Planning for Security - Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

EISP

Enterprise Info Security Policy

Operational Controls

are management and lower-level planning functions that deal with the operational functionality of security in the organization, such as disaster recovery and incident response planning.

Technical Controls

are the tactical and technical implementations of security in the organization.

Policies should NEVER __________ law.

contradict

For a policy to be effective, it must be able to ____________ that the policy has been made readily available for review by the employee.

demonstrate

Policies _______ how issues should be addressed and technologies used.

direct

When situations classified as ________, plans change as to how to respond; take action.

disasters

Incident Response planning covers:

identification of, classification of , and response to an incident.

SysSPs frequently function as standards and procedures used when configuring or _____________ systems.

maintaing

Primary function of Business Continuity Plan:

occurs concurrently with the DR plan when the damage is major or ongoing, requiring more than simple restoration of info and info resources.

EISP sets strategic direction, scope, and tone for all security efforts within the _________________.

organization

Policies are _________ laws.

organizational

Downsides of current automated response systems may __________ their benefits.

outweigh

Like laws, __________ define what is right, what is wrong, what the penalties are for violating policy, and what the appeal process is.

policies

creation of info security program begins with creation and or review of an organizations info security policies, standards, and ___________.

practices

Incident Planning

predefined responses enable organization to react quickly and effectively to detected incident if: - organization has IR team - organization can detect incident

Goal of info security governance:

provide strategic direction, ensuring objectives are achieved.

Incident response is more __________ than proactive, with the exception of planning that must occur to prepare IR teams to be ready to react to an incident.

reactive

What may truly distinguish an incident from a disaster are the actions of the _____________ team.

response

Access Control List

restrict access for a particular user, computer , time, duration, or a particular file.

cold sites

rudimentary services and facilities

SETA

security education, training, and awareness program

Managerial controls

security processes that are designed by strategic planners and implemented by the security administration of the organization.

Governance

set of responsibilities and practices exercised by the board and executive management

Damage Assessment

several sources of info on damage, including system logs, intrusion detection logs, configuration logs and documents, documentation from incident response.

Team Members

should be managers or their representatives from the various communities of interest: business, information technology, and information security.

Security Blueprint

the basis for design, selection, and implementation of all security policies, education, and training programs, and technological controls.

Security Perimeter

the boundary between the outer limit of an organization`s security and the beginning of the outside world.

Strategic Planning

the process of moving the organization toward its vision.

Electronic Vaulting:

the transfer of large batches of data to an offsite facility.

Remote journaling:

the transfer of live transactions to an offsite facility.

Shared site options:

time share, service bureaus, and mutual agreements.

Offsite Disaster Data Storage

to get these types of sites up and running quickly, the organization must be able to move data into the new sites systems.

DMZs

- A buffer against outside attacks is frequently referred to as a demilitarized zone (DMZ). - The DMZ is a no-man`s land between the inside and outside networks; it is also where some organizations place Web servers.

Disaster Recovery planning:

- DRP is planning the prep for and recovery from a disaster - the contingency planning team must decide which actions constitute disasters, and which constitute incidents.

Three levels of Controls:

- Managerial controls - Operational controls - Technical controls

The ISO 27000 Series

- One of the most widely referenced and often discussed security models. - Framework for info security

ACLs regulate the following:

- Who can use the system - What authorized users can access - When authorized users can access the system - Where authorized users can access the system from

Crisis Management:

- actions taken during and after a disaster that focus on people involved, and address viability of business. - disaster recovery personnel must know their roles without any supporting documentation.

The ISSP :

- addresses specific areas of technology - requires frequent updates - contain statement on organizations position on specific issue.

Attacks are classified as incidents if they:

- are directed against info assets - have a realistic chance of success - could threaten confidentiality, integrity, or availability of info resources.

Incident Reaction (3rd phase)

- consists of actions that guide organization to stop incident, mitigate the impact of incident, and provide info for recovery from incident. - actions that must occur quickly: * notification of key personnel * documentation of incident

Three approaches when creating and managing ISSPs:

- create a number of independent ISSP document - create a single comprehensive ISSP document - create a modular ISSP document

Incident Containment Strategies:

- first the areas of affected must be determined - organization can stop incident and attempt to recover control through a number of strategies

Defense in Depth:

- implementation of security in layers - requires that organization establish sufficient security controls and safeguards so that an intruder faces multiple layers of controls.

Purpose of SETA is to enhance security by doing the following:

- improving awareness of the need to protect system resources. - developing skills and knowledge so computer users can perform their jobs more securely. - Building in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems.

The sphere of use

- left side of "sphere of security" - illustrates the ways in which people access info.

Incident Detection (2nd phase)

- most common occurrence is complaint about technology, support, often delivered to help desk. - careful training needed to quickly identify and classify an incident. - once attack is properly identified, organization can respond.

Automated Response

- new systems can respond to incident threat autonomously.

Incident Recovery (4th Phase)

- once incident has been contained and control of the systems regained, the next stage is recovery. - first task is to identify the needed human resources and launch them into action. - full extent of the damage must be accessed - organization repairs vulnerabilities, addresses any shortcomings in safeguards, and restores data and services of the systems.

Disadvantages of Law enforcement involvement:

- organization loses control once LE takes over case - organization may not hear about case for weeks/months - vital equipment may be tagged as evidence

Business Continuity Planning

- outlines reestablishment of critical business operations during a disaster that impacts operations. - If a disaster has rendered the current location unusable, there must be a plan to allow the business to continue to function.

Project Manager

- possibly a midlevel manager or even the CISO - must lead the project and make sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed to reach the goals of the project.

The sphere of protection

- right side of "sphere of security" - illustrates that between each layer of the sphere of use there must exist a layer of protection.

Benefits of Law enforcement involvement:

- the agencies may be much better able to process evidence than a particular organization

Spheres of Security

- the foundation of the security framework - illustrate how info is under attack from a variety of sources.

Continuity Strategies:

- there are a number of strategies for planning for business continuity - determining factor in selecting between options is usually cost.

Key areas of crisis management include:

- verifying personnel head count - checking the alert roster - checking emergency info cards

Law Enforcement Involvement

- when incident at hand constitutes a violation

Security Awarenes

-One of the least frequently implemented, but most beneficial. - This program is designed to keep info security at the forefront of users` minds.

Five common testing strategies are presented here:

1. Checklist 2. Structured walk-through 3 Simulation 4. Parallel 5. Full Interuption

2 types of IDPSs:

1. Host-based IDPSs 2. Network-based IDPSs

Shaping policy is difficult because policy must:

1. Never conflict with laws. 2. Stand up in court, if challenged 3. Be properly administered through dissemination and documented acceptance.

IR consists of the following four phases:

1. Planning 2. Detection 3. Reaction 4. Recovery

Five goals of Info Security Governance

1. Strategic Alignment 2. Risk management 3. Resource Management 4. Performance measures 5. Value delivery

5 stages of the BIA:

1. Threat attack identification and prioritization 2. Business unit analysis 3. Attack success scenario development 4. Potential damage assessment 5. Subordinate plan classification.

When an organization considers involving law enforcement, there are several questions that must be answered.

1. When should the organization get law enforcement involved? 2. What level of law enforcement agency should be involved - local, state, or federal. 3. What happens when a law enforcement agency is involved ?

EISP 4 main elements:

1. an overview of the corporate philosophy on security. 2. Information on the structure of the info security organization and individuals who fulfill the info security role. 3. Fully articulated responsibilities for security that are shared by all members of the organization ( employees, contractors, consultants, partners, and visitors ) 4. fully articulated responsibilities for security that are unique to each role within the organization

The EISP typically addresses compliance in the following two areas:

1. ensures requirements are met to establish program and assign responsibilities therein to various organizational components. 2. use of specified penalties and disciplinary action.

Dedicated recovery site options:

1. hot sites. 2. warm sites. 3. cold sites.

Systems-specific policies fall into two groups:

1. managerial guidance 2. technical specifications

What three things are needed for an organization to meet info security needs of various communities of interest?

1. policy 2. blueprints 3. planning

What are the seven components of an ISSP ?

1. statement of policy 2. authorized access and usage of equipment 3. prohibited usage of equipment 4. systems of management 5. violations of policy 6. policy review and modification 7. limitations of liability.

Firewalls

A device that selectively discriminates against info flowing into or out of the organization.

Testing:

A plan untested is not a useful plan.

Security Education

Everyone in an organization needs to be trained and made aware of information security, but not every member of the organization needs a formal degree or certificate in info security.

To detect unauthorized activity within the inner network or on individual machines, organizations can implement __________________.

IDPSs

Storage:

Information in the IR plan is sensitive and should be protected.

IDPSs

Intrusion Detection and Prevention Systems

ISSP

Issue-Specific Security Policy

Security policies are the _______ expensive controls to execute, but most difficult to implement properly.

least

Mission

written statement of an organizations purpose.

Proxy Servers

Performs actions on behalf of another system.

Policy Management

Policies must be managed as they constantly change

The policy champion and manager is called the ____________ _________________.

Policy Administrator

Security Training

Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely.

SysSP

Systems Specific Policy

Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of information is referred to as _________________.

Redundancy

Format and Content:

The IR plan must be organized to support quick and easy access to required information.

mutual agreements

a contract between two or more organizations that specifies how each will assist the other in the event of a disaster.

Champion

a high level manager to support, promote, and endorse the findings of the project. This could be the CIO, or ideally the CEO.

Database Shadowing:

a process that duplicates data in real time using databases at a remote site or to multiple servers.

Incident Response Plan

addresses the identification, classification, response, and recovery from an incident.

Disaster Recovery Plan

addresses the preparation for and recovery from a disaster, whether natural or man-made.

service bureaus

an agency that provides a service for a fee

Communities of interest must consider policies as the _______ for all info security efforts.

basis

Policy:

course of action used by organizations to convey instructions from management to those who perform duties.

Managerial guidance SysSPs

created by management to guide the implementation and configuration of technology as well as to address the behavior of people in the organization in ways that support the security of info.

Business Continuity Plan

ensures that critical business functions continue if a catastrophic incident or disaster occurs.

Primary function of Incident Response:

focuses on immediate response, but if the attack escalates or is disastrous the process moves on to disaster recovery and the BC plan.

Primary function of Disaster Recovery plan:

focuses on restoring systems at the original site after disasters occur, and as such is closely associated with the BC plan.

Spheres of security :

foundation of the security framework

warm sites

fully operational hardware but software may not be present.

hot sites

fully operational sites

Selection or creation of info security architecture and the development and use of a detailed info security blueprint creates a plan for ________ success.

future

Governance Framework

in order to effectively implement security governance, follow an established framework which defines the responsibilities of key players

Business Impact Analysis (BIA)

investigation and assessment of the impact that various attacks can have on the organization.

time-share

is a hot, warm, or cold site that is leased in conjunction with a business partner or sister organization.

Contingency Plan

is prepared by the organization to anticipate, react to, and recover from events that threaten the security of info and info assets in the organization and, subsequently, to restore the organization to normal modes of business operations.

Vision

written statement about the organizations goals - where will the organization be in five years ?


Ensembles d'études connexes

(PrepU) Chapter 6: Values, Ethics, and Advocacy -

View Set

FIN: Ch 5 Introduction to Valuation: The Time Value of Money

View Set

Life in Medieval Towns- Chapter 4

View Set

Chapter 4 Algebra 2 Vocabulary Test

View Set

ACCT 4800 - Chapter 1 Homework/SmartBook

View Set

3.5 - Second Amendment: The Right to Bear Arms

View Set