1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Note Professional practices in information technology - Lecture No. 30: Information Security (Cont’d)

7 55 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 7
Dung lượng 292,67 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Lecture Note Professional practices in information technology - Lecture No. 30: Information Security (Cont’d). After studying this chapter you will be able to understand: Organizational structures, roles and responsibilities, information classification, risk management.

Trang 1

Professional Practices in

Information Technology

HandBook

7, aL Ì

COMSATS Institute of Information

Technology

(Virtual Campus) Islamabad, Pakistan

Trang 2

Lecture 30

Information Security (Cont’d) 30.1 Overview

Organizational Structures

Roles and Responsibilities

Information Classification

Risk Management

> Organizational Structure

Organization of and official responsibilities for security vary

— BoD, CEO, BoD Committee

— Director, Manager

IT/IS Security

Audit

> Typical Organizational Chart

Trang 3

Board of Directors/Trustees President |

eee

Figure 30.1: Typical Organizational Chart

> Security-Oriented Org Chart

clo

|

—— IRBEENEM -s¬¬ NNHMHEE

Figure 30.2: Security-Oriented Org Chart

Trang 4

> Further Separation

Security Analyst

Figure 30.3: Further Separation

> Organizational Structure

Audit should be separate from implementation and operations

— Independence is not compromised

Responsibilities for security should be defined in job descriptions

Senior management has ultimate responsibility for security

Security officers/managers have functional responsibility

> Roles and Responsibilities

Best Practices:

— Least Privilege

— Mandatory Vacations

Trang 5

— Job Rotation

— Separation of Duties

Owners

— Determine security requirements

Custodians

— Manage security based on requirements

Users

— Access as allowed by security requirements

> Information Classification

— Not all information has thesame value

—— Need to evaluate value based on CIA

— Value determines protection level

— Protection levels determine procedures

— Labeling informs users on handling

Government classifications:

— Top Secret

—— Secret

Trang 6

— Confidential

—— Sensitive but Unclassified

Private Sector classifications:

— Confidential

— Private

—— Sensitive

—= Public

Criteria:

— Value

— Age

— Useful Life

— Personal Association

> Risk Management

Risk Management is identifying, evaluating, and mitigating risk to an organization

— It’s a cyclical, continuous process

— Need to know what you have

— Need to know what threats are likely

Trang 7

— Need to know how and how well it is protected

— Need to know where the gaps are

> Identification

Assets

Threats

—— Threat-sources: man-made, natural

Vulnerabilities

—— Weakness

Controls

— Safeguard

Ngày đăng: 30/01/2020, 10:00

TỪ KHÓA LIÊN QUAN