SlideShare a Scribd company logo
1
IT SECURITY CONTROLS, PLANS, AND
PROCEDURES
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
Mr. RAJASEKAR RAMALINGAM
Department of IT, College of Applied
Sciences, Sur.
Sultanate of Oman.
http://vrrsekar.wixsite.com/raja
Based on
William Stallings, Lawrie Brown, Computer Security: Principles and
Practice, Third Edition
CONTENT
11.1 IT Security Management Implementation
11.2 Security Controls or Safeguards
11.3 IT Security Plan
11.4 Implementation of Controls
11.5 Monitoring Risks
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES 2
3
11.1 IT Security Management Implementation
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
4
11.2 Controls or Safeguards
• Controls or safeguards are
– practices, procedures or mechanisms which may
protect against a threat, reduce a vulnerability,
limit the impact of an unwanted incident, detect
unwanted incidents and facilitate recover
• Classes of controls:
– management
– operational
– technical
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
5
11.2.1 Technical Controls
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
6
11.2.2 Lists of Controls
CLASS CONTROL FAMILY
Management Risk Assessment
Management Planning
Management System and Services Acquisition
Management Certification, Accreditation, and Security Assessments
Operational Personnel Security
Operational Physical and Environmental Protection
Operational Contingency Planning
Operational Configuration Management
Operational Maintenance
Operational System and Information Integrity
Operational Media Protection
Operational Incident Response
Operational Awareness and Training
Technical Identification and Authentication
Technical Access Control
Technical Audit and Accountability
Technical System and Communications Protection
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
7
11.2.3 Residual Risk
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
8
11.2.4 Cost-Benefit Analysis
• conduct to determine appropriate controls
– greatest benefit given resources available
• qualitative or quantitative
• show cost justified by reduction in risk
• contrast impact of implementing it or not
• management chooses selection of controls
• considers if it reduces risk too much or not enough, is too costly
or appropriate
• fundamentally a business decision
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
9
11.3 IT Security Plan
• provides details of
– what will be done
– what resources are needed
– who is responsible
• should include
– risks, recommended controls, action priority
– selected controls, resources needed
– responsible personnel, implementation dates
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
10
11.4 Implementation Plan
Risk
(Asset/Threat)
Level
of
Risk
Recommended
Controls
Prio
rity
Selected
Controls
Required
Resources
Responsible
Persons
Start
– End
Date
Other
Comments
Hacker attack
on Internet
Router
High 1. disable external
telnet access
2. use detailed auditing
of privileged command
use
3. set policy for strong
admin passwords
4. set backup strategy
for router config file
5. set change control
policy for the router
configuration
1 1.
2.
3.
4.
5.
1. 3 daysIT
net admin
time to
change &
verify router
config,
write
policies;
2. 1 day of
training for
net admin
staff
John Doe,
Lead
NetworkSys
Admin,
CorporateIT
Support
Team
1-
Feb-
2006
to4-
Feb-
2006
1. need
periodic test
& review of
config &
policy use
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
11
11.4.1 Security Plan Implementation
• given plan documents what is required
• identified personnel perform needed tasks
– to implement new or enhanced controls
– may need system configuration changes, upgrades
or new system installation
– or development of new / extended procedures
– with support from management
• monitored to ensure process correct
• when completed management approves
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
12
11.4.2 Security Training / Awareness
• responsible personnel need training
– on details of design and implementation
– awareness of operational procedures
• also need general awareness for all
– spanning all levels in organization
– essential to meet security objectives
– lack leads to poor practices reducing security
– aim to convince personnel that risks exist and
breaches may have significant consequences
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
13
11.4.3 Implementation Follow-up
• security management is cyclic, repeated
• need to monitor implemented controls
• evaluate changes for security implications
– otherwise increase chance of security breach
• have a number of aspects
• which may indicate need for changes in previous stages
of process
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
14
11.4.4 Maintenance
• need continued maintenance and monitoring of implemented
controls to ensure continued correct functioning and
appropriateness
• tasks include:
– periodic review of controls
– upgrade of controls to meet new requirements
– check system changes do not impact controls
– address new threats or vulnerabilities
• goal to ensure controls perform as intended
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
15
11.4.5 Security Compliance
• audit process to review security processes
• to verify compliance with security plan
• using internal or external personnel
• usually based on checklists to check
– suitable policies and plans were created
– suitable selection of controls were
chosen
– that they are maintained and used
correctly
• often as part of wider general audit
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
16
11.4.6 Change and Configuration Management
• change management is the process to review proposed
changes to systems
– evaluate security and wider impact of changes
– part of general systems administration process
– cf. management of bug patch testing and install
– may be informal or formal
• configuration management is keeping track of
configuration and changes to each system
– to help restoring systems following a failure
– to know what patches or upgrades might be relevant
– also part of general systems administration process
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
17
11.5 Monitoring Risk
11.5.1 Incident Handling
• need procedures specifying how to respond to a security
incident
– given will most likely occur sometime
• reflect range of consequences on org
• codify action to avoid panic
• e.g. mass email worm
– exploiting vulnerabilities in common apps
– propagating via email in high volumes
– should disconnect from Internet or not?
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
18
11.5.2 Types of Security Incidents
• any action threatening classic security services
• unauthorized access to a system
– unauthorized viewing by self / other of information
– bypassing access controls
– using another users access
– denying access to another user
• unauthorized modification of info on a system
– corrupting information
– changing information without authorization
– unauthorized processing of information
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
19
11.5.3 Managing Security Incidents
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
20
11.5.4 Detecting Incidents
• reports from users or admin staff
– encourage such reporting
• detected by automated tools
– e.g. system integrity verification tools, log
analysis tools, network and host intrusion
detection systems, intrusion prevention systems
– updated to reflect new attacks or vulnerabilities
– costly so deployed if risk assess justifies
• admins must monitor vulnerability reports
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
21
11.5.5 Responding to Incidents
• need documented response procedures
– how to identify cause of the security incident
– describe action taken to recover from it
• procedures should
– identify typical categories of incidents and approach taken
to respond
– identify management personnel responsible for making
critical decisions and their contacts
– whether to report incident to police / CERT etc
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
22
11.5.6 Documenting Incidents
• need to identify vulnerability used
• and how to prevent it occurring in future
• recorded details for future reference
• consider impact on org and risk profile
– may simply be unlucky
– more likely risk profile has changed
– hence risk assessment needs reviewing
– followed by reviewing controls in use
ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES

More Related Content

What's hot

IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
CAS
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
Smart Assessment
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
Mark Conway
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
Rishi Kant
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
Deep Shankar Yadav
 
Information security governance
Information security governanceInformation security governance
Information security governance
Koen Maris
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Information risk management
Information risk managementInformation risk management
Information risk management
Akash Saraswat
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
Dejan Kosutic
 

What's hot (20)

IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Information security
Information securityInformation security
Information security
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
cyber security
cyber securitycyber security
cyber security
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Security policies
Security policiesSecurity policies
Security policies
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 

Similar to It security controls, plans, and procedures

The information security audit
The information security auditThe information security audit
The information security audit
Dhani Ahmad
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
 
Chap01
Chap01Chap01
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
AlgoSec
 
crisc_wk_4.pptx
crisc_wk_4.pptxcrisc_wk_4.pptx
crisc_wk_4.pptx
dotco
 
CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptx
rajalakshmi5921
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Donald E. Hester
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
Dhani Ahmad
 
Human resources security
Human resources securityHuman resources security
Human resources security
CAS
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
phanleson
 
CH18-CompSec4e.pptx
CH18-CompSec4e.pptxCH18-CompSec4e.pptx
CH18-CompSec4e.pptx
MuhammadYasirKhan36
 
Information system implementation, change management and control
Information system implementation, change management and controlInformation system implementation, change management and control
Information system implementation, change management and control
Shruti Pendharkar
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
parves kamal
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
Chinatu Uzuegbu
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
Dr. Lasantha Ranwala
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
it160320737038
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
Piyush Jain
 

Similar to It security controls, plans, and procedures (20)

The information security audit
The information security auditThe information security audit
The information security audit
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Chap01
Chap01Chap01
Chap01
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
crisc_wk_4.pptx
crisc_wk_4.pptxcrisc_wk_4.pptx
crisc_wk_4.pptx
 
CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptx
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
CH18-CompSec4e.pptx
CH18-CompSec4e.pptxCH18-CompSec4e.pptx
CH18-CompSec4e.pptx
 
Information system implementation, change management and control
Information system implementation, change management and controlInformation system implementation, change management and control
Information system implementation, change management and control
 
Compliance
ComplianceCompliance
Compliance
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
CAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
CAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
CAS
 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
CAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Database security
Database securityDatabase security
Database security
CAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
CAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
CAS
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
CAS
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
CAS
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systems
CAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systems
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

It security controls, plans, and procedures

  • 1. 1 IT SECURITY CONTROLS, PLANS, AND PROCEDURES ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES Mr. RAJASEKAR RAMALINGAM Department of IT, College of Applied Sciences, Sur. Sultanate of Oman. http://vrrsekar.wixsite.com/raja Based on William Stallings, Lawrie Brown, Computer Security: Principles and Practice, Third Edition
  • 2. CONTENT 11.1 IT Security Management Implementation 11.2 Security Controls or Safeguards 11.3 IT Security Plan 11.4 Implementation of Controls 11.5 Monitoring Risks ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES 2
  • 3. 3 11.1 IT Security Management Implementation ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 4. 4 11.2 Controls or Safeguards • Controls or safeguards are – practices, procedures or mechanisms which may protect against a threat, reduce a vulnerability, limit the impact of an unwanted incident, detect unwanted incidents and facilitate recover • Classes of controls: – management – operational – technical ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 5. 5 11.2.1 Technical Controls ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 6. 6 11.2.2 Lists of Controls CLASS CONTROL FAMILY Management Risk Assessment Management Planning Management System and Services Acquisition Management Certification, Accreditation, and Security Assessments Operational Personnel Security Operational Physical and Environmental Protection Operational Contingency Planning Operational Configuration Management Operational Maintenance Operational System and Information Integrity Operational Media Protection Operational Incident Response Operational Awareness and Training Technical Identification and Authentication Technical Access Control Technical Audit and Accountability Technical System and Communications Protection ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 7. 7 11.2.3 Residual Risk ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 8. 8 11.2.4 Cost-Benefit Analysis • conduct to determine appropriate controls – greatest benefit given resources available • qualitative or quantitative • show cost justified by reduction in risk • contrast impact of implementing it or not • management chooses selection of controls • considers if it reduces risk too much or not enough, is too costly or appropriate • fundamentally a business decision ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 9. 9 11.3 IT Security Plan • provides details of – what will be done – what resources are needed – who is responsible • should include – risks, recommended controls, action priority – selected controls, resources needed – responsible personnel, implementation dates ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 10. 10 11.4 Implementation Plan Risk (Asset/Threat) Level of Risk Recommended Controls Prio rity Selected Controls Required Resources Responsible Persons Start – End Date Other Comments Hacker attack on Internet Router High 1. disable external telnet access 2. use detailed auditing of privileged command use 3. set policy for strong admin passwords 4. set backup strategy for router config file 5. set change control policy for the router configuration 1 1. 2. 3. 4. 5. 1. 3 daysIT net admin time to change & verify router config, write policies; 2. 1 day of training for net admin staff John Doe, Lead NetworkSys Admin, CorporateIT Support Team 1- Feb- 2006 to4- Feb- 2006 1. need periodic test & review of config & policy use ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 11. 11 11.4.1 Security Plan Implementation • given plan documents what is required • identified personnel perform needed tasks – to implement new or enhanced controls – may need system configuration changes, upgrades or new system installation – or development of new / extended procedures – with support from management • monitored to ensure process correct • when completed management approves ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 12. 12 11.4.2 Security Training / Awareness • responsible personnel need training – on details of design and implementation – awareness of operational procedures • also need general awareness for all – spanning all levels in organization – essential to meet security objectives – lack leads to poor practices reducing security – aim to convince personnel that risks exist and breaches may have significant consequences ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 13. 13 11.4.3 Implementation Follow-up • security management is cyclic, repeated • need to monitor implemented controls • evaluate changes for security implications – otherwise increase chance of security breach • have a number of aspects • which may indicate need for changes in previous stages of process ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 14. 14 11.4.4 Maintenance • need continued maintenance and monitoring of implemented controls to ensure continued correct functioning and appropriateness • tasks include: – periodic review of controls – upgrade of controls to meet new requirements – check system changes do not impact controls – address new threats or vulnerabilities • goal to ensure controls perform as intended ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 15. 15 11.4.5 Security Compliance • audit process to review security processes • to verify compliance with security plan • using internal or external personnel • usually based on checklists to check – suitable policies and plans were created – suitable selection of controls were chosen – that they are maintained and used correctly • often as part of wider general audit ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 16. 16 11.4.6 Change and Configuration Management • change management is the process to review proposed changes to systems – evaluate security and wider impact of changes – part of general systems administration process – cf. management of bug patch testing and install – may be informal or formal • configuration management is keeping track of configuration and changes to each system – to help restoring systems following a failure – to know what patches or upgrades might be relevant – also part of general systems administration process ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 17. 17 11.5 Monitoring Risk 11.5.1 Incident Handling • need procedures specifying how to respond to a security incident – given will most likely occur sometime • reflect range of consequences on org • codify action to avoid panic • e.g. mass email worm – exploiting vulnerabilities in common apps – propagating via email in high volumes – should disconnect from Internet or not? ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 18. 18 11.5.2 Types of Security Incidents • any action threatening classic security services • unauthorized access to a system – unauthorized viewing by self / other of information – bypassing access controls – using another users access – denying access to another user • unauthorized modification of info on a system – corrupting information – changing information without authorization – unauthorized processing of information ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 19. 19 11.5.3 Managing Security Incidents ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 20. 20 11.5.4 Detecting Incidents • reports from users or admin staff – encourage such reporting • detected by automated tools – e.g. system integrity verification tools, log analysis tools, network and host intrusion detection systems, intrusion prevention systems – updated to reflect new attacks or vulnerabilities – costly so deployed if risk assess justifies • admins must monitor vulnerability reports ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 21. 21 11.5.5 Responding to Incidents • need documented response procedures – how to identify cause of the security incident – describe action taken to recover from it • procedures should – identify typical categories of incidents and approach taken to respond – identify management personnel responsible for making critical decisions and their contacts – whether to report incident to police / CERT etc ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES
  • 22. 22 11.5.6 Documenting Incidents • need to identify vulnerability used • and how to prevent it occurring in future • recorded details for future reference • consider impact on org and risk profile – may simply be unlucky – more likely risk profile has changed – hence risk assessment needs reviewing – followed by reviewing controls in use ITSY3104 COMPUTER SECURITY - A - LECTURE 11 - IT SECURITY CONTROLS, PLANS, AND PROCEDURES