Tải bản đầy đủ (.pdf) (7 trang)

Lecture Note Professional practices in information technology - Lecture No. 30: Information Security (Cont’d)

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.31 MB, 7 trang )

Professional Practices in Information Technology
CSC 110

Professional Practices in 
Information Technology
HandBook

COMSATS Institute of Information 
Technology
(Virtual Campus)
Islamabad, Pakistan


Professional Practices in Information Technology
CSC 110

Lecture 30
Information Security (Cont’d)
30.1 Overview
Organizational Structures
Roles and Responsibilities
Information Classification
Risk Management


Organizational Structure

Organization of and official responsibilities for security vary

– BoD, CEO, BoD Committee
– Director, Manager


IT/IS Security
Audit


Typical Organizational Chart


Professional Practices in Information Technology
CSC 110

Figure 30.1: Typical Organizational Chart



Security­Oriented Org Chart

Figure 30.2: Security­Oriented Org Chart


Professional Practices in Information Technology
CSC 110



Further Separation

Figure 30.3: Further Separation


Organizational Structure


Audit should be separate from implementation and operations

– Independence is not compromised
Responsibilities for security should be defined in job descriptions
Senior management has ultimate responsibility for security
Security officers/managers have functional responsibility


Roles and Responsibilities

Best Practices:

– Least Privilege
– Mandatory Vacations


Professional Practices in Information Technology
CSC 110

– Job Rotation
– Separation of Duties
Owners

– Determine security requirements
Custodians

– Manage security based on requirements
Users


– Access as allowed by security requirements


Information Classification

– Not all information has thesame value
– Need to evaluate value based on CIA
– Value determines protection level
– Protection levels determine procedures
– Labeling informs users on handling 
Government classifications:

– Top Secret
– Secret


Professional Practices in Information Technology
CSC 110

– Confidential
– Sensitive but Unclassified
Private Sector classifications:

– Confidential
– Private
– Sensitive
– Public
Criteria:

– Value

– Age
– Useful Life
– Personal Association


Risk Management

Risk Management is identifying, evaluating, and mitigating risk to an organization

– It’s a cyclical, continuous process
– Need to know what you have
– Need to know what threats are likely


Professional Practices in Information Technology
CSC 110

– Need to know how and how well it is protected
– Need to know where the gaps are


Identification

Assets
Threats

– Threat­sources: man­made, natural
Vulnerabilities

– Weakness

Controls

– Safeguard 



×