SlideShare a Scribd company logo
Workshop 2
Management Structuresfor
ITSecurity
Executive summery and key findings
13th IT Conference at
Ministry of Higher Education
Presented by:
ZohraZekeria
The image part20 December 2017
Contents
–Introduction
–Workshop Summary
Workshop 2: Management Structures for IT Security 2
Introduction
–Afghanistan has already traveled a
considerable distance in the past 15
years.
–Wide variety of work process are being
handled using IT services:
–Ministries and Institutions
–Banks and Mobile communication
–Identification cards (Tazkira) and Election
Workshop 2: Management Structures for IT Security 3
New
Challenges
for the
Country
–Effective and secure operation of all
these technologies and services greatly
depends on:
–Reliable IT infrastructures
–Effective management system
–Secure IT systems etc.
–Threats
–Malware (Spam, phishing
–Targeted attacks
–Human errors
Workshop 2: Management Structures for IT Security 4
Information
Security in
Afghanistan
–From 2011 to 2015 the total loss
associated with cyber crimes was 1.3
billion AFN (afghani)
–Most of these — 70 percent — were
committed by internal staff at financial
institutions.
–Three out of four computers in
Afghanistan are infected with malware,
meaning roughly 75 of Internet traffic is
infected. [1]
Workshop 2: Management Structures for IT Security 5
What is
Information
Security
Management
System?
–A systematic and structured approach to
manage information so that it remains
secure.
Workshop 2: Management Structures for IT Security 6
It is a Management process
It is not a technological process
Workshop
Overview
– Morning Session
- Presentations
– Afternoon Session
- Discussion+ Q&A
7Workshop 2: Management Structures for IT Security
Speakers
– Mustafa Naier and ZohraZekeria
- Lecturers at Kabul PolytechnicUniversity
– Said JawadSaidi
- Lecturer at Kabul EducationUniversity
– Niaz Mohammed Ramaki
- Lecturer at Kabul PolytechnicUniversity
8Workshop 2: Management Structures for IT Security
Topics
Covered
1. CurrentSituation of Network and Internet
Policy
2. Result of IT SecurityAnalysis
3. Role of Organization Administration in
Information Security
4. Botnets: A destructive force to Cyber
Security
9Workshop 2: Management Structures for IT Security
Current
Situation of
Network and
Internet
Policy
–In Afghanistan
–The networks have problem regarding to
its performance, traffic logged , network
management, and security policies.
–NCSA (2014-2015) have started to work on
some of the policies but the state of its
implementation is unknown
–Lack of policy, awareness and enforcement
10Workshop 2: Management Structures for IT Security
Result of IT
Security
Analysis
SecurityChecklists
Workshop 2: Management Structures for IT Security 11
CommonAspects
Application Development Security
Workshop 2: Management Structures for IT Security 12
27,08
1,99
20,00
8,98
7,00
10,16
55,21
24,38
51,58
19,16
44,00
35,94
17,71
73,63
28,42
71,86
49,00
53,91
Infrastructure Common	Aspects IT	Systems Network Application Application	Development
MoWA	Survey	Result
Yes	(%) No	(%) Not	Applicable	(%)
Workshop 2: Management Structures for IT Security 13
3,125 0 6,32
8,98
39
81,25
75
0
10,53
19,76
12
9,375
21,875
100
83,16
71,26
49
9,375
Infrastructure Common	Aspects IT	Systems Network Application	Security Application	Development	Security
MoEW	Survey	Result
Yes	(%) No	(%) Not	applicable	(%)
Result
IT security situation throughout Afghanistan is
insufficient and inadequate, mainly due to the
following aspects:
– Insufficientorganizationalstructures
– Lack of qualifiedIT personnel
– Absence of solidIT infrastructures
– VulnerabilitiesinIT systems (hardware and
software)
– Communicationand networks
– Emergencyplanning
– Nation-wideIT security policy
Workshop 2: Management Structures for IT Security 14
–Creation of an effective IT security
managementsystem
–Establishment of anAuthority for
Security in InformationTechnology in
Afghanistan
Workshop 2: Management Structures for IT Security 15
Role of
Organization
Administrati
on in
Information
Security
– Critical Success Factor for ISMS
– Visible Support and Commitment from All Levels of
Management
Workshop 2: Management Structures for IT Security 16
Management
Principles for
Achieving
Security
Objectives
–Initiative for information security should
originate in the management level
–Top management level is responsible in general
for information security
–Management level acts as a role model when it
comes to information security
Workshop 2: Management Structures for IT Security 17
Fundamental
Contribution
from
Management
Provision to fund information security
management activities
Workshop 2: Management Structures for IT Security 18
Botnets: A
destructive
force to
Cyber
Security
– Botnets are one of the greatest cyber threats in this time
– Bot masters endeavor to keep their identity hide, using P2P
technology
– The next generationof botnets will target wider rangeof
attacks than present day botnets
– Most of IoT devices are vulnerable to botnets
Workshop 2: Management Structures for IT Security 19
– Deploy an email security gateway, to check email
traffic
– Utilize corporate firewalls, for detecting suspicious port
use or unknown transactions
– Deploy a web security gateway, to protect
downloadingcontents
– Deploy endpoint security with active/behavioral
monitoring
Workshop 2: Management Structures for IT Security 20
Discussion
Questions
and answers
–Challenges
Workshop 2: Management Structures for IT Security 21
Connectivity
Lack of
Information
Security
Management
System
Nation-wide
IT security
policy
Lack of
standardized
server form
Unlicensed
software
Lack of IT
Security
awareness
Discussion
Questions
and answers
–Challenges + Solutions
Workshop 2: Management Structures for IT Security 22
Connectivity
Lack of
Information
Security
Management
System
Nation-wide
IT security
policy
Lack of
standardized
server form
Unlicensed
software
Lack of IT
Security
awareness
Establishment of
anAfghanIXP
Establishmentof an authority
for security in Information
TechnologyinAfghanistan
Challenges of
Establishing
a
Management
Structure for
ITSecurity
Workshop 2: Management Structures for IT Security 23
Political
issues
Organizational issues
Qualified
Human
Resource
Funding
Project
Maintenance
Executive
Summary
Workshop 2: Management Structures for IT Security 24
Secure IT Culture
Training programs
and courses
Seminars and
conferences
Journals
Bulletin boards
Posters
Media coverage
Daily news websites
Security policy
Guidelines
A solid management structure (Office)
Mitigating risks for IT and cyberspace in
Afghanistan
Protecting networks
Maintaining a trustworthy operationof the IT
supply of the country
Thanks for your
attention
Workshop 2: Management Structuresfor IT Security 25
Workshop 2: Management Structuresfor IT Security 26
Reference
[1]. Z.Wafa, “Cyber Security inAfghanistan,” Unipath, 20-Aug-2015
[2]. IT Security Team, ITCCAfghanistan,IT Security Strategic Plan for
Afghanistan,Setting up anAuthority for Security in InformationTechnology
,September 30, 2017
[3]. IT Security Team, ITCCAfghanistan,Ministry of Energy and Water
Survey Report,July,30,2017
Workshop 2: Management Structures for IT Security 27

More Related Content

What's hot

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
Sustainable Resources Management
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
Epic Sales Presentation
Epic Sales PresentationEpic Sales Presentation
Epic Sales Presentation
dpsmith1968
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
Sukanya Ben
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
ijcsit
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
SsendiSamuel
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstractCarahsoft
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
Exosite
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
Amir Khan
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
omriyad
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 
Internet of things
Internet of thingsInternet of things
Internet of things
varungoyal98
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
IOSR Journals
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 Introduction
ITU
 
Web application firewall solution market
Web application firewall solution marketWeb application firewall solution market
Web application firewall solution market
SameerShaikh225
 

What's hot (20)

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Epic Sales Presentation
Epic Sales PresentationEpic Sales Presentation
Epic Sales Presentation
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 Introduction
 
Web application firewall solution market
Web application firewall solution marketWeb application firewall solution market
Web application firewall solution market
 

Similar to Management Structures for IT Security

188
188188
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
zahidab112233
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
Sachithra Gayan
 
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKSTWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
ijcsit
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
sajid mehmood
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
IJECEIAES
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
Jeewanthi Fernando
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
bijejournal
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
Abbie Barbir
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
BDPA Education and Technology Foundation
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
AnushkaThakur11
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
Smart Grid Interoperability Panel
 
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI ImplementationIRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET Journal
 

Similar to Management Structures for IT Security (20)

188
188188
188
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKSTWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI ImplementationIRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Management Structures for IT Security

  • 1. Workshop 2 Management Structuresfor ITSecurity Executive summery and key findings 13th IT Conference at Ministry of Higher Education Presented by: ZohraZekeria The image part20 December 2017
  • 2. Contents –Introduction –Workshop Summary Workshop 2: Management Structures for IT Security 2
  • 3. Introduction –Afghanistan has already traveled a considerable distance in the past 15 years. –Wide variety of work process are being handled using IT services: –Ministries and Institutions –Banks and Mobile communication –Identification cards (Tazkira) and Election Workshop 2: Management Structures for IT Security 3
  • 4. New Challenges for the Country –Effective and secure operation of all these technologies and services greatly depends on: –Reliable IT infrastructures –Effective management system –Secure IT systems etc. –Threats –Malware (Spam, phishing –Targeted attacks –Human errors Workshop 2: Management Structures for IT Security 4
  • 5. Information Security in Afghanistan –From 2011 to 2015 the total loss associated with cyber crimes was 1.3 billion AFN (afghani) –Most of these — 70 percent — were committed by internal staff at financial institutions. –Three out of four computers in Afghanistan are infected with malware, meaning roughly 75 of Internet traffic is infected. [1] Workshop 2: Management Structures for IT Security 5
  • 6. What is Information Security Management System? –A systematic and structured approach to manage information so that it remains secure. Workshop 2: Management Structures for IT Security 6 It is a Management process It is not a technological process
  • 7. Workshop Overview – Morning Session - Presentations – Afternoon Session - Discussion+ Q&A 7Workshop 2: Management Structures for IT Security
  • 8. Speakers – Mustafa Naier and ZohraZekeria - Lecturers at Kabul PolytechnicUniversity – Said JawadSaidi - Lecturer at Kabul EducationUniversity – Niaz Mohammed Ramaki - Lecturer at Kabul PolytechnicUniversity 8Workshop 2: Management Structures for IT Security
  • 9. Topics Covered 1. CurrentSituation of Network and Internet Policy 2. Result of IT SecurityAnalysis 3. Role of Organization Administration in Information Security 4. Botnets: A destructive force to Cyber Security 9Workshop 2: Management Structures for IT Security
  • 10. Current Situation of Network and Internet Policy –In Afghanistan –The networks have problem regarding to its performance, traffic logged , network management, and security policies. –NCSA (2014-2015) have started to work on some of the policies but the state of its implementation is unknown –Lack of policy, awareness and enforcement 10Workshop 2: Management Structures for IT Security
  • 11. Result of IT Security Analysis SecurityChecklists Workshop 2: Management Structures for IT Security 11 CommonAspects Application Development Security
  • 12. Workshop 2: Management Structures for IT Security 12 27,08 1,99 20,00 8,98 7,00 10,16 55,21 24,38 51,58 19,16 44,00 35,94 17,71 73,63 28,42 71,86 49,00 53,91 Infrastructure Common Aspects IT Systems Network Application Application Development MoWA Survey Result Yes (%) No (%) Not Applicable (%)
  • 13. Workshop 2: Management Structures for IT Security 13 3,125 0 6,32 8,98 39 81,25 75 0 10,53 19,76 12 9,375 21,875 100 83,16 71,26 49 9,375 Infrastructure Common Aspects IT Systems Network Application Security Application Development Security MoEW Survey Result Yes (%) No (%) Not applicable (%)
  • 14. Result IT security situation throughout Afghanistan is insufficient and inadequate, mainly due to the following aspects: – Insufficientorganizationalstructures – Lack of qualifiedIT personnel – Absence of solidIT infrastructures – VulnerabilitiesinIT systems (hardware and software) – Communicationand networks – Emergencyplanning – Nation-wideIT security policy Workshop 2: Management Structures for IT Security 14
  • 15. –Creation of an effective IT security managementsystem –Establishment of anAuthority for Security in InformationTechnology in Afghanistan Workshop 2: Management Structures for IT Security 15
  • 16. Role of Organization Administrati on in Information Security – Critical Success Factor for ISMS – Visible Support and Commitment from All Levels of Management Workshop 2: Management Structures for IT Security 16
  • 17. Management Principles for Achieving Security Objectives –Initiative for information security should originate in the management level –Top management level is responsible in general for information security –Management level acts as a role model when it comes to information security Workshop 2: Management Structures for IT Security 17
  • 18. Fundamental Contribution from Management Provision to fund information security management activities Workshop 2: Management Structures for IT Security 18
  • 19. Botnets: A destructive force to Cyber Security – Botnets are one of the greatest cyber threats in this time – Bot masters endeavor to keep their identity hide, using P2P technology – The next generationof botnets will target wider rangeof attacks than present day botnets – Most of IoT devices are vulnerable to botnets Workshop 2: Management Structures for IT Security 19
  • 20. – Deploy an email security gateway, to check email traffic – Utilize corporate firewalls, for detecting suspicious port use or unknown transactions – Deploy a web security gateway, to protect downloadingcontents – Deploy endpoint security with active/behavioral monitoring Workshop 2: Management Structures for IT Security 20
  • 21. Discussion Questions and answers –Challenges Workshop 2: Management Structures for IT Security 21 Connectivity Lack of Information Security Management System Nation-wide IT security policy Lack of standardized server form Unlicensed software Lack of IT Security awareness
  • 22. Discussion Questions and answers –Challenges + Solutions Workshop 2: Management Structures for IT Security 22 Connectivity Lack of Information Security Management System Nation-wide IT security policy Lack of standardized server form Unlicensed software Lack of IT Security awareness Establishment of anAfghanIXP Establishmentof an authority for security in Information TechnologyinAfghanistan
  • 23. Challenges of Establishing a Management Structure for ITSecurity Workshop 2: Management Structures for IT Security 23 Political issues Organizational issues Qualified Human Resource Funding Project Maintenance
  • 24. Executive Summary Workshop 2: Management Structures for IT Security 24 Secure IT Culture Training programs and courses Seminars and conferences Journals Bulletin boards Posters Media coverage Daily news websites Security policy Guidelines A solid management structure (Office) Mitigating risks for IT and cyberspace in Afghanistan Protecting networks Maintaining a trustworthy operationof the IT supply of the country
  • 25. Thanks for your attention Workshop 2: Management Structuresfor IT Security 25
  • 26. Workshop 2: Management Structuresfor IT Security 26
  • 27. Reference [1]. Z.Wafa, “Cyber Security inAfghanistan,” Unipath, 20-Aug-2015 [2]. IT Security Team, ITCCAfghanistan,IT Security Strategic Plan for Afghanistan,Setting up anAuthority for Security in InformationTechnology ,September 30, 2017 [3]. IT Security Team, ITCCAfghanistan,Ministry of Energy and Water Survey Report,July,30,2017 Workshop 2: Management Structures for IT Security 27