32
Introduction to the Introduction to the Management of Information Management of Information Security Security Dan Hein, Dinesh Raveendran, Molly Coplen Feb 3, 2008

Introduction to the Management of Information Security

  • Upload
    deron

  • View
    86

  • Download
    0

Embed Size (px)

DESCRIPTION

Introduction to the Management of Information Security. Dan Hein, Dinesh Raveendran, Molly Coplen Feb 3, 2008. Organization. Overview of Information Security Defining Security Information Security Management The Six P’s of Information Security. Information Security. - PowerPoint PPT Presentation

Citation preview

Page 1: Introduction to the Management of Information Security

Introduction to the Management of Introduction to the Management of Information SecurityInformation Security

Dan Hein, Dinesh Raveendran, Molly Coplen

Feb 3, 2008

Page 2: Introduction to the Management of Information Security

04/22/23 2

OrganizationOrganization

• Overview of Information Security

• Defining Security

• Information Security Management

• The Six P’s of Information Security

Page 3: Introduction to the Management of Information Security

04/22/23 3

Information SecurityInformation Security

• Risk Analysis is an essential central activity required to secure information assets» Information asset enumeration,» Threat enumeration,» Threat potential and impact and/or damage

• Risk Analysis provides rationale (cost justification) for sound business decisions and cross-cuts several communities:» Information Security Community» Information Technology Community» General Business Community

Page 4: Introduction to the Management of Information Security

04/22/23 4

What is SecurityWhat is Security• The quality or state of being secure – to be free from

danger.» Example: National Security

• Multiple types of security specialization:» Physical – Protection of people, physical assets, and

workplace» Operations – Carrying of the operational activities without

interruption or compromise» Communications- Protection of communication media,

technology and content» Network – Protection of networking devices, connections

and content

Page 5: Introduction to the Management of Information Security

04/22/23 5

Information SecurityInformation Security• Information Security (InfoSec) encompasses

» Management of information security» Computer & data security» Network Security

Information Security

Management of InfoSec

Network Security

Policy

Computer & Data Security

Page 6: Introduction to the Management of Information Security

04/22/23 6

NSTISSCNSTISSC** Security Model Security Model• NSTISSC* Security Model

» A CNSS model known as McCumber Cube» Purpose: Identify gaps in information security program

» Weakness: Addresses only InfoSec Community and leaves out business and broader IT community

*-National SecurityTelecommunications and Information Systems Security Committee

Confidentiality

Integrity

AvailabilityPoli

cy Edu

catio

n Tec

hnolo

gy

Storage Processing Transmission

Page 7: Introduction to the Management of Information Security

04/22/23 7

Key Concepts of InfoSecKey Concepts of InfoSec• C.I.A Triangle – Basis for CNSS model for InfoSec• Three essential characteristics

» Confidentiality, integrity and availability» Limited in scope » Difficult to encompass changing environment» Threats – Accidental or intentional damage, destruction,

theft, unintended or unauthorized modification, other human misuses or other threats

• Development of a robust model for current IS environment and rapidly changing IT industry with a comprehensive list of critical characteristics

Page 8: Introduction to the Management of Information Security

04/22/23 8

Key Concepts continued…Key Concepts continued…• Confidentiality

» Only those with sufficient privileges and demonstrated need may access certain information

» Measures to protect it - Information classification, Secure document storage, Application of general security policies, Education of information custodians and end users and Cryptography

» Examples: Mailing confidential information outside the organization, Hacker breaking in to an internal database

Page 9: Introduction to the Management of Information Security

04/22/23 9

Key Concepts continued…Key Concepts continued…• Integrity

» The quality or state of being whole, complete, and uncorrupted

» Corruption can occur while information is being entered, stored, or transmitted

» Viruses, worms and even faulty programming can corrupt data

» Detection: check file’s state, or file’s hash value or checksum» Prevention: redundancy bits and check bits, file hashing

Page 10: Introduction to the Management of Information Security

04/22/23 10

Key Concepts continued…Key Concepts continued…• Availability

» Characteristic of information that enables user access to information without interference in a useable format

» Access to only authorized users» Analogy: Library Access

• Privacy» Information that is collected, used and stored by an

organization is intended only for the purposes stated to the data owner at the time it was collected

» Collect, swap and sell personal information» Data used without original owner’s consent

Page 11: Introduction to the Management of Information Security

04/22/23 11

Key Concepts continued…Key Concepts continued…• Identification

» Ability to recognize individual users for an IS» First step in gaining access to secured data» Foundation to authentication and authorization» Performed with username and/or password

• Authentication» When a control provides proof that a user possesses the

identity that he/she claims.» Examples: use of cryptographic certificates to establish SSL

Page 12: Introduction to the Management of Information Security

04/22/23 12

Key Concepts continued…Key Concepts continued…• Authorization

» After authentication, this process provides the assurance that the user has been specifically and explicitly authorized by the proper authority

» Example: activation and use of ACLs

• Accountability» When a control provides assurance that every activity

undertaken can be attributed to a person or a process» Example: Audit logs

Page 13: Introduction to the Management of Information Security

04/22/23 1304/22/23 13

What is Management?What is Management?

» Management is the process of achieving objectives given a set of resources.

» A manager is a member of the organization assigned to marshal and administer resources, coordinate the completion of tasks, and handle the many roles necessary to meet the desired objectives.

Page 14: Introduction to the Management of Information Security

04/22/23 14

Management TheoriesManagement Theories• Frederick Winslow Taylor (1900s)

» Wandered around factories with a stopwatch and a clipboard to measure worker productivity.

» Management’s job is to improve productivity by refining the processes workers perform.

• Douglas McGregor - Theory X and Theory Y (1960)» Theory X: Classic command and control – “Carrot-and-the-

stick” - workers are basically lazy.» Theory Y: People exercise self-direction and self control in

the achievement of organizational objectives. Carrots induce people to stay.

04/22/23 14

Page 15: Introduction to the Management of Information Security

04/22/23 15

Management TheoriesManagement Theories

• W. Edwards Deming – Total Quality Management (1980s)» Stressed quality and customer focus in internal operations » Decision making, performance measurement, and

compensation » Vertical integration

• Business Process Re-engineering (1990s)» Reorganize the business around processes such as

purchasing, marketing, and distribution instead of corporate silos based on products and geography.

04/22/23 15

Page 16: Introduction to the Management of Information Security

04/22/23 1604/22/23 16

Leadership versus ManagementLeadership versus Management• Leaders

» Influences employees so that they are willing to accomplish objectives.

» Leadership provides purpose, direction, and motivation to those who follow.

• Managers» Administers resources of the organization:

• Create budgets• Authorize expenditures• Hire employees

Page 17: Introduction to the Management of Information Security

04/22/23 17

Key Characteristic of a LeaderKey Characteristic of a LeaderA key characteristic of a leader is concern for subordinates as well as strong motivation for accomplishing organizational objectives. Exhibit principles of be..know..and do.

As a leader you must be a person of strong and honorable character, be committed to professional ethics, be an example of individual values, and be able to resolve complex ethical dilemmas. You must know the details of your situation, the standards to which you work, yourself, human nature, and your team. You must do by providing purpose, direction, and motivation to your teams.

04/22/23 17

Page 18: Introduction to the Management of Information Security

04/22/23 18

Characteristics of a LeaderCharacteristics of a LeaderUS Military ModelUS Military Model

• Bearing• Courage• Decisiveness• Dependability• Endurance • Enthusiasm• Initiative

• Integrity• Judgment• Justice• Knowledge• Loyalty• Tact• Unselfishness

04/22/23 18

Page 19: Introduction to the Management of Information Security

04/22/23 19

Improvement of Leadership AbilitiesImprovement of Leadership Abilities

• Know yourself and seek self improvement

• Be technically and tactically proficient

• See responsibility and take responsibility for your actions

• Make sound and timely decisions

• Set the example• Know your subordinates and

look out for their well-being

• Keep your subordinates informed

• Develop a sense of responsibility in your subordinates

• Ensure the task is understood, supervised, and accomplished

• Build the team• Employ your team in

accordance with its capabilities

04/22/23 19

Page 20: Introduction to the Management of Information Security

04/22/23 2004/22/23 20

Behavioral Types of LeadersBehavioral Types of Leaders• Autocratic

» Reserves all decision-making responsibility for themselves, and are more “do as I say” types of managers.

» Issues an order to accomplish a task and does not seek or accept alternative viewpoints.

• Democratic» Seeks input from all interested parties, requesting ideas and

suggestions, and then formulating a position that can be supported by a majority.

• Laissez-faire» Allows the process to develop as it goes, only making minimal

decisions to avoid bringing the process to a complete halt.

Page 21: Introduction to the Management of Information Security

04/22/23 2104/22/23 21

The Planning-Controlling LinkThe Planning-Controlling Link

PlanningGoals, Objectives, Strategies, Plans

LeadingMotivation, Leadership,

Communication, Behavior

ControllingStandards,

Measurements, Comparisons, Action

OrganizingStructure, Human

Resource Management

Page 22: Introduction to the Management of Information Security

04/22/23 2204/22/23 22

PlanningPlanning• Strategic

» Highest level of the organization – Board of Directors, Executive Management

» Time horizon – five or more years• Tactical

» Mid-level managers – implementation of the strategic plan» Time horizon – one to five years

• Operational » Supervisors - Day-to-day operations of local resources» Time horizon - immediate

Page 23: Introduction to the Management of Information Security

04/22/23 23

OrganizingOrganizing

“The principle of management dedicated to the structuring of resources to support the accomplishments of objectives.”

» Organizing tasks:• What is to be done and in what order• Who is doing the work• How is the work being accomplished• When - timeline

04/22/23 23

Page 24: Introduction to the Management of Information Security

04/22/23 24

Leadership and MotivationLeadership and Motivation• Peter Drucker

» A responsible manager has authority.» Workers are led, not managed.» The workplace is participatory, but not “free-wheeling.”» Workers are not motivated through money alone.» Each worker is motivated differently, according to the

individual and the situation.» Management recognizes that workers could leave the

organization.

04/22/23 24

Page 25: Introduction to the Management of Information Security

04/22/23 25

What Motivates WorkersWhat Motivates Workers• Work with people who treat me with respect• Interesting work• Recognition• Opportunity to develop skills• Work for people who will listen to you• Ability to think for self, not just carry out instructions• Seeing the end results of my work• Work for efficient managers• Job security• High pay• Good benefits04/22/23 25

Page 26: Introduction to the Management of Information Security

04/22/23 26

ControllingControlling• This function determines what is monitored, the tools to

gather and evaluate information, and the corrective action.

• Four categories of control tools:» Information – flow of information in the organization» Financial – guide the expenditure of monetary resources. » Operational – evaluate the efficiency and effectiveness of

business process flows. » Behavioral – evaluate the efficiency and effectiveness of

human resources.

04/22/23 26

Page 27: Introduction to the Management of Information Security

04/22/23 27

Control ProcessControl Process

04/22/23 27

Standard Attained?

Variance Accepted?

Standard Acceptable

?

Revise Standard

Identify cause of variation

Continue Process

Continue Process

Correct Performance

Compare Actual vs Standard

Performance Standard

Actual Performance

Yes

Yes

Yes

No

No

No

Page 28: Introduction to the Management of Information Security

04/22/23 2804/22/23 28

• Step 1: Recognize and Define the Problem» How do I know that I have a problem ?» What is the real cause of the problem ?

• Step 2: Gather Facts and Make Assumptions» Interview, collect data, review documentation

• Step 3: Develop Possible Solutions» Brian storm, interview experts, review research

• Step 4: Analyze and Compare Possible Solution» Financial impact, cost-benefit analysis, operation impact» Unintended consequences ??

• Step 5: Select, Implement, and Evaluate a Solution» Monitor the solution – intended impact?

Solving ProblemsSolving Problems

Page 29: Introduction to the Management of Information Security

04/22/23 29

Six Principles of Information SecuritySix Principles of Information Security

1. Planning - Draw upon larger business / IT plans to develop InfoSec plans that support business goals and objectives.

2. Policy – Organizational document(s) specifying acceptable and unacceptable use, actions constituting abuse, and punishments for violators [Panko03] .

3. Programs – Ongoing operational activities to support goals of information security: Education, Training, Drills, and onsite physical access.

Page 30: Introduction to the Management of Information Security

04/22/23 30

Six Principles continued…Six Principles continued…

4. Protection – Ongoing risk management identifies information assets, enumerates threats, and performs risk reduction or transference.

5. People – Training people within an organization is critical for maintaining proper information security; some of the simplest attacks are social-engineering attacks.

6. Project Management – Continuously monitoring and measuring progress towards InfoSec goals/objectives and making corrective action when needed.

Page 31: Introduction to the Management of Information Security

04/22/23 31

QuestionsQuestions

?

Page 32: Introduction to the Management of Information Security

04/22/23 32

BibliographyBibliography• Anonymous, “The Way We Were,” Management Today, London: June 1998, pp 111-112.

• Anonymous, “TGM-A Cornerstone of Quality”, Quality Progress. Milwaukee: November 2006, Vol. 39, Iss. 11; pp 32-33.

• William A. Cohen, A Class with Drucker, New York: AMACOM, 2008

• W.E. Deming, Out of the Crisis, MIT Press, 1982

• Richard J. Hackman and Ruth Wageman, “Total Quality Management: Empirical, Conceptual, and Practical Issues,” Administrative Science Quarterly, Ithaca: June 1995, Vol. 40, Iss 2; pp 309-342.

• Raymond R. Panko, Corporate Computer and Network Security. New Jersey: Prentice Hall, 2003. pp. 324-330.

• Michael E. Whitman and Herbert J. Mattord, Management of Information Security, Thompson Course Technology, 2008. pp 1-20.

• “Survey: The X and Y Factors,” The Economist, London: January 21, 2006. Vol. 378, Iss. 8461, pg 19.

04/22/23 32