+ All Categories
Home > Documents > Certified Information Systems Security … Information Systems Security Professional (CISSP) Course...

Certified Information Systems Security … Information Systems Security Professional (CISSP) Course...

Date post: 01-Apr-2018
Category:
Upload: dinhhanh
View: 228 times
Download: 2 times
Share this document with a friend
225
Certified Information Systems Security Professional (CISSP) Course 1 - Information Security and Risk Management
Transcript

Certified Information Systems

Security Professional (CISSP)

Course 1 - Information Security and

Risk Management

Slide 1

© Logical Security

Logical Security

9316 Yorktown St.

McKinney, TX 75071

www.LogicalSecurity.com

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 2

© Logical Security

Logical Security Offers…

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 3

© Logical Security

Holistic Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 4

© Logical Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 5

© Logical Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 6

© Logical Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 7

© Logical Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 8

© Logical Security

Think of Us…

Risk Management

Enterprise Security Architect

Security Governance

Regulatory Compliance

Vulnerability Management

Data Leakage Protection

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 9

© Logical Security

Holistic Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 10

© Logical Security

Shon Harris CISSP®

Logical Security’s

CISSP Course

Logical Security

www.LogicalSecurity.com

Copyright © 2007. All rights reserved.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 11

© Logical Security

Common Body of Knowledge

Access Control

Application Security

Business Continuity and Disaster Recovery Planning

Cryptography

Information Security and Risk Management

Legal, Regulations, Compliance, and Investigation

Operations Security

Physical (Environmental) Security

Security Architecture and Design

Telecommunications and Network Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 12

© Logical Security

Exam Specifics

CISSP Exam

250 questions

225 questions graded

25 questions are for research purposes

6 hours given to complete test

Average is 4 ½ hours

Passing grade is 700 points

Questions are weighted

Multiple choice – one answer is correct

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 13

© Logical Security

Your Instructor

Recognized as one of the top 25 women in the security field by Information Security Magazine

Author of best-selling book CISSP All-In-One Study Guide and CISSP Passport

Gray Hat Hacking book 2nd edition

Former engineer in the Information Warfare unit for the Air Force

Security Consultant

President Logical Security

Security writer for Information Security Magazine and Windows 2000Shon Harris

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 14

© Logical Security

What Have You Heard?

Do you know others who have taken this exam?

Why is it seen as such a difficult test?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 15

© Logical Security

Some Reasons Why the Exam Is Difficult

Covers a wide range of information

Many people may have experience in one or two domains of the CBK, but not in all

The types of questions

Very cognitive questions

You must understand the concepts deeply to answer the questions properly

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 16

© Logical Security

We Will Cover It All!Access Control

Physical Security

Cryptography

Operations Security

Telecommunications and Network Security

Business Continuity and Disaster Recovery Planning

Security Architecture and Design

Legal, Regulations,

Compliance, and

Investigation

Information Security

and Risk Management

Application Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 17

© Logical Security

CISSP Exam Tips

Requirements

Minimum of 4 years of relevant experience or 3 years plus a degree

Registration letter from (ISC)2

Candidate ID is required for day of the exam

You can write in booklets; pencils will be supplied

If English is NOT your native language…

You can bring a non-technical dictionary

Sponsor must sign off vouching for your experience

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 18

© Logical Security

CISSP Associate

Do not have the experience to take the exam?

No problem – you can be an “associate” and take the exam.

Once you have enough experience, submit it to (ISC)2 and join the ranks of CISSPs.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 19

© Logical Security

No Other World Exists Now

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 20

© Logical Security

This Will Be Trickier than You Think

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 21

© Logical Security

Question 1 Example

Which of the following is a reason to place security elements

in a lower layer of the system architecture?

a. Increases performance and provides a wider range of protection

b. Increases performance and provides a more granular approach to access

c. Allows for multitasking to not interfere or be affected by the restrictions of the security elements

d. Provides more control and flexibility in configuration for the user

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 22

© Logical Security

Architecture Components

Granularity

Process

Intensive

Motherboard Components

BIOS and Firmware

Processor

OS Kernel

OS

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 23

© Logical Security

Question 2 Example

Clipping levels come in many different forms. Which of the

following best describes a benefit of the use of clipping

levels?

a. Detection of IP spoofing and resetting of configurations

b. Alerting IT staff of attacks

c. Reducing the amount of unauthorized users from logging onto a system

d. Reduction in investigation by IT members

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 24

© Logical Security

Information Security and Risk Management

Security Definitions and Goals

Control Types

Risk Management and Analysis

Components of a Security Program

Roles and Responsibilities in Security

Information Classification

Employee Management

Awareness Training

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 25

© Logical Security

Where did We Come From?

In 1945, huge computers could not even do what our small

calculators do today – but it was a start!

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 26

© Logical Security

Mainframe Days

And we evolved……

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 27

© Logical Security

In the Good Old Days – Who Knew?

Network Configuration

TCP/IP

Ethernet

Sniffers

Layer 3ICMP

Hacking

Ports

APIs

Phishing

Protocols

Buffer Overflows

OSI

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 28

© Logical Security

Today’s Environment

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 29

© Logical Security

Agenda

Security Definitions and Components

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 30

© Logical Security

Security Definitions

Vulnerability

Weakness in a mechanism that can threaten the

confidentiality, integrity, or availability of an asset

Lack of a countermeasure

Threat

Someone uncovering a vulnerability and exploiting it

Risk

Probability of a threat becoming real, and the corresponding potential damages

Exposure

When a vulnerability exists in an environment

Countermeasure

A control put into place to mitigate potential losses

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 31

© Logical Security

Vulnerabilities

Not just open ports …

No policies or not following them

Poorly configured remote access server

No control over PDAs and smart phones

Lack of security awareness training

Etc., etc., etc.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 32

© Logical Security

Examples of Some Vulnerabilities that Are Not Always Obvious

Lack of security understanding

Real security requires real knowledge

Technical to the C-level in companies

Misuse of access by authorized users

Authorization creep

Can now be a criminal offense according to specific laws

Concentration of responsibilities

Separation of duties

Not being able to react quickly

No response team or procedures

Lack of communication structure

Lack of ways to detect fraud

Rotation of duties

Technologies and processes

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 33

© Logical Security

Risk – What Does It Really Mean?

Risk Definition

Probability of a vulnerability being exploited by a threat and the resulting business impact

Vulnerability or risk management?

Goal of risk management

Optimal security at minimal cost

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 34

© Logical Security

Relationships

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 35

© Logical Security

Who Deals with Risk?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 36

© Logical Security

Overall Business Risk

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 37

© Logical Security

Who?

“Who deals with risk in our company?”

Response: “We don’t really understand it, so we ignore it.”

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 38

© Logical Security

AIC TriadAvailability

Usability, timeliness Prevents disruption of services Protects production and

productivity

Integrity Accuracy, completeness

Prevents unauthorized modification

Protects data and production environment

Confidentiality Secrecy, sensitivity, privacy

Prevents unauthorized disclosure of data

Protects sensitive data and processes

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 39

© Logical Security

Availability Manmade, technical, or natural disaster

Failure of components or a device

Denial-of-service attacks

Redundant technologies

Failover devices

Backup technologies

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 40

© Logical Security

Integrity

Modifying data or configurations

Changing security log information

Software configurations

Hash algorithms and message authentication code

Authentication, logging, auditing

Change control, configuration management

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 41

© Logical Security

Confidentiality

Unauthorized access

Protection of sensitive data or equipment

Access control

Encryption

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 42

© Logical Security

Who Is Watching?

Shoulder surfing - different types

Think about ALL of the people who have access!

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 43

© Logical Security

Social Engineering

In every security system, people are the weakest link.

Some of the most effective reconnaissance techniques target people.

People want to be helpful.

Nobody wants to get into trouble.

If you sound legitimate, most people will think you are.

Confidence and a clipboard will get you into a lot of places.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 44

© Logical Security

Social Engineering

To effectively collect information from human subjects, you

may need to gather background information first.

Organization’s website

Company directory

Other employees

Address and phone numbers

Background on the organization

News articles/press releases

Footprinting!

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 45

© Logical Security

What Security People Are Really Thinking

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 46

© Logical Security

Security Concepts

Security through Obscurity

Control Types

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 47

© Logical Security

Security through Obscurity

The idea that the opponent will always be less

intelligent than the defender:

Designers think that if the flaws are not known then they will not be exploited

Some feel as though compiled code is more secure than open source code, because it is more difficult to identify flaws

Some algorithms are not publicly released, which is an example of security through obscurity

Usually used in replace of a robust security framework

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 48

© Logical Security

Another Approach

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 49

© Logical Security

Security?

Designers think that if the flaws are not known then they

will not be exploited.

Vendors do not release information on flaws.

Once found out – then patches have to be released.

A needle in haystack is hard to find, but someone will find it!

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 50

© Logical Security

Security?

Some feel as though compiled code is more secure than open

source code, because it is more difficult to identify flaws.

Two camps continue to debate.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 51

© Logical Security

The Bad Guys Are Motivated

Do not rely on other’s ignorance or lack of interest.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 52

© Logical Security

If Not Obscurity – Then What?

Industry best practices

Standardization of protocols and communication

Interoperability in a safe manner

Everyone practicing security responsibly

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 53

© Logical Security

Open Standards

Publicly available specifications to allow for interoperability.

Some of the organizations that develop open standards:

International Organization for Standardization (ISO) International Telecommunication Union (ITU)

The Institute of Electrical and Electronics Engineers Standards Association (IEEE - SA)

Structured security

programs and enterprise

architectures!

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 54

© Logical Security

Common Open StandardsExamples of Some Open Standards:

TCP/IP

OSI Model

HTML, XML, SOAP

IEEE standards

802.3, 802.5, 802.11, etc.

ISO 1799

NIST

Risk Management

Formal frameworks

SABSA

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 55

© Logical Security

Without Standards

If technology and security were not standardized…

Proprietary solutions and solution wars

Everyone can now try to make the best widget, it just has to be able to talk to all the other widgets out there

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 56

© Logical Security

“Soft” Controls

Administrative Controls

Policies, procedures, standards, guidelines

Employee management

Testing and drills

Risk management and analysis

Information classification

Awareness training

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 57

© Logical Security

Logical Controls

Technical Controls

Firewalls

IDS

Encryption

Protocols

Authentication mechanisms

Auditing

Access control technologies

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 58

© Logical Security

Physical Controls

Physical Controls

Doors, windows, walls

Security guards and dogs

Fencing and lighting

Locks

Environmental controls

Intrusion detection systems

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 59

© Logical Security

Are There Gaps?

Do the departments responsible for these different types of

security communicate and work well together in your

company?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 60

© Logical Security

Understanding Drivers

Legal requirements

Regulation requirements

Business objectives

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 61

© Logical Security

Holistic Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 62

© Logical Security

Not Always So Easy

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 63

© Logical Security

What Is First?

Specific issues must be understood before the required

security program can be built.

Legal requirements

Regulation requirements

Business drivers

Threat profile

Acceptable risk levels

These are the “whys” and then we will get to the controls,

which are the “hows”.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 64

© Logical Security

Different Types of Law

Legal Issues

Federal laws

State laws

Administrative laws (mainly regulations)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 65

© Logical Security

How Is Liability Determined?

Due Diligence

Researching and identifying threats and risks

Due Care

Acting upon findings to mitigate risks

What are some examples of management carrying out

due diligence and due care?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 66

© Logical Security

Examples of Due Diligence

Due Diligence

Uncovering potential dangers

Carrying out assessments

Performing analysis on assessment data

Implementing risk management

Researching and understanding the environment’s vulnerabilities, threats, and risks

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 67

© Logical Security

Examples of Due Care

Due Care

Doing the right thing

Implementing solutions based on analysis data

Properly protecting the company and its assets

Acting responsibly

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 68

© Logical Security

Prudent Person Rule

Way of Determining Liability

Understanding activities and reactions of a reasonable and responsible person

Comparing your activities and reactions to this responsible person

Judging the rationale of your actions

Determining if you were negligent or not

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 69

© Logical Security

Prudent Person

We have to ask ourselves if we were responsible and

reasonable in our actions – can be subjective.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 70

© Logical Security

Taking the Right Steps

Might need to start off slow and deliberate to ensure each

risk is properly identified and dealt with.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 71

© Logical Security

Regulations

Regulations – security professional’s best friend!

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 72

© Logical Security

Why Do We Need Regulations?

Corporate and

security governance

is now all the rage!

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 73

© Logical Security

Risk Management

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 74

© Logical Security

Why Is Risk Management Difficult?

Risk Management

Trying to predict the future

Incredible number of variables to identify

Surmising all possible threats and providing solutions to them

Gathering data from many sources

Dealing with many unknowns

Quantifying qualitative items

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 75

© Logical Security

Necessary Level of Protection Is Different for Each Organization

Need to strike a balance between potential loss, acceptable risk level, and cost to protect assets

To help determine “how much is enough security” the following items must be understood:

Adversaries and their motivation and means to cause damage

Assets values

Vulnerabilities and threats

Acceptable risk and resulting residual risk

Countermeasure costs and benefits

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 76

© Logical Security

Security Team/Committee

Team Members Security

Internal audit

Administrators

Business process and data owners

Operations

HR, Legal

Custodian

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 77

© Logical Security

Review

3 control categories

Type of control – auditing

Due diligence versus due care

Definition of risk

What is security through obscurity?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 78

© Logical Security

Risk Management Process

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 79

© Logical Security

Planning Stage – Team

Risk Assessment Team

Should represent different departments of a company

IT department

Auditors

Management

Security department

Physical security

Business unit leaders

Advisors

Legal, human resources, management, safety officers

Management will help decide upon team members

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 80

© Logical Security

Analysis Paralysis

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 81

© Logical Security

Planning Stage – Scope

Scope of Project

Is just one facility being assessed?

Is it an enterprise-wide assessment?

What type of assets will be assessed?

Tangible and intangible assets

What type of threats will be considered?

Manmade, natural disasters, technical

Scope creep will be expensive and timely.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 82

© Logical Security

Planning Stage – Analysis Method

Quantitative

Assigning numeric and monetary values to risk components

Asset value, business impact, frequency, countermeasure costs and values, uncertainty

Difficult to fully achieve complete quantitative analysis requires a lot of resources and time

Qualitative Opinion-based with the use of a rating system

Scenario-based

Purely qualitative analysis is possible and not as time consuming

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 83

© Logical Security

Risk Management Tools

Tools of the Trade

Automated tools require less repetitive data input

Can run same data through several scenarios

Analysis is still a time-consuming task

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 84

© Logical Security

Defining Acceptable Levels

The risk acceptance level is the maximum overall exposure to risk that should be accepted, based on the benefits and costs involved.

If the responses to risk cannot bring the risk exposure to below this level, the activity will probably need to be stopped.

Hence the level must be agreed with the appropriate level of management.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 85

© Logical Security

Acceptable Risk Level

Each organization will have its own acceptable risk level, which is derived from its legal and regulatory compliancy responsibilities and their threat profile.

Management must set this acceptable risk level and then it is the responsibility of the designated risk management roles to ensure that this level is not exceeded.

The objective of this stage is to determine the overall level of risk which the organization can tolerate for the given situation.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 86

© Logical Security

Collecting and Analyzing Data Methods

Data Collection

Surveys

Interviews

Vulnerability tests

Penetration tests

You must understand the business to understand risk in the correct context!

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 87

© Logical Security

What Is a Company Asset?

What are you trying to protect?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 88

© Logical Security

Data Collection – Identify Assets

Tangible

Equipment

Facilities

Intangible

Data

Trade secrets

Reputation

Customer database

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 89

© Logical Security

Data Collection – Assigning Values

An asset’s value is calculated by

reviewing: Cost of acquisition

Replacement cost

Cost of developing the asset

Role of the asset in the company

Amount adversaries are willing to pay for the asset

Cost of maintaining and protecting the asset

Production and productivity losses resulting from compromise of asset

Liability if asset is not properly protected

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 90

© Logical Security

Asset ValueThe value of an asset consists of its intrinsic value and the

near-term impacts and long-term consequences of its

compromise.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 91

© Logical Security

Data Collection – Identify Threats

Common Threats

Errors and omissions

Fraud and theft

Employee sabotage

Loss of physical or infrastructure support

Malicious hackers

Industrial espionage

Malicious code

Threats to privacy

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 92

© Logical Security

Review

Two types of approaching risk

Acceptable risk level

Prudent man rule

Security through obscurity

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 93

© Logical Security

Data Collection – Calculate Risks

From here the team will carry out qualitative analysis

steps or quantitative analysis steps.

Quantitative

Assigning numeric and monetary values

Qualitative

Opinion and scenario-based

Use of a rating system

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 94

© Logical Security

Scenario Based – Qualitative

Create scenarios and identify threats

Identify the range of threats possible

Write a scenario for each large threat identified

Functional managers review to make sure the scenarios are credible

Evaluate security controls to address threats

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 95

© Logical Security

Risk Approach

Probability of Occurrence

Con

se

qu

en

ce

of

Occu

rre

nce

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 96

© Logical Security

Qualitative Analysis StepsSteps to Qualitative

Analysis

1. Gather company “experts”

2. Present risk scenarios

3. Rank seriousness of threats

4. Rank countermeasures

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 97

© Logical Security

Want Real Answers?

Delphi Method

Anonymous input

More honest data collected

Helps ensure no intimidation

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 98

© Logical Security

Qualitative Risk Analysis Ratings

Organizations can develop internal qualitative risk ratings:

A-F

1-10

Low, medium, high

Highly likely, likely, unlikely, highly unlikely

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 99

© Logical Security

Qualitative Risks

The following is an example of the Australia/New Zealand Standard approach to qualitative ratings.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 100

© Logical Security

Quantitative Analysis Steps

1. Calculate estimated potential losses

2. Carry out a threat analysis

3. Calculate annual loss expectancy

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 101

© Logical Security

Quantitative Analysis

Step 1 = Estimate potential loss

Single Loss Expectancy

Asset Value x Exposure Factor (EF) = SLE

Exposure factor = the percentage of loss that could be experienced

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 102

© Logical Security

How Often Will This Happen?Step 2 = Threat analysis

ARO (annual

rate of

Occurrence) =

Number of

expected

incidents

annually

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 103

© Logical Security

ARO Values and Their Meaning

One time in a 12-month period

ARO = 1.0

Once in 10 years

ARO = 0.1

Once in 100 years

ARO = 0.01

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 104

© Logical Security

Calculate ALE

Step 3 = Calculate annual loss expectancy

Annualized Loss Expectancy

SLE x Annualized Rate of Occurrence (ARO) = ALE

Annualized rate of occurrence (ARO) = frequency of

threat taking place

What is the ALE value used for?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 105

© Logical Security

ALE Value Uses

Categorize risks

Build a security budget

Amount to spend on risk mitigation

Use to understand business risk overall

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 106

© Logical Security

Relationships

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 107

© Logical Security

Calculate Risks – ALE Example

1. If an e-commerce site is attacked (value = $300,000), it is estimated to cause 40% in damages to a company based on:

Liability costs

Confidential data being corrupted

Loss in revenue

Asset Value EF = SLE

300,000 .4 = 120,000

2. Based on current safeguards, this threat is estimated to happen once in 12 months.

SLE ARO = ALE

120,000 1.0 = 120,000

3. Management should not spend over this amount to protect this asset.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 108

© Logical Security

Your Turn!

A facility has a value of $650,000. It is estimated that a

tornado would hit once in ten years. If 35% of the facility

would be damaged, what would the ALE be?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 109

© Logical Security

ALE Calculation

SLE = $227,500

$650,000 x 0.35 = $227,500

ALE = $22,750

$227,500 x 0.1 = $22,750

What does the company do with this value?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 110

© Logical Security

Can a Purely Quantitative Analysis Be Accomplished?

NO!

A quantitative analysis requires quantifying many

qualitative items.

How do you assign a value to a reputation?

How can you know the potential customers that will be lost?

How can you properly predict market share loss?

All of these questions are difficult, but are required in a

quantitative analysis.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 111

© Logical Security

Risk Types

Risks

Potential loss

Ramifications of exposure

Delayed loss

Secondary ramifications of exposure

Much harder to identify and calculate

List Examples of…

Potential losses

Delayed losses

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 112

© Logical Security

Examples of Types of Losses

Potential Losses

Loss in production and productivity

Cost of repairing damages

Cost of consultants’ or experts’ services

Loss in revenue

Loss of customers

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 113

© Logical Security

Delayed Loss

Delayed Losses

Loss in reputation

Loss of potential customers

Late fees or penalty fees

Loss in market share

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 114

© Logical Security

Review – Steps of Analysis

Identify a company’s assets

Assign values to assets

Identify the assets’ vulnerabilities and threats

Calculate their associated risks

Estimate potential loss and damages

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 115

© Logical Security

Review

ALE formula

SLE formula

What is ARO?

If an event will potentially occur once in 100 years, what is the ARO?

Steps of a qualitative analysis

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 116

© Logical Security

Cost/Benefit Analysis

Cost/Benefit Analysis

The annualized cost of countermeasures should not be more than potential losses

If a server is worth $3,000, a countermeasure that costs $4,000 should not be used

Not as cut and dried as it may seem

How do you determine the cost of a countermeasure?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 117

© Logical Security

Cost of a Countermeasure

Some of the items that can go into the calculation:

Purchase amount

Maintenance amount

Negative effects on production environment

Man-hours to maintain

IDS is an expensive countermeasure in this respect

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 118

© Logical Security

Cost/Benefit Analysis Countermeasure Criteria

A Countermeasure Should …

Mitigate the identified risk

Be cost-effective

(ALE before implementing countermeasure) – (ALE after implementing countermeasure) – (annual cost of countermeasure) = value of the countermeasure to the company

If ALE for a specific asset is $78,000, and after implementation of the control the new ALE is $20,000 and the annual cost of the control is $60,000, what is the value of the control to the company?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 119

© Logical Security

Calculating Cost/Benefit

If ALE for a specific asset is $78,000, and after

implementation of the control the new ALE is $20,000 and

the annual cost of the control is $60,000, what is the value of

the control to the company?

$78,000 – $20,000 = $58,000

$58,000 – $60,000 = -$2,000

Company should not implement this control.

Not cost-beneficial.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 120

© Logical Security

Controls

“How do we decide what controls we buy within the company?”

Response: “We follow industry buzz words and buy the next silver bullet. They must be right – they are the industry.”

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 121

© Logical Security

Control Selection Requirements

Modular in nature

Provides uniform protection

Provides override functionality

Defaults to least privilege

Independence of safeguard and the asset it is protecting

Flexibility and security

Clear distinction between user and administrator

Minimum human intervention

Easily upgraded

Does not panic personnel

Identifies suspect

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 122

© Logical Security

Control Selection Requirements

Auditing functionality

Minimizes dependence on other components

Easily useable, acceptable, and tolerated by personnel

Must produce output in usable and understandable format

Must be able to reset safeguard

Testable

Does not introduce other compromises

System and user performance

Proper alerting

Does not negatively affect asset

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 123

© Logical Security

Quantitative Analysis

Quantitative Advantages:

Results are based on independently objective processes and metrics

Cost/benefit assessment is possible

Risk management can be tracked and evaluated

Results can be expressed in monetary value, percentages, probabilities

Very useful for management to understand risks and create new security budgets

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 124

© Logical Security

Quantitative Analysis Disadvantages

Quantitative Disadvantages

Requires a large amount of preliminary work

Hard to carry out manually

Formulas are usually complex and inflexible

No real standard on how to carry this out

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 125

© Logical Security

Qualitative Analysis Approach

Qualitative Advantages

Assigning rating values are simplistic

Allows for flexibility in processes and reporting results

Requires less preliminary work

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 126

© Logical Security

Qualitative Analysis Disadvantages

Qualitative Disadvantages

Very subjective

No use of independent objective metrics or processes

Difficult to map to security budget needs

Cost/benefit analysis not possible

Cannot track risk management performance objectively

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 127

© Logical Security

Can You Get Rid of All Risk?Total Risk versus Residual Risk

Amount of risk that exists before a safeguard is put into place is total risk.

After a safeguard is implemented, the remaining risk is called residual risk.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 128

© Logical Security

Calculating Residual Risk

Threats x Vulnerability x Asset Value = Total Risk

(Threats x Vulnerability x Asset Value) x Control Gap =

Residual Risk

(Control Gap = What the control cannot protect against)

Total Risk – Controls = Residual Risk

Analysis team needs to determine if residual risk is within the

acceptable risk level of the company. Management will have

to sign off on accepting this risk.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 129

© Logical Security

Uncertainty Analysis

There are primary sources of uncertainty in the risk

management process:

A lack of sufficient information to determine the exact value of the elements of the risk model, such as threat frequency, safeguard effectiveness, or consequences

Relative magnitude of uncertainties and their implications on the assessment results

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 130

© Logical Security

Dealing with Risk

Team presents the analysis results to management.

Management makes the decisions about the next steps.

Management has several choices when dealing with risk.

Management knows how to deal with business risk, which is different from security risk.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 131

© Logical Security

Deal with Risk

“How do we deal with risk in the organization?”

Response: “We create a lot of paperwork and then we just ignore it.”

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 132

© Logical Security

Management’s Response to Identified Risks

Risk mitigation

Implement countermeasures

Risk transference

Third-party involvement purchase insurance

Risk acceptance

Informed decision – no action taken

Risk avoidance

Decide to stop activity

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 133

© Logical Security

Risk Acceptance

Cost decision

Potential loss is lower than control cost

Pain decision

Ability to deal with related security incidents

Visibility decision

Reputation can take it

Not a surprise decision

Risk should not be accepted without knowing it

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 134

© Logical Security

Risk Analysis Process Summary

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 135

© Logical Security

Review

3 types of control categories

Due diligence

Separation of duties is what type of control?

4 ways of dealing with risk

Formula for residual risk

Formula to calculate the value of a countermeasure

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 136

© Logical Security

Now What?

We understand the legal requirements of the company.

We understand the regulation requirements of the company.

We understand the acceptable risk level.

We have identified critical assets.

We have carried out risk assessments to understand the current security posture.

Now we need to build a security program with all of these ingredients.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 137

© Logical Security

Components of Security Program

Layered Approach

Security Program Steps

Organizational Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 138

© Logical Security

A Layered Approach

Defense in Depth

Providing layers of defense that an attacker must compromise before accessing an asset

Not relying upon just one control

Understanding that compromises in one layer may take place and having back up to compensate for this

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 139

© Logical Security

In Security, You Never Want Any Surprises

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 140

© Logical Security

Building Foundation

Security Program

Blueprint for a security program

A framework for administrative, technical, and physical controls to work within

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 141

© Logical Security

Security Roadmap

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 142

© Logical Security

Functional and Assurance Requirements

The security controls, systems, and overall program need to

have both requirements covered.

“What is it that we want it to do?”

Defining before buying

“How are we making sure it is doing what it is supposed to be doing?”

Testing, logging, auditing

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 143

© Logical Security

Building Foundation

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 144

© Logical Security

Most Organizations

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 145

© Logical Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 146

© Logical Security

Silo Security Structure

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 147

© Logical Security

Islands of Security Needs and Tools

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 148

© Logical Security

Get Out of a Silo Approach

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 149

© Logical Security

Security Is a Process

Security is a process, not a product.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 150

© Logical Security

Approach to Security Management

Top-Down Approach

Security is directed, driven, and supported by senior management

Bottom-Up Approach

Staff member or group drives initiative

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 151

© Logical Security

Result of Battling Management

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 152

© Logical Security

Industry Best Practices Standards

BS/ISO I7799

Comprehensive guidelines on range of controls for implementing security

Companies can be certified against this standard

Divided into 10 sections

Security policy

Security organization

Assets classification and control

Personnel security

Physical and environmental security

Computer and network management

System access control

System development and maintenance

Business continuity planning

Compliance

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 153

© Logical Security

ISO/IEC 17799

The ISO/IEC 17799 is a set of best practices for organizations to follow to implement and maintain a security program.

It started out as British Standard 7799 (BS7799). BS7799 was published in the United Kingdom and became a de facto standard in the industry that was used to provide guidance to organizations, in the practice of information security.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 154

© Logical Security

Pieces and Parts

BS7799 Part 1 outlines control objectives and a range of controls that can be used to meet those objectives.

BS7799 Part II outlines how a security program can be setup and maintained.

BS7799 Part II serves as a baseline which organizations could be certified against.

An organization would choose to be certified against the BS7799 standard to provide confidence to their customer base and partners

The organization could be certified against all of BS7799 Part II or just a portion of the standard.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 155

© Logical Security

Numbering

ISO/IEC 17799:2005 is the newest version of BS7799 Part 1

Provides a list of controls that can be used within the framework

Will be ISO/IEC 27002:yr

ISO/IEC 27001:2005 is the newest version of BS7799 Part II

Steps for setting up and maintaining a security program

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 156

© Logical Security

New ISO Standards

ISO/IEC 27000 - a vocabulary or glossary of terms

ISO/IEC 27002 - the proposed re-naming of existing standard ISO 17799

ISO/IEC 27003 - a new ISMS implementation guide

ISO/IEC 27004 - a new standard for information security measurement and metrics

ISO/IEC 27005 - a proposed standard for risk management, potentially related to the current British Standard BS 7799 part 3

ISO/IEC 27006 - a guide to the certification/registration process

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 157

© Logical Security

COBIT

What is COBIT?

Control Objectives for Information and related Technology (COBIT) was created by the Information Systems Audit and Control Association (ISACA), and the IT Governance Institute (ITGI).

It is a set of best practices (framework) for information (IT) management

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 158

© Logical Security

Inside of COBIT

4 domains are groupings

of processes that map to

the following organizational

responsibilities;

Planning and Organization

Acquisition and Implementation

Delivery and Support

Monitoring

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 159

© Logical Security

COBIT – Control Objectives

5.1 Management of IT Security

Manage IT Security at the highest appropriate organizational level …

5.2 IT Security Plan

Translate business information requirements, IT configuration, information risk action plans, and information security culture …

5.3 Identity Management

All users (internal, external, and temporary) and their activity on IT systems (business application, system operation…)

5.4 User Account Management

Ensure that requesting, establishing, issuing, suspending, modifying, and closing user accounts and related user privileges …

5.5 Security Testing, Surveillance, and Monitoring

Ensure that IT security implementation is tested and monitored proactively. IT security should be reaccredited periodically …

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 160

© Logical Security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 161

© Logical Security

Measurements

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 162

© Logical Security

Information Technology Infrastructure Library (ITIL)

It is considered the de facto standard for IT service

management and concentrates on how to provide consistent,

documented, and repeatable processes to ensure quality.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 163

© Logical Security

3rd Party Governance

Today’s business environment is increasingly dependent on third party relationships as organizations concentrate on their core competencies and outsource many non-core services.

In turn, the heightened security expected by customers and a growing global emphasis on legal and regulatory compliance requires evidence of adequate governance measures.

Thus, the twin issues of due diligence and due care over third parties have become critical to business success.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 164

© Logical Security

3rd Party Governance (Cont.)

There are 6 elements to consider:

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 165

© Logical Security

Security Governance

“Security governance is the set of responsibilities and

practices exercised by the board and executive management

with the goal of providing strategic direction, ensuring that

objectives are achieved, ascertaining that risks are managed

appropriately and verifying that the enterprise’s resources are

used responsibly.”

- IT Governance Institute

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 166

© Logical Security

All security activity takes place within the security department, thus security works within a silo and is not integrated throughout the organization.

Executive management holds business unit managers responsible for carrying out risk management activities for their specific business units.

CISO took some boilerplate security policies, inserted his company’s name, then had the CEO sign them.

Executive management sets an acceptable risk level that is the basis for the company’s security policies and all security activities.

CEO, CFO and business unit managers feel as though information security is the responsibility of the CIO, CISO and IT department and do not get involved.

CEO, CFO, CIO and business unit managers participate in a risk management committee that meets each month and information security is always one topic on the agenda to review.

Board members do not understand that information security is in their realm of responsibility and focus solely on corporate governance and profits.

Board members understand that information security is critical to the company and demand to be updated quarterly on security performance and breaches.

Company BCompany A

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 167

© Logical Security

The organization does not analyze its performance for improvement, but does continually march forward and makes the same mistakes over and over again.

The organization is continuing to review its business processes, including security, with the goal of continued improvement.

Security products, managed services, and consultants are purchased and deployed without any real research or performance metrics to be able to determine the return on investment or effectiveness. Company has a false sense of security because it is using products, consultants, and/or managed services.

Security products, managed services, and consultants are purchased and deployed in an informed manner. They are also constantly reviewed to ensure they are cost effective.

Policies and standards are developed, but no enforcement or accountability practices have been envisioned or deployed.

Employees are held accountable for any security breaches they participate in, either maliciously or accidentally.

Business processes are not documented and are not analyzed for potential risks that can affect operations, productivity, and profitability.

Critical business processes are documented along with the risks that are inherent at the different steps within the business processes.

Company BCompany A

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 168

© Logical Security

Security Program Components

Policies

Standards

Baselines

Guidelines

Roles

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 169

© Logical Security

Policy Framework

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 170

© Logical Security

Policy Types

Organizational Policy

Management’s directives on the role of security within company

Organizational policy is created to address:

Business needs

Laws

Regulations

Standards of due care

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 171

© Logical Security

Organizational Policy

Policy should have the following goals:

Define security program

Set strategic directions

Assign responsibilities

Address all compliancy issues

Identify assets

Provides personal responsibility

Give authority

Tool to resolve conflicts

Define security team

Address exceptions and discipline

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 172

© Logical Security

Policy Approved – Now What?

Once policies are approved by governing body, control objectives should be defined.

The objectives of management are used as the framework for developing and implementing controls.

What do we need our controls to do before we buy and/or implement them?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 173

© Logical Security

Issue-Specific PoliciesAlso called functional policies.

Issue-Specific Policies can be created for:

Protection of confidential/proprietary information

Unauthorized software

Employees working from home

Rights of privacy

Responsibility for correctness of data

Suspected malicious code

Physical emergencies

Risk management and contingency planning

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 174

© Logical Security

ASP Policy Example

Source: www.sans.org

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 175

© Logical Security

System-Specific Policies

Policy should have the following characteristics:

Express management’s decisions pertaining to systems

Content is based on technical analysis of stated systems

Map to specific system objectives and requirements

Strictly enforced

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 176

© Logical Security

System-Specific Policy

Concentrates directly on the use and maintenance of

computers and devices

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 177

© Logical Security

Standards

Organizational Standards Compulsory rules

Employee behavior

Computer and device use

Organizational standards (not to be confused with American National

Standards, FIPS, Federal Standards, or other national or international

standards) specify uniform use of specific technologies, parameters, or

procedures when such uniform use will benefit an organization.

Standardization of organization wide identification badges is a typical

example, providing ease of employee mobility and automation of

entry/exit systems.

- NIST

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 178

© Logical Security

Standard Example

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 179

© Logical Security

Baseline

Baselines

A minimum level of security required

Abstraction of the standards

Ensure acceptable risk level is met

Required configuration of systems

Metrics representation

Unauthorized access incidents

Unpatched systems

Users with too much access

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 180

© Logical Security

Data Collection for MetricsDifferent data collected is compared to set baselines to

validate compliance.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 181

© Logical Security

Guidelines

Guidelines

Recommendations on actions in different situations

Operational guides where standards do not apply

Industry or internal guidelines

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 182

© Logical Security

Procedures

Procedures

Detailed activities to be taken to achieve a specific task

Step-by-step instructions

Implementation of standards

Standardization

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 183

© Logical Security

Tying Them Together

Policy = Unauthorized users should not have access to sensitive data

Standard = Users must be authorized with a smart card and PIN before accessing the database

Baseline = Number of unauthorized accesses allowed

Guideline = Explanation of identification and authorization and smart card use

Procedures = How to configure the database

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 184

© Logical Security

Program Support

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 185

© Logical Security

Entity Relationships

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 186

© Logical Security

Senior Management’s Role

Senior Management

Defines the scope, objectives, priorities, and strategies of the company’s security program

Provides vision, funds, visibility, and enforcement

Ultimately liable

Without management’s support, efforts can be doomed from start

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 187

© Logical Security

Security Roles

Data Owner

Responsible for subset(s) of data and data classification

Sets security requirements for data protection

Usually process owners or business VPs or department heads

Business accountability

Not ITs job

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 188

© Logical Security

Custodian

Custodian

Is delegated data maintenance tasks

Required to implement and maintain controls to provide the protection level dictated by data owner

Usually a technical security staff or IT

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 189

© Logical Security

Auditor

Ensuring independent assurance to management and shareholders on the appropriateness of security objectives

Determines if controls (administrative, technical, physical) comply with security objectives

Internal and external auditing

Third-party reviews

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 190

© Logical Security

Access

“Who determines the level of access employees have and

who configures the technology and who validates it all?”

Response: “Fred, the IT guy.”

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 191

© Logical Security

Information Classification

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 192

© Logical Security

Information Classification Program

Classification goals

Availability, integrity, and confidentiality are provided at the necessary levels for all identified assets

Return on investment by implementing controls where they are needed the most

Map data protection levels with organizational needs

Mitigate threats of unauthorized access and disclosure

Comply with legal and regulation requirements

Maintain competitive status

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 193

© Logical Security

Data LeakageData is the gold of our times that must be protected.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 194

© Logical Security

Do You Want to End Up in the News?

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 195

© Logical Security

Types of Classification Levels

Commercial

Confidential

Private

Sensitive

For internal use only

Military

Top secret

Secret

Confidential

Sensitive but unclassified

Unclassified

PublicCompanies need to decide what levels

they will use and

what those levels mean.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 196

© Logical Security

Data Protection Levels

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 197

© Logical Security

Classification Program Steps

1. Compile an inventory of all information assets

2. Define levels of protection for information assets

3. Define a classification criteria

4. Develop information classification policy

5. Define information handling and labeling procedures

6. Assign responsibility for classification to the owner of information

7. Assign a security classification to all information assets

8. Classify information according to sensitivity and how much protection is required

9. Integrate into security awareness and training programs

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 198

© Logical Security

Information Classification Components

A policy should outline:

Information as an asset of individual business units

Declare business unit managers as information owners

Declare IT as data custodians

Classification scheme

Definitions for each classification

Criteria for each classification

Roles and responsibilities of classification

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 199

© Logical Security

Procedures and Guidelines

Procedures and guidelines should outline:

How to classify information

How to change classification level if needed

How to communicate classification change to IT

How to declassify and destroy material

Periodic review of:

Current classification levels and mapping to business needs

Current access rights and privileges

Protection levels that current controls are using

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 200

© Logical Security

Classification Levels

Once the organization understands the different levels of

protection that must be provided, it can develop the

necessary classification levels.

Too many classification levels are impractical and add confusion.

Too few classification levels gives the perception of little value and use.

There should be no overlap between classification levels.

Classification levels should be developed for data and software.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 201

© Logical Security

Information Classification Criteria

Criteria Items

Usefulness and value of information

How long information will hold this protection requirement

The level of damage possible if the data was disclosed, modified, or corrupted

Laws, regulations, or liability responsibilities pertaining to the data

Lost opportunity costs

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 202

© Logical Security

Criteria Example

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 203

© Logical Security

Or Not

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 204

© Logical Security

Information Owner Requirements

To properly classify information, the information owner must:

Understand the organization’s classification scheme and criteria

Be familiar with legal and regulation requirements

Carry out classification processes in a consistent manner

Have classification processes reviewed and monitored

Carry out declassifying procedures when necessary

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 205

© Logical Security

Clearly Labeled

All classified items need to be clearly labeled

Handling of data in different formats (paper, digital, video, audio, facsimile)

Marking should be on cover and inside of documents

Magnetic or optical media must be labeled

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 206

© Logical Security

Testing Classification Program

Are documents in open view?

Is sensitive information viewable on computer screen?

Is data physically protected and not just logically protected?

How is sensitive data destroyed?

Review users’ access levels

Review an information flow matrix

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 207

© Logical Security

Who Is Always Causing Problems?

Not birds

– PEOPLE are always a security headache.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 208

© Logical Security

Employee Management

Hiring and Firing

Termination

Training

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 209

© Logical Security

Employee Management

Weakest link in security is people

80/20 rule

Proper management of employees is very important

Communication structure needs to be in place

Constructing and enforcing policies

Culture

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 210

© Logical Security

Employee Position and Management

Employee Management

Position definition

Determining position sensitivity

Filling the position - screening and selecting

Employee training and awareness

User account management

Audit and management reviews

Detecting unauthorized/illegal activities

Temporary assignments and in-house transfers

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 211

© Logical Security

Hiring and Firing Issues

Pre-employment

Background check

Drug screening

Security clearance

Credit check

Termination Procedures

Complete an exit interview

Review the non-disclosure agreement

Individual must be immediately escorted out of the facility

Individual must surrender ID badges, keys, and company assets

User’s accounts must be disabled

User’s passwords must be changed

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 212

© Logical Security

A Few More Items

When hiring be alert about future checks that may be necessary if the individual moves to a higher classification level in the company.

Hiring and firing practices should follow pre-determined checklists developed by HR.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 213

© Logical Security

Unfriendly Termination

Security and Safety Steps

1. System access should be terminated as quickly as possible.

2. System access should be removed at the same time (or just before) the employees are notified of their dismissal.

3. System access should be immediately terminated.

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 214

© Logical Security

Security Awareness and Training

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 215

© Logical Security

Training CharacteristicsAwareness Training Education

Attribute: “What” “How” “Why”

Level: Information Knowledge Insight

Learning Objective:

Recognition and Retention

Skill Understanding

Example Teaching Method:

Media

-Videos

-Newsletters

-Posters

Practical Instruction

-Lecture and/or demo

-Case study

-Hands-on practice

Theoretical Instruction

-Seminar and discussion

-Reading and study

-Research

Test Measure:

True/False

Multiple Choice

(Identify learning)

Problem Solving, i.e.,

Recognition and Resolution

(Apply learning)

Essay

(Interpret learning)

Impact Timeframe:

Short-term Intermediate Long-term

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 216

© Logical Security

Awareness

Security Awareness Program

Employees must know what’s expected of them, as well as the ramifications of non-compliance

This is part of due care and can be used in liability cases if not performed

Banners, employee handbooks, posters

Should be performed annually

Policies, standards, baselines, guidelines

Incident reporting, malware, social engineering, hazards

Different training for different employee groups

Technical = IT

Liability, laws, regulations = management levels

Basic security and usability issues = users

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 217

© Logical Security

Security Enforcement IssuesImportance

Not just lip service

Support directly from upper management

Ensures required baseline of security is met

Realized ramifications for actions

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 218

© Logical Security

Answer This Question

A company needs to be concerned about an asset’s reliability,

confidentiality, and integrity. What is used to enforce the

protection of integrity?

a. Controlling physical security

b.Using access controls

c. Enforcing the rules of confidentiality

d.Using logical security

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Slide 219

© Logical Security

Answer This Question

The risk management team process for identifying,

controlling, eliminating, and/or minimizing uncertain events

can be assisted by what aid?

a. Qualitative risk assessment processes

b.Automated information system security tools

c. Internal security controls

d.Risk mitigation

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Review Questions:

1. Which of the following is an example of an ultimate data owner?

A. Front-line employee

B. Customer accessing information via the extranet

C. IT administrator

D. CIO

2. What is the term that defines when senior management initiates and sponsors a

company’s security program?

A. Bottom-up approach

B. Top-down approach

C. Steering committee

D. Middle-driven approach

3. Which of the following would not be part of an organizational security policy?

A. Security program goals

B. E-mail security policy

C. Responsibilities assignments

D. Enforcement information

4. A technique used in qualitative risk analysis that uses the anonymous opinions of

all individuals is called what?

A. Consensus approach

B. Delphi technique

C. Group mentality

D. Group discussion phase

5. Which of the following terms is a recommendation to an employee on how to act?

A. Baseline

B. Rule

C. Guideline

D. Standard

6. Which is not an example or characteristic of qualitative risk analysis?

A. Delphi technique

B. Storyboarding

C. SLE calculations

D. Opinion-based

7. A policy that is more technically focused and outlines the directives dictated by

management is which of the following?

A. System-specific

B. Technical-specific

C. Organizational

D. Issue-specific

8. Which is not an example of security awareness?

A. Security training

B. Security bulletin board notes

C. Security ACLs

D. Security objectives in an employee’s performance review

9. A common omission in security programs by many companies is which of the

following?

A. Responsibility assignments

B. Penalties for non-compliance

C. Risk analysis

D. Awareness

10. What step should happen first when an employee is terminated if it is an

unfriendly separation?

A. Escorted off premises

B. Network and system access privileges removed

C. Facility ID badges handed out

D. Employees personal items should be boxed

11. Third party governance is used to accomplish what aspect of security?

A. Taking control of a third party’s IT department

B. Ensuring that a third party partner has met a certain level of compliance

and security

C. Allowing a third party entity to take over security of your organization’s IT

department

D. Hiring a contractor to do an internal audit

Answer Key:

1. D

The key here is the word ultimate. Employees and the administrator can be data owners

in some situations, but senior management is ultimately the owner of business-oriented

data. Data owners are legally bound to the protection of data within a company.

Because of this required responsibility, data owners should be members of senior

management. These individuals practice due care with data classifications and

associated security policies.

2. B

A top-down approach to security management is the ideal method because it is typically

more successful than the bottom-up approach. A top-down approach means that

management is driving a project, and bottom-up means that a lower level employee is

driving a project. The most important factor in security management is obtaining the

support of upper management.

3. B

An organizational security policy covers the entire program at a high level. Typically this

will cover how the program is set up, goals and objectives, who is responsible for what,

and how to enforce the policy. E-mail security would be an issue-specific policy.

4. B

In the qualitative risk analysis approach, the Delphi Technique is used to achieve

honest results by allowing the individuals to submit their opinions anonymously. This

technique is designed to allow people to submit their opinions without being influenced

by others.

5. C

Guidelines are used to provide employees with recommendations on how to perform

specific tasks. This is different than a standard, which is a rule that must be followed, or

a baseline, which is a minimal level of security.

6. C

Qualitative risk analysis does not focus on real-number calculations, but instead assigns

rankings to threats and countermeasures and focuses on judgment, intuition, and

experience. Single loss expectancy (SLE) is a method used in quantitative risk analysis.

7. A

System-specific policies are technical directives derived by management to protect

individual systems. They can outline how a system should be accessed or how users

should be trained on the use of a specific system.

8. C

Security awareness is a vital part of a successful security program. As its name states,

the goal is to make employees aware of the components of the security program.

Employees can be made aware in a variety of ways, such as e-mail, regular meetings,

training classes, or by having security-related tasks as part of their performance plans.

Access control lists (ACL) are security controls, but do not contribute to security

awareness.

9. B

A common mistake that many companies make is failing to include penalties in the

security program to be enforced if/when individuals do not comply with outlined

directives. As with any rule or law, without known consequences, it is unlikely that the

instruction will be followed. Security awareness is included in most security policies;

however, following through with the awareness objective is not as common.

10. B

The first step taken when an employee is terminated is to remove all network and

system privileges. The ex-employee could still remotely connect to a network and do

harm. Protecting the company’s assets should be the first step.

11. B

We need to make certain that working with a third party doesn’t introduce new security

concerns, so we use third party governance to work with verifying the third party’s

compliance to your security needs.


Recommended