+ All Categories
Home > Documents > Course: Information Security Management in e-...

Course: Information Security Management in e-...

Date post: 02-Jun-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
53
Course: Information Security Management in e- Governance Day 1 Session 2: Introduction to Information Security in e-Governance
Transcript
Page 1: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Course: Information Security Management in e-

Governance

Day 1

Session 2: Introduction to Information Security

in e-Governance

Page 2: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Agenda

� Need for Information Systems Security Policy

� Elements of Information Security Policy

� Approach for development of Information Security Policy

� Information Security Organization and roles, responsibilities

Page 3: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

What is Information?

• BS ISO 27002:2005 definesInformation as :

• 'Information is an asset which, likeother important business assets,has value to an organization andconsequently needs to be suitablyprotected’

Slide 3

Page 4: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

What is Information?

• Printed or written on paper

• Stored electronically

• Transmitted by post or using electronics means

• Shown on corporate videos

• Displayed / published on web

• Verbal – spoken in conversations

Information can be

Slide 4

‘…Whatever form the information takes, or means by which it isshared or stored, it should always be appropriately protected’

(BS ISO 27002:2005)

Page 5: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information in Governments

– Governments are moving towards e-Governance to improve convenience, reduce time,

improve transparency in delivering services to businesses and citizens

– Businesses and citizens expect high standards of services, instant access to information,

efficient transactions and support, whenever and wherever they need it, but in a secure

fashion.

– The two major components of the approach are the information delivery and service

delivery.

– In the first component, various web-based information services are used by the

Governments of different granularity.

– On the other hand, in the second component, the citizen is given access to the

Government business related IT systems to provide transaction services (e.g. tax

payments, filing of forms, issuing certificates etc)

Slide 5

Page 6: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information in Governments

– These two types of components bring the issues of information and systems security such

as architecture, standards and technology to the forefront.

– Another fundamental element of the problem is the unprecedented gap between the pace

of technological change and the inevitably glacial pace of policy and law making.

– Any good system of governance should be resilient to attacks by frauds, inadvertent virus, a

variety of motivated cyber crimes through unauthorised access and even to a nation-

sponsored cyber war and in the scenarios of disaster and warfare.

– In a networked society these kinds of threats have a potential to cripple a Government.

Slide 6

Page 7: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information in Governments

– Models of e-Governance From the developmental perspective, e-Governance can

be defined as the application of electronic means (in particular the ICT) in:

(1) the interaction between Government and citizens and Government and

businesses, as well as in

(2) internal Government operations to simplify and improve democratic,

Government and business aspects of Governance

Slide 7

Page 8: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Some of the kind of Information

exchanged in Governments

Information types

Public Information,

Critical Information,

Comparative Data,

Feedback and Opinions,

Business Information,

and

Personalized Information.

Slide 8

Based on these classes of information, their sources and frequency of update and exchange,

various models of e-Governance projects are evolved.

Page 9: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information assets in Governments

• Information can be found in various places such as :

• End user environment – Systems , documents etc.

• Servers – application (web , in house developed, mail etc) , database

server , backup servers, Domain servers and many more

• Network - Wireless Networks , Local area network , internet etc.

• Other devices such as laptops , pocket devices, smart cards, smart

phones, tablet PCs etc

Slide 9

Page 10: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Technology Base for e-Governance

– Communication Network: The Data and Voice Network owned by the

Government or private players.

– e-Government System Interface: Point of admission to the Government

System.

– Backend Systems: Database and Business layers of the Information

Infrastructure

Slide 10

Page 11: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Facets of Information assets Information available at end user levelwhich could be trusted , un-trusted , ThirdParty etc .

Service Layer – Information is availableat the applications , databases etc level

Network Layer – Information resides atthe network level which encompassesthe entire business functions of theGovernments.

Service Delivery platforms have a hugeasset in terms of government data

InternetThird-Party

Application

Untrusted

Web Tier

Application

Service Delivery Platform

Common Framework

Backbone Network

Partly

Trusted

Databases

Page 12: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Securing the information assets

• Security of information & information assets is becoming a major area of concern

• With every new application, newer vulnerabilities crop up, posing immense

challenges to those who are mandated to protect the IT assets

• e-Government security requirements can be studied by examining the overall

process, beginning with the citizens end and ending with the e-Gov server

• The assets that must be protected to ensure secure e-Gov include client

computers, the messages traveling on the communication channel, and the Web

and e-gov servers – including any hardware attached to the servers

Slide 12

Page 13: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Need for Information security in

Governments • In the current climate of elevated risk created by the vulnerabilities of and threats

to the Nations IT infrastructure, cyber security is not just a paperwork drill.

• Adversaries are capable of launching harmful attacks on IT systems, networks, and

information assets.

• Enterprise concerns have been heightened by increasingly sophisticated hacker

attacks and identity thefts, warnings of cyber terrorism, and the pervasiveness of

IT uses.

• Many in the industry and critical infrastructure organizations have come to

recognize that their continued ability to gain citizens confidence will depend on

improved software development, systems engineering practices and the adoption

of strengthened security models and best practices.

Slide 13

Page 14: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Need for Information security in

Governments (contd..) • Governments amass a great deal of confidential information about their

employees, customers, products, research, and financial status.

• Most of this information is now collected, processed and stored on

electronic computers and transmitted across networks to other

computers.

• A breach of security could lead to lost opportunities, defamation, loss of

goodwill, repudiation loss, financial loss , transactional loss , loss of

citizens confidence and many others

Slide 14

Page 15: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Need for Information security in

Governments (contd..) • Example include many such as

• A defacement / hacking of a public website can cause loss of

repudiation

• Vital data i.e. databases can be lost if unauthorized entry is not

checked properly

• A e-procurement website stops functioning all of a sudden

• A disaster strikes and the processes gets standstill

• Repudiation loss: One party of a transaction denies having received a

transaction nor can the other party deny having sent a transaction ??

• Protecting confidential information is a business requirement, and in

many cases also an ethical and legal requirement!!

Slide 15

Page 16: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Understanding Security Measures

• Data Center Security

• Use Firewalls

• Web-site Security

• Anti-virus tools

• Anti-phishing tools

• Physical Office Security

• Restricted Accessibility

• Regular checks & reviews

• Secured Working Processes

• Planning long-term solutions

• Process-Cycle to be followed (PDCA Cycle – Plan, Do, Check & Assess Cycle )

Slide 16

Page 17: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Categorization of Information Systems

• Categorize Information based on

• Hardware

• Software

• Data

• Documentation

• Personnel

• Procedures

• Models etc

Slide 17

Page 18: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Challenges & Issues - Security

• • Data & Application security

• PPP models (service delivery model)

• Lack of internal Technical capacities

– Loopholes in the applications and databases

– Knowledge transfer

– Exit management

• • Complex e-Governance Projects

– High performance & response time

– High Security desired on operations but not a top priority to start with

• • Multiple Legacy Environments

• Security framework

• Implementation of Security Standards

• Implementation of suitable access controls and authorization

• Preparation of RFPs which captures all the security requirements

Slide 18

Page 19: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Points of concern in Governments

• Letting vendors define “good security”

• Underestimating the required security expertise

• Assigning untrained people to maintain security

• Relying primarily on a firewall.

• Firstly think of budget concerns, neglecting the value of their information

and organizational reputations.

• Authorizing reactive, short-term fixes so problems re-emerge rapidly.

Slide 19

Page 20: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Top Security Myths

Security myths

Firewalls make your

data secure.

Encryption makes your

data secure.

Hackers cause most

security breaches.

In fact, 80% of data loss is caused by

insiders.

In fact, encryption is only one

approach to securing data. Security

also requires access control, data

integrity, system availability, and

auditing.

In fact, 40% of Internet break-ins

occur in spite of a firewall being in

place!!!!

Page 21: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Defining the risks , threats and vulnerabilities

– Risk: A possibility that a threat exploits a vulnerability in an asset and

causes damage or loss to the asset

– Threat: Something that can potentially cause damage to the

organization, IT Systems or network.

– Vulnerability: A weakness in the organization, IT Systems, or network

that can be exploited by a threat

Slide 21

Page 22: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Threats

– External Parties

– Low awareness of security issues

– Employees

– Growth in networking and distributed computing

– Growth in complexity and effectiveness of hacking tools and viruses

– Natural Disasters eg. fire, flood, earthquake

Slide 22

Page 23: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Generic Threat Profile

Slide 23

Critical Information Assets

Disclosure

Modification

Loss, Destruction

Interruption

Disclosure

Modification

Loss, Destruction

Interruption

Disclosure

Modification

Loss, Destruction

Interruption

Disclosure

Modification

Loss, Destruction

Interruption

Accidental

Accidental

Deliberate

Deliberate

Inside

Outside

Page 24: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information Security Threats and

Vulnerabilities • Client Threats: Until the introduction of executable Web content, Web pages were

mainly static. Coded in Hyper Text Markup Language (HTML), static pages could do

little more than display content and provide links to related pages with additional

information.

• Widespread use of active content has changed this perception.

• Active Content: Active Contents like Java applets, ActiveX controls, JavaScript, and

VBScript refer to programmes that are embedded transparently in Web pages and

that cause action to occur.

• Embedding active content to Web pages involved in e-Governance introduces

several security risks.

• Malicious active content delivered by means of cookies can reveal the content

of client-side files or even destroy files stored on client computers.

Slide 24

Page 25: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information Security Threats and

Vulnerabilities• Malicious Codes: Computer viruses, worms and Trojan Horses are examples of malicious

code. People are aware but may not be prepared to deal with such adversaries.

• Server-side Masquerading: Masquerading lures a victim into believing that the entity with

which it is communicating is a different entity.

• For example, if a user tries to log into a computer across the Internet but instead reaches

another computer that claims to be the desired one, the user has been spoofed.

• Communication Channel Threats: The Internet serves as the electronic chain linking a

consumer (client) to the e-Gov server.

• Messages on the Internet travel randomly from a source node to a destination node.

• Impossible to guarantee that every computer on the Internet through which messages

pass is safe, secure, and non-hostile.

Slide 25

Page 26: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information Security Threats and

Vulnerabilities• Confidentiality Threats: Confidentiality is the prevention of unauthorised

information disclosure. Use of Internet definitely poses confidentiality threats to

the messages sent.

• Availability Threats: The purpose of availability threats, also known as delay or

denial of service threats, is to disrupt normal computer processing or to deny

processing entirely. Slowing any Internet service will detract citizens from using

egov services.

• Server Threats: The server is the third link in the client-Internet-server trio

embodying the e-Gov path between the citizens and the Government. Servers

have vulnerabilities that can be exploited by anyone determined to cause

destruction or to illegally acquire information.

Slide 26

Page 27: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information Security Threats and

Vulnerabilities

• Web Server Threats: Web server software is not inherently high-risk, it has been designed

with Web service and convenience as the main design goal. The more complex the software

is, the higher the probability that it contains coding errors (bugs) and security holes.

• e-Gov Server Threats: The e-Gov server, along with the Web server, responds to requests

from Web browsers through the HTTP protocol and Common Gateway Interface (CGI) scripts.

Several pieces of software comprise the egov server software suite. Each of these softwares

can have security holes and bugs.

• Database Threats: Besides Government information, databases connected to the Web

contain critical and private information that could irreparably damage a enterprise or citizen

if it were disclosed or altered.

• Some databases store user name/password pairs in a non-secure way.

• If someone obtains user authentication information, then he or she can masquerade as a

legitimate database user and reveal private and costly information.

Slide 27

Page 28: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information Security Threats and

Vulnerabilities• Common Gateway Interface Threats: A Common Gateway Interface (CGI) implements the

transfer of information from a Web server to another programme, such as a database

programme. Because CGIs are programmes, they present a security threat if misused

• Password Hacking: The simplest attack against a password-based system is to guess

passwords.

• Guessing of passwords require access to the complement, the complementation

functions, and the authentication functions be obtained.

• If none of these have changed by the time the password is guessed, then the attacker

can use the password to access the system.

Slide 28

Page 29: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Threat Sources

Slide 29

Source Motivation Threat

External HackersChallenge Ego Game Playing

System hacking

Internal HackersDeadline Financial problems

Backdoors Fraud Poor documentation

External Agents Revenge Political

System attacks Letter bombs Viruses Denial of service

Poorly trained employees

Unintentional errors Programming errors Data entry errors

Corruption of data Malicious code introduction System bugs Unauthorized access

Page 30: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Threat Sources

Slide 30

Categories of Threat Example

Human Errors or failures Accidents, Employee mistakes

Compromise to Intellectual Property Piracy, Copyright infringements

Deliberate Acts or espionage or trespass Unauthorized Access and/or data collection

Deliberate Acts of Information extortion Blackmail of information exposure / disclosure

Deliberate Acts of sabotage / vandalism Destruction of systems / information

Deliberate Acts of theft Illegal confiscation of equipment or information

Deliberate software attacks Viruses, worms, macros Denial of service

Deviations in quality of service from service provider Power and WAN issues

Forces of nature Fire, flood, earthquake, lightening

Technical hardware failures or errors Equipment failures / errors

Technical software failures or errors Bugs, code problems, unknown loopholes

Technological Obsolesce Antiquated or outdated technologies

Page 31: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Threat Sources

Slide 31

High User Knowledge of IT

Systems

Theft, Sabotage, Misuse

Virus Attacks

Systems & Network Failure

Lack Of Documentation

Natural Calamities &

Fire

Lack of security

Page 32: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Relationships between assets , risks,

threats , vulnerabilities

Slide 32

Threats Agents

Threat

Vulnerability

Risks

Asset

Exposure

Safeguard

Gives Rise to

Exploits

Leads to

Can damage

And cause an

Can be countered by

Page 33: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information Security

• Information security means protecting information and information

systems from unauthorized access, use, disclosure, disruption, modification or

destruction.

• Information security enables a Organizations to meet its business objectives by

implementing business systems with due consideration of information

technology (IT)- related risks to the organization, business and trading partners,

technology service providers, and most importantly CITIZENS.

• The terms information security, computer security and information

assurance are frequently incorrectly used interchangeably.

• These fields are interrelated often and share the common goals of protecting the

confidentiality, integrity, availability , accountability and assurance of information.

Slide 33

Page 34: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

IT Security

• IT Security means eliminating the disruption of business operations and reducing

the exposure to various attacks.

• IT Security deals with several different “trust aspects” of information.

• Information security involves the architecture where an integrated combination

of appliances, systems and solutions, software, surveillance, and vulnerability

scans working together

• IT Security is not just confined to computer systems, it applies to all aspects of

protecting information or data, in whatever form. i.e. Physical, People etc.

• Security is achieved using several strategies simultaneously or used in

combination with one another

Slide 34

Page 35: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Security objectives

Organizations meet this goal by striving to accomplish the following objectives:

• Availability—The ongoing availability of systems addresses the processes, policies,

and controls used to ensure authorized users have prompt access to information. This

objective protects against intentional or accidental attempts to deny legitimate users

access to information or systems.

• Integrity of Data or Systems—System and data integrity relate to the processes,

policies, and controls used to ensure information has not been altered in an

unauthorized manner and that systems are free from unauthorized manipulation that

will compromise accuracy, completeness, and reliability.

• Confidentiality of Data or Systems —Confidentiality covers the processes, policies,

and controls employed to protect information of customers and the institution against

unauthorized access or use.

Page 36: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Security objectives (contd..)

• Accountability —Clear accountability involves the processes, policies, and

controls necessary to trace actions to their source. Accountability directly

supports non-repudiation, deterrence, intrusion prevention, security

monitoring, recovery, and legal admissibility of records.

• Assurance —Assurance addresses the processes, policies, and controls used to

develop confidence that technical and operational security measures work as

intended.

Slide 36

Page 37: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Information security focus

Information Security focus

• Protection of information assets

• Protection of Computer systems

• Protection of Data networks

• Protection of Databases & Applications

• Protection of end user environments

• Protection of Physical and environmental

• Security measures in Third Party Outsourcing

• Logical access control

• Disaster recovery Planning

• Security Audit

• Public Key Infrastructure

• Legal Frameworks and various initiatives by GoI

Page 38: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Technology which our

Business use

Elements of Information Security…

Slide 38

Technology

Process

People

Organization

Staff

Our Business

Process

Page 39: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Elements of Security….. People & Processes

• Management

• Employees

• Business Partners

• Service providers

• Contractors

• Citizens

• Regulators etc…

People who use or interact with the Information

Slide 39

• Helpdesk / Service management

• Incident Reporting and Management

• Change Requests process

• Request fulfillment

• Access management

• Identity management

• Service Level / Third-party Services Management

• IT procurement process etc...

The processes refer to "work practices" or workflow.

Page 40: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Technology “what we use to improve what we do”

Network Infrastructure

• Cabling, Data/Voice Networks and equipment

• Telecommunications services (PABX), including VoIP services , ISDN , Video Conferencing

• Server computers and associated storage devices

• Operating software for server computers

• Communications equipment and related hardware.

• Intranet and Internet connections

• VPNs and Virtual environments

• Remote access services

• Wireless connectivity

Application software

• Finance and assets systems, including Accounting packages, Inventory management, HR systems, Assessment and reporting systems

• Software as a service - instead of software as a packaged or custom-made product.

Slide 40

Page 41: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Technology “what we use to improve what we do”

Physical Security components

• CCTV Cameras

• Clock in systems / Biometrics

• Environmental management Systems: Humidity Control, Ventilation , Air Conditioning, Fire Control systems

• Electricity / Power backup

Access devices

• Desktop computers

• Laptops, ultra-mobile laptops and PDAs

• Thin client computing.

• Printers, Scanners, Photocopier etc.

Slide 41

Page 42: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

42

Confidentiality

Information Security

Integrity Availability Authenticity

Security PolicyPeople

Process

Technology

Regulatory Compliance

Access Control

Security Audit

User Awareness Program

Incident Response

Firewall, IPS/IDS

Encryption, PKI

Antivirus

Information Security Management

Assurance

Security Audit

Page 43: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

A Structured Approach to

Security Design• For security to be effective it must be designed as a whole and applied consistently

across an organization and its IT infrastructure.

• The steps to design security of a system is to model the system, identify the security properties to be preserved, model the adversary, and then ensure that the security properties are preserved under attacks.

• Detailed modeling of the system and identification of the required security properties are possible.

• But it is almost impossible to accurately model the adversaries and vulnerabilities of the system exploited by those adversaries.

• The result is that there is nothing called absolute security.

Page 44: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Security Engineering Life Cycle

Slide 44

Security requirement

Security Policy

Security Infrastructure Specification

Security Infrastructure Implementation

Security Testing

Requirement Validation

Page 45: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Security Engineering Life Cycle

• Security Requirement Specification and Risk Analysis

• The first phase in the Security Engineering Life Cycle collects information regarding assets

of the organisation that needs to be protected, threat perception on those assets,

associated access control policies, existing operational infrastructure, connectivity

aspects, services required to access the asset and the access control mechanism for the

services.

• Security Policy Specification

• Security Requirement Specification and Risk Analysis Report as input and generates a set

of e-Gov security policies.

• The policy statements are high-level rule-based and generic in nature and thereby, does

not provide any insight to system implementation or equipment configuration.

Slide 45

Page 46: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Security Engineering Life Cycle

• Security Infrastructure Specification

• This phase analyses the Security Requirement Specification and the Security

Policy Specification to generate a list of security tools that are needed to

protect the assets.

• It also provides views on the location and purpose of the security tools.

• Security Infrastructure Implementation

• The organisation, in this phase, procures, deploys, and configures the

selected security infrastructure at the system level.

Slide 46

Page 47: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Security Engineering Life Cycle

• Security Testing

• In this phase, several tests are carried out to test the effectiveness of the security

infrastructure, functionality of the access control mechanism, specified operational

context, existence of known vulnerabilities in the infrastructure etc.

• Requirement Validation

• This phase analyses the extent of fulfillment of the security requirements for

implementing e-Governance organization by the corresponding security policy and

the implemented security infrastructure.

• Change in the service goal, operational environment, and technological

advancement may lead to a fresh set of security requirements and thereby,

triggering a new cycle of the Security Engineering Life Cycle.

Slide 47

Page 48: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

e-Governance Security Assurance

Framework (eSAFE)

Slide 48

Categorization of Information

Systems

Baseline Control

SelectionRisk assessment

Refinement of controls

Implementation of controls

Monitoring Effectiveness of

Controls

Page 49: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Baseline Control Selection

Slide 49

Master Catalog of Security Controls

Complete Set of Security Controls and Control Enhancements

Low Baseline

Controls

Medium Baseline

Controls

High Baseline

Controls

Low Baseline

Selection of a subset of security

controls from the master catalog—

consisting of basic level controls

Medium Baseline

Builds on Low Baseline with

additional controls, and control

enhancements selected from the

master catalog

High Baseline

Builds on Medium Baseline with

additional controls, and control

enhancements selected from the

master catalog

Page 50: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Risk Assessment

• Identify risks based on

• Asset value

• Impacts

• Threats

• Vulnerabilities

• Asset loss exposure

Slide 50

Page 51: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Refinement & implementation of

controls

• Determine desirable and mandatory controls

• Evaluate existing and mandatory controls

• Determine the refinements needed in the

controls

• Implement controls

Slide 51

Page 52: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

Monitoring Effectiveness of Controls

• Monitor the controls in place

• Encourage testing

• Have security audit

• Move towards complying to information

security standards

Slide 52

Page 53: Course: Information Security Management in e- Governancegswan.gov.in/PDF/D1-2-Introduction-to-Information-Security-in-e-Governance-60min.pdf– Risk: A possibility that a threat exploits

References

• www.mit.gov.in

• www.egovonline.net

Slide 53


Recommended