SlideShare une entreprise Scribd logo
1  sur  25
Security Policies and
Standards
Introduction
 Organization
 Collection of people working together toward a common goal
 Must have clear understanding of the rules of acceptable behavior
 Policy
 Conveys management’s intentions to its employees
 Effective security program
 Use of a formal plan to implement and manage security in the
organization
Policies,
Standards, and
Procedures
 Policy
 Set of guidelines or instructions
 Organization’s senior management implements
 Idea
 Standards
 More detailed descriptions of what must be done to comply with
policy
 Specifics and outline
 Procedures
 How to accomplish the policies and standards
Effective
Policies
 For a policy to be considered effective and legally enforceable:
 Dissemination
 Distribution of the information
 Is it in a readily available place?
 Review
 Has it been read?
 Who is reading it?
 Comprehension
 Is it understandable?
 Too confusing?
 Compliance
 Acknowledge vs. Agree
 Uniform enforcement
 How are violations being handled?
What Drives
Policy
Development?
 Mission of an organization
 Written statement of purpose of organization
 Usually Not Modified
 Vision of an organization
 Witten statement of the organization’s long-term goals
 Occasionally Modified
 Strategic planning
 Process of moving the organization toward its vision.
 Constantly Reworked to promote progress
 Security policy
 Set of rules that protects an organization’s assets
 Question:What are some security policies you are aware of?
Types of
Information
Security
Policies
 Information security policy
 Set of rules for the protection of an organization’s information
assets
 Enterprise information security policies
 General security policy
 Issue-specific security policies
 Specific technology policy
 Systems-specific security policies
 Configurations
Enterprise
Information
Security Policy
(EISP)
 Supports the mission, vision, and direction of the organization
 Sets the strategic direction, scope, and tone for all security efforts
 Executive-level document
 Drafted by organization’s chief information officer
 Expresses the security philosophy within the IT environment
 Guides the development, implementation, and management of
the security program
 Address an organization’s need to comply with laws and
regulations in two ways:
 General compliance
 Identification of specific penalties and disciplinary actions
Components
of EISP
Issue-Specific
Security Policy
(ISSP)
 Addresses specific areas of technology
 Requires frequent updates
 Contains a statement on the organization’s position on a specific
issue
 May cover:
 Use of company-owned networks and the Internet
 Use of telecommunications technologies (fax and phone)
 Use of electronic mail
 Specific minimum configurations of computers to defend against
worms and viruses
 Prohibitions against hacking or testing organization security
controls
 Home use of company-owned computer equipment
 Use of personal equipment on company networks
 Use of photocopy equipment
Components
of ISSP
Systems-
Specific Policy
(SysSP)
 Appear with the managerial guidance expected in a policy
 Include detailed technical specifications not usually found in other types of
policy documents
 Managerial Guidance SysSPs
 Guide the implementation and configuration of a specific technology
 Technical Specifications SysSPs
 General methods for implementing technical controls
 Access control lists
 Set of specifications that identifies a piece of technology’s authorized users and
includes details on the rights and privileges those users have on that technology
 Access control matrix
 Combines capability tables and ACLs
 Configuration rules
 Specific instructions entered into a security system to regulate how it reacts to the
data it receives
 Rule-based policies
 More specific to a system’s operation than ACLs
 May or may not deal with users directly
Frameworks
and Industry
Standards
 Security blueprint
 Basis for the design, selection, and implementation of all security
program elements
 Security framework
 Outline of the overall information security strategy
 Roadmap for planned changes to the organization’s information
security environment
 The ISO 27000 Series
 NIST Model
NISTSecurity
Models
 Computer Security Resource Center (CSRC) publications
 SP 800-14: Generally Accepted Principles and Practices for Securing
InformationTechnology Systems
 Lists the principles and practices to be used in the development of a
security blueprint
 SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
 Provides an overview of the capabilities and technologies of firewalls
and firewall policies
 SP 800-53 Rev. 3: Recommended Security Controls for Federal
Information Systems and Organizations
 Describes the selection and implementation of security controls for
information security to lower the possibility of successful attack from
threats
 SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in
Federal Information Systems: Building Effective Security
Assessment Plans
 Provides a systems developmental lifecycle approach to security
assessment of information systems
Other NIST
Perimeter
Defense
Publications
Benchmarking
and Best
Practices
 Best practices
 Procedures that are accepted or prescribed as being correct or most
effective
 Benchmarking
 Evaluation against a standard
 Spheres of security - Generalized foundation of a good security
framework
 Controls -Implemented between systems and the information,
between networks and the computer systems, and between the
Internet and internal networks
 Information security - Designed and implemented in three layers:
policies, people (education, training, and awareness programs), and
technology
Spheres of
Security
Security
Education,
Training, and
Awareness
Program
 Education, training, and awareness (SETA) program
 Responsibility of the CISO
 Control measure designed to reduce the incidences of accidental
security breaches by employees
 Designed to supplement the general education and training
programs
Purpose of
SETA
 The Program Elements:
 Security education
 Provide Opportunity , Inform
 TheWhy
 Security training
 Hands-on Education and Experience
 The How
 Security awareness
 Reinforce
 TheWhat
 Purpose of SETA is to enhance security by:
 Improving awareness of the need to protect system resources
 Developing skills and knowledge so computer users can perform
their jobs more securely
 Building in-depth knowledge, as needed, to design, implement, or
operate security programs for organizations and systems
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
DTCC’sOwn
Newsletter
Summary
 Policy
 Basis for all information security planning, design, and deployment
 Security team develops a design blueprint used to implement the
security program
 Implement a security education, training, and awareness (SETA)
program
 Supplement the general education and training programs

Contenu connexe

Tendances

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.pptZaheer720515
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDumindu Pahalawatta
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 

Tendances (20)

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Software security
Software securitySoftware security
Software security
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
System security
System securitySystem security
System security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Information security
Information securityInformation security
Information security
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Information Security
Information SecurityInformation Security
Information Security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 

Similaire à Security Policies and Standards

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docxdurantheseldine
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managGrazynaBroyles24
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Bonagiri Rajitha
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxManushiKhatri
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 

Similaire à Security Policies and Standards (20)

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
Chapter003
Chapter003Chapter003
Chapter003
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptx
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 

Plus de primeteacher32

Plus de primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Dernier

原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量sehgh15heh
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024Bruce Bennett
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 
Spanish Classes Online In India With Tutor At Affordable Price
Spanish Classes Online In India With Tutor At Affordable PriceSpanish Classes Online In India With Tutor At Affordable Price
Spanish Classes Online In India With Tutor At Affordable PriceFluent Fast Academy
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证nhjeo1gg
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024Bruce Bennett
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一A SSS
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewNilendra Kumar
 
The Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating PressThe Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating Pressmatingpress170
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping materialnadeemcollege26
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathanBaughman3
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...nitagrag2
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 

Dernier (20)

原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
Spanish Classes Online In India With Tutor At Affordable Price
Spanish Classes Online In India With Tutor At Affordable PriceSpanish Classes Online In India With Tutor At Affordable Price
Spanish Classes Online In India With Tutor At Affordable Price
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
 
The Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating PressThe Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating Press
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping material
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editor
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 

Security Policies and Standards

  • 2. Introduction  Organization  Collection of people working together toward a common goal  Must have clear understanding of the rules of acceptable behavior  Policy  Conveys management’s intentions to its employees  Effective security program  Use of a formal plan to implement and manage security in the organization
  • 3. Policies, Standards, and Procedures  Policy  Set of guidelines or instructions  Organization’s senior management implements  Idea  Standards  More detailed descriptions of what must be done to comply with policy  Specifics and outline  Procedures  How to accomplish the policies and standards
  • 4. Effective Policies  For a policy to be considered effective and legally enforceable:  Dissemination  Distribution of the information  Is it in a readily available place?  Review  Has it been read?  Who is reading it?  Comprehension  Is it understandable?  Too confusing?  Compliance  Acknowledge vs. Agree  Uniform enforcement  How are violations being handled?
  • 5. What Drives Policy Development?  Mission of an organization  Written statement of purpose of organization  Usually Not Modified  Vision of an organization  Witten statement of the organization’s long-term goals  Occasionally Modified  Strategic planning  Process of moving the organization toward its vision.  Constantly Reworked to promote progress  Security policy  Set of rules that protects an organization’s assets  Question:What are some security policies you are aware of?
  • 6. Types of Information Security Policies  Information security policy  Set of rules for the protection of an organization’s information assets  Enterprise information security policies  General security policy  Issue-specific security policies  Specific technology policy  Systems-specific security policies  Configurations
  • 7. Enterprise Information Security Policy (EISP)  Supports the mission, vision, and direction of the organization  Sets the strategic direction, scope, and tone for all security efforts  Executive-level document  Drafted by organization’s chief information officer  Expresses the security philosophy within the IT environment  Guides the development, implementation, and management of the security program  Address an organization’s need to comply with laws and regulations in two ways:  General compliance  Identification of specific penalties and disciplinary actions
  • 9. Issue-Specific Security Policy (ISSP)  Addresses specific areas of technology  Requires frequent updates  Contains a statement on the organization’s position on a specific issue  May cover:  Use of company-owned networks and the Internet  Use of telecommunications technologies (fax and phone)  Use of electronic mail  Specific minimum configurations of computers to defend against worms and viruses  Prohibitions against hacking or testing organization security controls  Home use of company-owned computer equipment  Use of personal equipment on company networks  Use of photocopy equipment
  • 11. Systems- Specific Policy (SysSP)  Appear with the managerial guidance expected in a policy  Include detailed technical specifications not usually found in other types of policy documents  Managerial Guidance SysSPs  Guide the implementation and configuration of a specific technology  Technical Specifications SysSPs  General methods for implementing technical controls  Access control lists  Set of specifications that identifies a piece of technology’s authorized users and includes details on the rights and privileges those users have on that technology  Access control matrix  Combines capability tables and ACLs  Configuration rules  Specific instructions entered into a security system to regulate how it reacts to the data it receives  Rule-based policies  More specific to a system’s operation than ACLs  May or may not deal with users directly
  • 12. Frameworks and Industry Standards  Security blueprint  Basis for the design, selection, and implementation of all security program elements  Security framework  Outline of the overall information security strategy  Roadmap for planned changes to the organization’s information security environment  The ISO 27000 Series  NIST Model
  • 13. NISTSecurity Models  Computer Security Resource Center (CSRC) publications  SP 800-14: Generally Accepted Principles and Practices for Securing InformationTechnology Systems  Lists the principles and practices to be used in the development of a security blueprint  SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy  Provides an overview of the capabilities and technologies of firewalls and firewall policies  SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations  Describes the selection and implementation of security controls for information security to lower the possibility of successful attack from threats  SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans  Provides a systems developmental lifecycle approach to security assessment of information systems
  • 15. Benchmarking and Best Practices  Best practices  Procedures that are accepted or prescribed as being correct or most effective  Benchmarking  Evaluation against a standard  Spheres of security - Generalized foundation of a good security framework  Controls -Implemented between systems and the information, between networks and the computer systems, and between the Internet and internal networks  Information security - Designed and implemented in three layers: policies, people (education, training, and awareness programs), and technology
  • 17. Security Education, Training, and Awareness Program  Education, training, and awareness (SETA) program  Responsibility of the CISO  Control measure designed to reduce the incidences of accidental security breaches by employees  Designed to supplement the general education and training programs
  • 18. Purpose of SETA  The Program Elements:  Security education  Provide Opportunity , Inform  TheWhy  Security training  Hands-on Education and Experience  The How  Security awareness  Reinforce  TheWhat  Purpose of SETA is to enhance security by:  Improving awareness of the need to protect system resources  Developing skills and knowledge so computer users can perform their jobs more securely  Building in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems
  • 25. Summary  Policy  Basis for all information security planning, design, and deployment  Security team develops a design blueprint used to implement the security program  Implement a security education, training, and awareness (SETA) program  Supplement the general education and training programs

Notes de l'éditeur

  1. Security Education Investigate available courses from local institutions of higher learning or continuing education Centers of Excellence program Identifies outstanding universities that have both coursework in information security and an integrated view of information security in the institution itself 4th grade cyber security training Security Training Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely Industry training conferences and programs offered through professional agencies SETA resources Offer assistance in the form of sample topics and structures for security classes Security Awareness Designed to keep information security at the forefront of users’ minds Include newsletters, security posters, videos, bulletin boards, flyers, and trinkets