Lecture Note Professional practices in information technology - Lecture No. 30: Information Security (Cont’d). After studying this chapter you will be able to understand: Organizational structures, roles and responsibilities, information classification, risk management.
Trang 1Professional Practices in
Information Technology
HandBook
7, aL Ì
COMSATS Institute of Information
Technology
(Virtual Campus) Islamabad, Pakistan
Trang 2Lecture 30
Information Security (Cont’d) 30.1 Overview
Organizational Structures
Roles and Responsibilities
Information Classification
Risk Management
> Organizational Structure
Organization of and official responsibilities for security vary
— BoD, CEO, BoD Committee
— Director, Manager
IT/IS Security
Audit
> Typical Organizational Chart
Trang 3Board of Directors/Trustees President |
eee
Figure 30.1: Typical Organizational Chart
> Security-Oriented Org Chart
clo
|
—— IRBEENEM -s¬¬ NNHMHEE
Figure 30.2: Security-Oriented Org Chart
Trang 4> Further Separation
Security Analyst
Figure 30.3: Further Separation
> Organizational Structure
Audit should be separate from implementation and operations
— Independence is not compromised
Responsibilities for security should be defined in job descriptions
Senior management has ultimate responsibility for security
Security officers/managers have functional responsibility
> Roles and Responsibilities
Best Practices:
— Least Privilege
— Mandatory Vacations
Trang 5— Job Rotation
— Separation of Duties
Owners
— Determine security requirements
Custodians
— Manage security based on requirements
Users
— Access as allowed by security requirements
> Information Classification
— Not all information has thesame value
—— Need to evaluate value based on CIA
— Value determines protection level
— Protection levels determine procedures
— Labeling informs users on handling
Government classifications:
— Top Secret
—— Secret
Trang 6— Confidential
—— Sensitive but Unclassified
Private Sector classifications:
— Confidential
— Private
—— Sensitive
—= Public
Criteria:
— Value
— Age
— Useful Life
— Personal Association
> Risk Management
Risk Management is identifying, evaluating, and mitigating risk to an organization
— It’s a cyclical, continuous process
— Need to know what you have
— Need to know what threats are likely
Trang 7— Need to know how and how well it is protected
— Need to know where the gaps are
> Identification
Assets
Threats
—— Threat-sources: man-made, natural
Vulnerabilities
—— Weakness
Controls
— Safeguard