Lesson Information security management present the content: threats to information security; senior management’s security role; data safeguards are available; should organizations respond to security incidents.
Trang 1Lecture 11: Information Security
Management
Nga.lethiquynh@ueh.edu.vn
Trang 2Q4 What data safeguards are available?
Q5 What human safeguards are available?
Q6 How should organizations respond to
Trang 3Q1: What are the threats
to information security?
Trang 4Threats to information security
► Sources of Threats?
► human error and mistakes:
► accidental problems caused by both employees and nonemployees
► poorly written application programs and poorly designed procedures
► physical accidents
► malicious human activity
► employees and former employees who intentionally destroy data
► Hackers
► natural events and disasters
► fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and
Trang 5Threats to information security
Source: Textbook [1], page 409
Trang 6► Unauthorized Data Disclosure
► Pretexting: when someone deceives by pretending to be
someone else
► Phishing: uses pretexting via email
► Spoofing: another term for someone pretending to be
someone else
► IP spoofing: occurs when an intruder uses another site’s IP address as if
it were that other site
► Email spoofing: a synonym for phishing
► Sniffing: intercepting computer communications
► Drive-by sniffers: take computers with wireless connections through an area and search for unprotected wireless networks
Threats to information security
Trang 7► Incorrect Data Modification
► Procedures incorrectly designed or not followed
► Increasing a customer’s discount or incorrectly modifying employee’s salary
► Placing incorrect data on company the Web site
► Improper internal controls on systems
► System errors
► Faulty recovery actions after a disaster
Threats to information security
Trang 8Threats to information security -
Faulty Service
•Incorrect data modification
•Systems working incorrectly
•Procedural mistakes
•Programming errors
•IT installation errors
•Usurpation
•Denial of service (unintentional)
•Denial-of-service attacks (intentional)
Trang 9Threats to information security - Loss of
Infrastructure
• Human accidents.
• Theft and terrorist events.
• Disgruntled or terminated employee.
• Natural disasters.
• Advanced Persistent Threat (APT)
► Sophisticated, possibly long-running
computer hack perpetrated by large,
well-funded organizations
Trang 10What Are the Components of an
Organization’s Security Program?
► 3 components
► senior-management involvement
► establish the security policy
► manage risk by balancing the costs and benefits
of the security program
► Safeguards: protections against security
threats
► organization’s planned response to security
incidents
Trang 11Security Safeguards
Source: Textbook [1], page 411
Trang 12Q2: What is senior
management’s security role?
Trang 13Senior management’s security role
► establish the security policy
► What sensitive data the organization will store.
► How it will process that data.
► Whether data will be shared with other
organizations.
► How employees and others can obtain copies of
data stored about them.
► How employees and others can request changes to
inaccurate data.
► What employees can do with their own mobile
devices at work
► …
Trang 14► Manage Risk
► Risk is the likelihood of an adverse occurrence
► Risk Assessment:
occur, and what the consequences are if they do occur
► Risk-Management Decisions : decide what to do
Risk Assessment Factors Source: textbook [1], page 415
Senior management’s security role
Trang 15Q3 What technical
safeguards are available?
Trang 16Technical safeguards
Source: Textbook [1], page 418
Trang 17Essence of https (SSL or TLS)
Source: Textbook [1], page 422
Trang 18Digital Signatures
Source: Textbook [1], page 423
Trang 19Malware Protection
► A virus is a computer program that
replicates itself
► Trojan horses are viruses that masquerade
as useful programs or files
► A worm is a virus that propagates using
the Internet or other computer network
► Spyware programs are installed on the
user’s computer without the user’s
Trang 20Malware Protection
1. Antivirus and antispyware programs.
2. Scan frequently.
3. Update malware definitions.
4. Open email attachments only from
known sources.
5. Install software updates.
6. Browse only reputable Internet
neighborhoods.
Trang 21Q4 What data safeguards
are available?
Trang 22Data safeguards
Source: Textbook [1], page 427
Trang 23Q5 What human
safeguards are available?
Trang 24Human safeguards
Trang 25Account Administration
► Account Management
Standards for new user accounts, modification of account permissions, and removal of accounts that are not needed
Trang 26Sample Account Acknowledgment
Form
Source: Textbook [1], page 431
Trang 27Systems Procedures
Source: Textbook [1], page 432
Trang 28Q6 How should organizations
respond to security Incidents?
Trang 29How should organizations respond to
security Incidents?
Source: Textbook [1], page 435
Trang 30Q4 What data safeguards are available?
Q5 What human safeguards are available?
Q6 How should organizations respond to
Trang 31Additional Resources
► 2017-Ransomeware ‘WannaCry’ attack
explained
► 2017-Impact of WannaCry