosure could seriously affect a company 
Examples: 
Trade secrets 
Programming software code 
Information that keeps the company 
competitive 
09/11/14 UNIVERSITY OF WISCONSIN 27
DDaattaa CCllaassssiiffiiccaattiioonn 
PPrroocceedduurreess 
1. Define classification levels 
2. Specify the criteria by which data will 
be classified 
3. Have the data owner indicate the 
classification level for their data 
4. Identify the data custodian, who will 
be responsible for maintaining the 
data and its security level 
5. Indicate the controls to be applied at 
each classification level 
09/11/14 UNIVERSITY OF WISCONSIN 28
DDaattaa CCllaassssiiffiiccaattiioonn 
PPrroocceedduurreess 
6. Document any exceptions in detail 
7. Indicate the methods which are used 
to transfer data custody to a different 
owner 
8. Create a procedure to periodically 
review the data’s classification and 
ownership 
9. Indicate declassification procedures 
10. Integrate this knowledge into a 
security awareness program 
09/11/14 UNIVERSITY OF WISCONSIN 29
IIff YYoouu CChhoooossee ttoo CCrreeaattee 
YYoouu OOwwnn DDaattaa CCllaassssiiffiiccaattiioonn SSyysstteemm 
Too many levels will make classification 
complex and confusing 
Too few levels will encourage sloppy 
data classification 
There should be no overlap between 
classification levels 
Classification levels should be developed 
for both data and the systems housing 
the data, and they should match 
09/11/14 UNIVERSITY OF WISCONSIN 30
HHiirriinngg PPrraaccttiicceess 
Job skill screening 
Reference check 
Non-disclosure agreement (NDA) signed 
Education verification 
Criminal background check 
Credit report check 
Sex offender check 
Drug screening 
Professional license check 
Immigration status check 
Social Security Number trace to ensure validity 
09/11/14 UNIVERSITY OF WISCONSIN 31
EEmmppllooyyeeee CCoonnttrroollss 
RRoottaattiioonn ooff DDuuttiieess 
No one person should stay in one 
position for an uninterrupted period of 
time, as this may enable them to have 
too much control over a segment of 
business 
Mandatory vacation policy 
09/11/14 UNIVERSITY OF WISCONSIN 32
EEmmppllooyyeeee CCoonnttrroollss 
SSeeppaarraattiioonn ooff DDuuttiieess 
Split knowledge system: No single 
employee has the knowledge to do a task 
by themselves 
Example 
Dual control: No single employee has 
the physical ability to do a task by 
themselves 
Example 
09/11/14 UNIVERSITY OF WISCONSIN 33
TTeerrmmiinnaattiioonn PPrraaccttiicceess 
Each company needs a set of pre-defined 
termination procedures 
Example: 
Once terminated, the employee must be 
escorted out of the facility by their manager 
Employee must immediately surrender keys, 
employee badge, etc. 
Employee must be asked to complete an exit 
interview and return company property 
The terminated employee’s online accounts 
must be disabled immediately upon 
termination 
09/11/14 UNIVERSITY OF WISCONSIN 34
BBeewwaarree ooff DDiissggrruunnttlleedd 
FFoorrmmeerr EEmmppllooyyeeeess 
09/11/14 UNIVERSITY OF WISCONSIN 35
SSeeccuurriittyy AAwwaarreenneessss 
TTrraaiinniinngg PPrrooggrraamm 
One for senior management 
One for staff 
One for technical employees 
Responsibilities 
Liabilities 
Expectations 
09/11/14 UNIVERSITY OF WISCONSIN 36
SSeeccuurriittyy AAwwaarreenneessss 
SSeenniioorr MMaannaaggeemmeenntt 
Focus on: corporate assets, financial 
gains and losses which can occur due to 
information security incidents. They are 
the leaders, they must demonstrate the 
proper mindset to the rest of the 
company 
09/11/14 UNIVERSITY OF WISCONSIN 37
SSeeccuurriittyy AAwwaarreenneessss 
MMiidd--MMaannaaggeemmeenntt 
Focus on: policies, standards and 
guidelines and how they map to 
individual departments, responsibility 
for ensuring their employees adherence 
to the security policies, and how the 
managers will be held accountable for 
enforcement 
09/11/14 UNIVERSITY OF WISCONSIN 38
SSeeccuurriittyy AAwwaarreenneessss 
EEmmppllooyyeeeess 
Focus: on the operational aspects of 
information security, proper system 
usage, how to recognize a security issue 
and how to properly handle and report a 
suspected information security incident 
09/11/14 UNIVERSITY OF WISCONSIN 39
NNeexxtt CCllaassss 
AAcccceessss CCoonnttrrooll 
09/11/14 UNIVERSITY OF WISCONSIN 40
09/11/14 UNIVERSITY OF WISCONSIN 41
09/11/14 UNIVERSITY OF WISCONSIN 42
09/11/14 UNIVERSITY OF WISCONSIN 43
09/11/14 UNIVERSITY OF WISCONSIN 44
09/11/14 UNIVERSITY OF WISCONSIN 45
09/11/14 UNIVERSITY OF WISCONSIN 46
09/11/14 UNIVERSITY OF WISCONSIN 47
09/11/14 UNIVERSITY OF WISCONSIN 48
09/11/14 UNIVERSITY OF WISCONSIN 49
09/11/14 UNIVERSITY OF WISCONSIN 50

More Related Content

Viewers also liked

Statistical database, problems and mitigation
Statistical database, problems and mitigationStatistical database, problems and mitigation
Statistical database, problems and mitigation
Bikrant Gautam
 
Understanding strategy development 4
Understanding strategy development 4Understanding strategy development 4
Understanding strategy development 4
Amit Fogla
 
Ch10
Ch10Ch10
Ch10
yesnir
 
Designing With Lenses (UxLx, CHIFOO, BigD)
Designing With Lenses (UxLx, CHIFOO, BigD)Designing With Lenses (UxLx, CHIFOO, BigD)
Designing With Lenses (UxLx, CHIFOO, BigD)
Bill Scott
 
Modeling & Simulation Lecture Notes
Modeling & Simulation Lecture NotesModeling & Simulation Lecture Notes
Modeling & Simulation Lecture Notes
FellowBuddy.com
 
Simulation Project in ARENA
Simulation Project in ARENASimulation Project in ARENA
Simulation Project in ARENA
Aditya Nakate
 
Understanding strategic development
Understanding strategic developmentUnderstanding strategic development
Understanding strategic development
Mazhar Iftikhar (mazhariftikhar@gmail.com)
 
Simulation with ARENA - SM Paints
Simulation with ARENA - SM PaintsSimulation with ARENA - SM Paints
Simulation with ARENA - SM Paints
hrishik26
 
Simulation Project Report
Simulation Project ReportSimulation Project Report
Simulation Project Report
Jasmine Sachdeva
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
Chapter 2 pertubation
Chapter 2 pertubationChapter 2 pertubation
Chapter 2 pertubation
NBER
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
kzoe1996
 
Intro to Deadlocks
Intro to DeadlocksIntro to Deadlocks
Intro to Deadlocks
lionpeal
 
SM Lecture One : Introducing Strategy
SM Lecture One : Introducing StrategySM Lecture One : Introducing Strategy
SM Lecture One : Introducing Strategy
StratMgt Advisor
 
What is international strategy
What is international strategyWhat is international strategy
What is international strategy
rhizluna
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
Alfred Ouyang
 
SM Lecture Nine (A) - International Strategy
SM Lecture Nine (A)  - International StrategySM Lecture Nine (A)  - International Strategy
SM Lecture Nine (A) - International Strategy
StratMgt Advisor
 
Information security management system
Information security management systemInformation security management system
Information security management system
Arani Srinivasan
 
Ppt 02 international strategy
Ppt 02   international strategyPpt 02   international strategy
Ppt 02 international strategy
Padmini Agrawal
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 

Viewers also liked (20)

Statistical database, problems and mitigation
Statistical database, problems and mitigationStatistical database, problems and mitigation
Statistical database, problems and mitigation
 
Understanding strategy development 4
Understanding strategy development 4Understanding strategy development 4
Understanding strategy development 4
 
Ch10
Ch10Ch10
Ch10
 
Designing With Lenses (UxLx, CHIFOO, BigD)
Designing With Lenses (UxLx, CHIFOO, BigD)Designing With Lenses (UxLx, CHIFOO, BigD)
Designing With Lenses (UxLx, CHIFOO, BigD)
 
Modeling & Simulation Lecture Notes
Modeling & Simulation Lecture NotesModeling & Simulation Lecture Notes
Modeling & Simulation Lecture Notes
 
Simulation Project in ARENA
Simulation Project in ARENASimulation Project in ARENA
Simulation Project in ARENA
 
Understanding strategic development
Understanding strategic developmentUnderstanding strategic development
Understanding strategic development
 
Simulation with ARENA - SM Paints
Simulation with ARENA - SM PaintsSimulation with ARENA - SM Paints
Simulation with ARENA - SM Paints
 
Simulation Project Report
Simulation Project ReportSimulation Project Report
Simulation Project Report
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Chapter 2 pertubation
Chapter 2 pertubationChapter 2 pertubation
Chapter 2 pertubation
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
Intro to Deadlocks
Intro to DeadlocksIntro to Deadlocks
Intro to Deadlocks
 
SM Lecture One : Introducing Strategy
SM Lecture One : Introducing StrategySM Lecture One : Introducing Strategy
SM Lecture One : Introducing Strategy
 
What is international strategy
What is international strategyWhat is international strategy
What is international strategy
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
SM Lecture Nine (A) - International Strategy
SM Lecture Nine (A)  - International StrategySM Lecture Nine (A)  - International Strategy
SM Lecture Nine (A) - International Strategy
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Ppt 02 international strategy
Ppt 02   international strategyPpt 02   international strategy
Ppt 02 international strategy
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 

Similar to Information systems 365 lecture four - Security Policy Development, Data Classification Methods and Workplace Controls

Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
Nicholas Davis
 
Information systems 365 lecture three - Performing an IT Security Risk Analysis
Information systems 365 lecture three - Performing an IT Security Risk AnalysisInformation systems 365 lecture three - Performing an IT Security Risk Analysis
Information systems 365 lecture three - Performing an IT Security Risk Analysis
Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Nicholas Davis
 
Roger Walker, REGFORM, Safe(r) Communications, Missouri Water Seminar, Septem...
Roger Walker, REGFORM, Safe(r) Communications, Missouri Water Seminar, Septem...Roger Walker, REGFORM, Safe(r) Communications, Missouri Water Seminar, Septem...
Roger Walker, REGFORM, Safe(r) Communications, Missouri Water Seminar, Septem...
Kevin Perry
 
During week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docxDuring week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docx
jacksnathalie
 
Preventing Personnel Clearance Issues
Preventing Personnel Clearance Issues Preventing Personnel Clearance Issues
Preventing Personnel Clearance Issues
Armstrong Teasdale
 
Rollits Education Focus Newsletter - Autumn 2014
Rollits Education Focus Newsletter - Autumn 2014 Rollits Education Focus Newsletter - Autumn 2014
Rollits Education Focus Newsletter - Autumn 2014
Pat Coyle
 
Ocm ii mp
Ocm ii mpOcm ii mp
Ocm ii mp
Mahzad Pakzad
 
Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109
Shannon Gregg, MBA
 
The 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global InformationThe 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global Information
jtfoster
 
IT 549 Milestone Four Guidelines and Rubric One of the .docx
IT 549 Milestone Four Guidelines and Rubric  One of the .docxIT 549 Milestone Four Guidelines and Rubric  One of the .docx
IT 549 Milestone Four Guidelines and Rubric One of the .docx
vrickens
 
Leading the way
Leading the wayLeading the way
Leading the way
Kirstin Ferguson
 
HR hse Debunking the Myths
HR hse Debunking the MythsHR hse Debunking the Myths
HR hse Debunking the Myths
HRMATT
 
Signs of Safety - 10 pilots, 10 lessons
Signs of Safety - 10 pilots, 10 lessonsSigns of Safety - 10 pilots, 10 lessons
Signs of Safety - 10 pilots, 10 lessons
Jo Moriarty
 
Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019
JOEL JESUS SUPAN
 
APM leeds - reviews and assurance - Sep 2014
APM leeds - reviews and assurance - Sep 2014APM leeds - reviews and assurance - Sep 2014
APM leeds - reviews and assurance - Sep 2014
Upside Energy Ltd
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
Continuity and Resilience
 
2015 2016 MSc_In_Compliance
2015 2016 MSc_In_Compliance2015 2016 MSc_In_Compliance
A Gamer S Nightmare An Analysis Of The Sony PlayStation Hacking Crisis
A Gamer S Nightmare  An Analysis Of The Sony PlayStation Hacking CrisisA Gamer S Nightmare  An Analysis Of The Sony PlayStation Hacking Crisis
A Gamer S Nightmare An Analysis Of The Sony PlayStation Hacking Crisis
Angela Shin
 
2-WHS Presentation Simone
2-WHS  Presentation Simone2-WHS  Presentation Simone
2-WHS Presentation Simone
Simone K
 

Similar to Information systems 365 lecture four - Security Policy Development, Data Classification Methods and Workplace Controls (20)

Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
 
Information systems 365 lecture three - Performing an IT Security Risk Analysis
Information systems 365 lecture three - Performing an IT Security Risk AnalysisInformation systems 365 lecture three - Performing an IT Security Risk Analysis
Information systems 365 lecture three - Performing an IT Security Risk Analysis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Roger Walker, REGFORM, Safe(r) Communications, Missouri Water Seminar, Septem...
Roger Walker, REGFORM, Safe(r) Communications, Missouri Water Seminar, Septem...Roger Walker, REGFORM, Safe(r) Communications, Missouri Water Seminar, Septem...
Roger Walker, REGFORM, Safe(r) Communications, Missouri Water Seminar, Septem...
 
During week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docxDuring week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docx
 
Preventing Personnel Clearance Issues
Preventing Personnel Clearance Issues Preventing Personnel Clearance Issues
Preventing Personnel Clearance Issues
 
Rollits Education Focus Newsletter - Autumn 2014
Rollits Education Focus Newsletter - Autumn 2014 Rollits Education Focus Newsletter - Autumn 2014
Rollits Education Focus Newsletter - Autumn 2014
 
Ocm ii mp
Ocm ii mpOcm ii mp
Ocm ii mp
 
Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109
 
The 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global InformationThe 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global Information
 
IT 549 Milestone Four Guidelines and Rubric One of the .docx
IT 549 Milestone Four Guidelines and Rubric  One of the .docxIT 549 Milestone Four Guidelines and Rubric  One of the .docx
IT 549 Milestone Four Guidelines and Rubric One of the .docx
 
Leading the way
Leading the wayLeading the way
Leading the way
 
HR hse Debunking the Myths
HR hse Debunking the MythsHR hse Debunking the Myths
HR hse Debunking the Myths
 
Signs of Safety - 10 pilots, 10 lessons
Signs of Safety - 10 pilots, 10 lessonsSigns of Safety - 10 pilots, 10 lessons
Signs of Safety - 10 pilots, 10 lessons
 
Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019
 
APM leeds - reviews and assurance - Sep 2014
APM leeds - reviews and assurance - Sep 2014APM leeds - reviews and assurance - Sep 2014
APM leeds - reviews and assurance - Sep 2014
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
 
2015 2016 MSc_In_Compliance
2015 2016 MSc_In_Compliance2015 2016 MSc_In_Compliance
2015 2016 MSc_In_Compliance
 
A Gamer S Nightmare An Analysis Of The Sony PlayStation Hacking Crisis
A Gamer S Nightmare  An Analysis Of The Sony PlayStation Hacking CrisisA Gamer S Nightmare  An Analysis Of The Sony PlayStation Hacking Crisis
A Gamer S Nightmare An Analysis Of The Sony PlayStation Hacking Crisis
 
2-WHS Presentation Simone
2-WHS  Presentation Simone2-WHS  Presentation Simone
2-WHS Presentation Simone
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Nicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
Nicholas Davis
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
Nicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
Nicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
Nicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
Nicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
Nicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
Nicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
Nicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
Nicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
Nicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
Nicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 

Information systems 365 lecture four - Security Policy Development, Data Classification Methods and Workplace Controls

  • 1. Information Security 365/765, Fall Semester, 2014 Course Instructor, Nicholas Davis Lecture 4, Security Policy Development, Data Classification Methods, Workplace Controls
  • 2. NNeexxtt TTiimmee Security policies Information classification Security awareness training 09/11/14 UNIVERSITY OF WISCONSIN 2
  • 3. SSeeccuurriittyy PPoolliiccyy An overall general statement, produced by senior management, which dictates the role which security management plays in the organization Made up of goals and responsibilities Shows strategic and tactical value of the policy Outlines how enforcement should be carried out 09/11/14 UNIVERSITY OF WISCONSIN 3
  • 4. SSeeccuurriittyy PPoolliiccyy CCoommppoonneennttss BBuussiinneessss OObbjjeeccttiivveess Business objectives should drive the policy’s creation, implementation, enforcement. The policy should not dictate business objectives 09/11/14 UNIVERSITY OF WISCONSIN 4
  • 5. SSeeccuurriittyy PPoolliiccyy CCoommppoonneennttss MMaakkee IItt LLeeggiibbllee The document should be written in plain language, which all the employees can easily understand the portions which apply to them, without question 09/11/14 UNIVERSITY OF WISCONSIN 5
  • 6. SSeeccuurriittyy PPoolliiccyy CCoommppoonneennttss UUnniiffoorrmmiittyy Make certain it fits all business functions and processes 09/11/14 UNIVERSITY OF WISCONSIN 6
  • 7. SSeeccuurriittyy PPoolliiccyy LLeeggaall CCoonnffoorrmmiittyy It should support all legislation and regulations which apply to the company, local, national and international 09/11/14 UNIVERSITY OF WISCONSIN 7
  • 8. SSeeccuurriittyy PPoolliiccyy AA LLiivviinngg DDooccuummeenntt It should be re-visited on a regular basis and updated as necessary, as changes occur within the company. Make certain that all changes are documented and changes are recorded 09/11/14 UNIVERSITY OF WISCONSIN 8
  • 9. SSeeccuurriittyy PPoolliiccyy AAddaappttaabbiilliittyy It should be written in such a way as to make it useful for several years at a time, under normal circumstances, and flexible enough to deal with minor changes, as they occur. 09/11/14 UNIVERSITY OF WISCONSIN 9
  • 10. SSeeccuurriittyy PPoolliiccyy LLaanngguuaaggee The tone of the policy must be certain and strong. Avoid using the word “should”, as it leaves room for interpretation. Instead, use the words “shall”, “will” and “must”, throughout the document 09/11/14 UNIVERSITY OF WISCONSIN 10
  • 11. SSeeccuurriittyy PPoolliiccyy SSttyyllee No frills Professional looking Consistent presentation 09/11/14 UNIVERSITY OF WISCONSIN 11
  • 12. WWhhyy iiss IITT SSeeccuurriittyy PPoolliiccyy SSoo IImmppoorrttaanntt?? Helps identify company’s valuable assets Provides authority to the security team and their activities Provides a reference to review when conflicts pertaining to security arise States clearly the company’s goals and objectives in the area of security Outlines personal responsibility 09/11/14 UNIVERSITY OF WISCONSIN 12
  • 13. WWhhyy iiss IITT SSeeccuurriittyy PPoolliiccyy SSoo IImmppoorrttaanntt?? Helps prevent unanticipated events from occurring Defines the scope and boundaries for the security team and its functions Outlines incident response responsibilities Outlines the company’s response to legal and regulatory requirements 09/11/14 UNIVERSITY OF WISCONSIN 13
  • 14. TThhrreeee TTyyppeess ooff SSeeccuurriittyy PPoolliicciieess EExxiisstt Regulatory Advisory Informative 09/11/14 UNIVERSITY OF WISCONSIN 14
  • 15. SSeeccuurriittyy PPoolliiccyy TTyyppeess RReegguullaattoorryy Ensures that the company is following standards set by specific industry regulations. It is very detailed and specific to a type of industry: Finance Healthcare Government 09/11/14 UNIVERSITY OF WISCONSIN 15
  • 16. SSeeccuurriittyy PPoolliiccyy TTyyppee AAddvviissoorryy Tells employees which types of behaviors and activities shall and shall not take place within the organization How to handle: Medical information Financial transactions Confidential information Outlines ramifications for non-compliance 09/11/14 UNIVERSITY OF WISCONSIN 16
  • 17. SSeeccuurriittyy PPoolliiccyy TTyyppee IInnffoorrmmaattiivvee Informs employees on generalities of certain topics, but is not enforceable. It teaches about issues important to the company, such as how the company would like employees to interact with business partners, the company’s goal and mission, or the corporate reporting structure 09/11/14 UNIVERSITY OF WISCONSIN 17
  • 18. SSeeccuurriittyy PPoolliiccyy DDuuee DDiilliiggeennccee FFoorrwwaarrdd Due Diligence, is the act of investigating and understanding the risks the company faces 09/11/14 UNIVERSITY OF WISCONSIN 18
  • 19. SSeeccuurriittyy PPoolliiccyy DDuuee CCaarree Is a statement which demonstrates that the company has accepted and taken responsibility for activities which take place in the organization 09/11/14 UNIVERSITY OF WISCONSIN 19
  • 20. HHooww DDuuee DDiilliiggeennccee DDuuee CCaarree aarree RReellaatteedd Due diligence is the understanding of the threats and risks, while due care is the countermeasures which the company has put in place to address the threats and risks 09/11/14 UNIVERSITY OF WISCONSIN 20
  • 21. IInnffoorrmmaattiioonn CCllaassssiiffiiccaattiioonn In the field of data management, data classification is defined as a tool for categorization of data to enable/help organization to effectively answer following questions: What data types are available? Where are certain data located? What access levels are implemented? What protection level is implemented and does it adhere to compliance regulations? 09/11/14 UNIVERSITY OF WISCONSIN 21
  • 22. DDaattaa CCllaassssiiffiiccaattiioonn Commercial Enterprise Military You are business students, so we will focus on commercial enterprise data classification terminology 09/11/14 UNIVERSITY OF WISCONSIN 22
  • 23. DDaattaa CCllaassssiiffiiccaattiioonn TTyyppeess Public Sensitive Private Confidential 09/11/14 UNIVERSITY OF WISCONSIN 23
  • 24. DDaattaa CCllaassssiiffiiccaattiioonn PPuubblliicc Definition: Disclosure is not welcome, but it would not cause an adverse impact or damage to the company or its employees Examples: How many people work at the company Current job positions posted on the website 09/11/14 UNIVERSITY OF WISCONSIN 24
  • 25. DDaattaa CCllaassssiiffiiccaattiioonn SSeennssiittiivvee Definition: Requires special precautions to ensure the integrity and confidentiality of the data, by preventing it from unauthorized modification or deletion. Requires higher than normal assurance of accuracy and completeness Example: Financial information Details of projects Profit earnings and forecasts 09/11/14 UNIVERSITY OF WISCONSIN 25
  • 26. DDaattaa CCllaassssiiffiiccaattiioonn PPrriivvaattee Definition: Personal information, for use only within the company. Unauthorized disclosure could adversely affect employees, the company, its business partners or customers Examples: Work history HR information Medical information 09/11/14 UNIVERSITY OF WISCONSIN 26
  • 27. DDaattaa CCllaassssiiffiiccaattiioonn CCoonnffiiddeennttiiaall Definition: For use within the company only. Exempt from disclosure under the Freedom of Information Act. Unauthorized disclosure could seriously affect a company Examples: Trade secrets Programming software code Information that keeps the company competitive 09/11/14 UNIVERSITY OF WISCONSIN 27
  • 28. DDaattaa CCllaassssiiffiiccaattiioonn PPrroocceedduurreess 1. Define classification levels 2. Specify the criteria by which data will be classified 3. Have the data owner indicate the classification level for their data 4. Identify the data custodian, who will be responsible for maintaining the data and its security level 5. Indicate the controls to be applied at each classification level 09/11/14 UNIVERSITY OF WISCONSIN 28
  • 29. DDaattaa CCllaassssiiffiiccaattiioonn PPrroocceedduurreess 6. Document any exceptions in detail 7. Indicate the methods which are used to transfer data custody to a different owner 8. Create a procedure to periodically review the data’s classification and ownership 9. Indicate declassification procedures 10. Integrate this knowledge into a security awareness program 09/11/14 UNIVERSITY OF WISCONSIN 29
  • 30. IIff YYoouu CChhoooossee ttoo CCrreeaattee YYoouu OOwwnn DDaattaa CCllaassssiiffiiccaattiioonn SSyysstteemm Too many levels will make classification complex and confusing Too few levels will encourage sloppy data classification There should be no overlap between classification levels Classification levels should be developed for both data and the systems housing the data, and they should match 09/11/14 UNIVERSITY OF WISCONSIN 30
  • 31. HHiirriinngg PPrraaccttiicceess Job skill screening Reference check Non-disclosure agreement (NDA) signed Education verification Criminal background check Credit report check Sex offender check Drug screening Professional license check Immigration status check Social Security Number trace to ensure validity 09/11/14 UNIVERSITY OF WISCONSIN 31
  • 32. EEmmppllooyyeeee CCoonnttrroollss RRoottaattiioonn ooff DDuuttiieess No one person should stay in one position for an uninterrupted period of time, as this may enable them to have too much control over a segment of business Mandatory vacation policy 09/11/14 UNIVERSITY OF WISCONSIN 32
  • 33. EEmmppllooyyeeee CCoonnttrroollss SSeeppaarraattiioonn ooff DDuuttiieess Split knowledge system: No single employee has the knowledge to do a task by themselves Example Dual control: No single employee has the physical ability to do a task by themselves Example 09/11/14 UNIVERSITY OF WISCONSIN 33
  • 34. TTeerrmmiinnaattiioonn PPrraaccttiicceess Each company needs a set of pre-defined termination procedures Example: Once terminated, the employee must be escorted out of the facility by their manager Employee must immediately surrender keys, employee badge, etc. Employee must be asked to complete an exit interview and return company property The terminated employee’s online accounts must be disabled immediately upon termination 09/11/14 UNIVERSITY OF WISCONSIN 34
  • 35. BBeewwaarree ooff DDiissggrruunnttlleedd FFoorrmmeerr EEmmppllooyyeeeess 09/11/14 UNIVERSITY OF WISCONSIN 35
  • 36. SSeeccuurriittyy AAwwaarreenneessss TTrraaiinniinngg PPrrooggrraamm One for senior management One for staff One for technical employees Responsibilities Liabilities Expectations 09/11/14 UNIVERSITY OF WISCONSIN 36
  • 37. SSeeccuurriittyy AAwwaarreenneessss SSeenniioorr MMaannaaggeemmeenntt Focus on: corporate assets, financial gains and losses which can occur due to information security incidents. They are the leaders, they must demonstrate the proper mindset to the rest of the company 09/11/14 UNIVERSITY OF WISCONSIN 37
  • 38. SSeeccuurriittyy AAwwaarreenneessss MMiidd--MMaannaaggeemmeenntt Focus on: policies, standards and guidelines and how they map to individual departments, responsibility for ensuring their employees adherence to the security policies, and how the managers will be held accountable for enforcement 09/11/14 UNIVERSITY OF WISCONSIN 38
  • 39. SSeeccuurriittyy AAwwaarreenneessss EEmmppllooyyeeeess Focus: on the operational aspects of information security, proper system usage, how to recognize a security issue and how to properly handle and report a suspected information security incident 09/11/14 UNIVERSITY OF WISCONSIN 39
  • 40. NNeexxtt CCllaassss AAcccceessss CCoonnttrrooll 09/11/14 UNIVERSITY OF WISCONSIN 40
  • 41. 09/11/14 UNIVERSITY OF WISCONSIN 41
  • 42. 09/11/14 UNIVERSITY OF WISCONSIN 42
  • 43. 09/11/14 UNIVERSITY OF WISCONSIN 43
  • 44. 09/11/14 UNIVERSITY OF WISCONSIN 44
  • 45. 09/11/14 UNIVERSITY OF WISCONSIN 45
  • 46. 09/11/14 UNIVERSITY OF WISCONSIN 46
  • 47. 09/11/14 UNIVERSITY OF WISCONSIN 47
  • 48. 09/11/14 UNIVERSITY OF WISCONSIN 48
  • 49. 09/11/14 UNIVERSITY OF WISCONSIN 49
  • 50. 09/11/14 UNIVERSITY OF WISCONSIN 50