Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Today, every organization relies on information throughout all phases of the security life cycle is

technology (IT). Many organizations are also absolutely essential for success.
moving at least portions of their information
The first step in the security life cycle is to
systems to the cloud. Management wants
assurance that the information produced by the assess the information security-related threats
that the organization faces and select an
organization’s own accounting system is reliable
and also about the reliability of the cloud appropriate response. Information security
professionals possess the expertise to identify
service providers with whom it contracts. In
addition, management also wants assurance potential threats and to estimate their
likelihood and impact. However, senior
that the organization is compliant with an ever-
increasing array of regulatory and industry management must choose which of the four
risk responses described in Chapter 7 (reduce,
requirements.
accept, share, or avoid) is appropriate to adopt
The Trust Services Framework organizes IT- so that the resources invested in information
related controls into five principles that jointly security reflect the organization’s risk appetite.
contribute to systems reliability:
Step 2 involves developing information security
1. Security—access (both physical and logical) policies and communicating them to all
to the system and its data is controlled and employees. Senior management must
restricted to legitimate users. participate in developing policies because they
must decide the sanctions they are willing to
2. Confidentiality—sensitive organizational impose for noncompliance. In addition, the
information (e.g., marketing plans, trade active support and involvement of top
secrets) is protected from unauthorized management is necessary to ensure that
disclosure. information security training and
3. Privacy—personal information about communication are taken seriously. To be
customers, employees, suppliers, or business effective, this communication must involve
partners is collected, used, disclosed, and more than just handing people a written
maintained only in compliance with internal document or sending them an e-mail message
policies and external regulatory requirements and asking them to sign an acknowledgment
and is protected from unauthorized disclosure. that they received and read the notice. Instead,
employees must receive regular, periodic
4. Processing Integrity—data are processed reminders about security policies and training
accurately, completely, in a timely manner, and on how to comply with them.
only with proper authorization.
Step 3 of the security life cycle involves the
5. Availability—the system and its information acquisition or building of specific technological
are available to meet operational and tools. Senior management must authorize
contractual obligations. investing the necessary resources to mitigate
Two Fundamental Information Security the threats identified and achieve the desired
Concepts level of security.

1. SECURITY IS A MANAGEMENT ISSUE, NOT Finally, Step 4 in the security lifecycle entails
JUST A TECHNOLOGY ISSUE regular monitoring of performance to evaluate
the effectiveness of the organization’s
Although effective information security requires information security program. Advances in IT
the deployment of technological tools such as create new threats and alter the risks
firewalls, antivirus, and encryption, senior associated with old threats. Therefore,
management involvement and support management must periodically reassess the
organization’s risk response and, when cost-effective approach to improving security by
necessary, make changes to information comparing the effects of additional investments
security policies and invest in new solutions to in preventive, detective, or corrective controls.
ensure that the organization’s information For example, management may be considering
security efforts support its business strategy in a the investment of an additional $100,000 to
manner that is consistent with management’s enhance security. One option might be the
risk appetite. purchase of a new firewall that would increase
the value of P by 10 minutes.
2. THE TIME-BASED MODEL OF INFORMATION
SECURITY A second option might be to upgrade the
organization’s intrusion detection system in a
The goal of the time-based model of manner that would decrease the value of D by
information security is to employ a combination 12 minutes. A third option might be to invest in
of preventive, detective, and corrective controls new methods for responding to information
to protect information assets long enough for security incidents so as to decrease the value of
an organization to detect that an attack is R by 30 minutes. In this example, the most cost-
occurring and to take timely steps to thwart the effective choice would be to invest in additional
attack before any information is lost or corrective controls that enable the organization
compromised. The time-based model of to respond to attacks more quickly.
information security can be expressed in the
following formula: Although the time-based model of security
provides a sound theoretical basis for
P >D + R, where evaluating and managing an organization’s
P = the time it takes an attacker to break information security practices, it should not be
through the various controls that protect the viewed as a precise mathematical formula. One
organization’s information assets problem is that it is hard, if not impossible, to
derive accurate, reliable measures of the
D =the time it takes for the organization to parameters P, D, and R. In addition, even when
detect that an attack is in progress those parameter values can be reliably
R =the time it takes to respond to and stop the calculated, new IT developments can quickly
attack If the equation is satisfied (i.e., if P > D + diminish their validity.
R is true), then the organization’s information Understanding Targeted Attacks
security procedures are effective. Otherwise,
security is ineffective. 1. Conduct reconnaissance-Bank robbers
usually do not just drive up to a bank
Organizations attempt to satisfy the objective of and attempt to rob it. Instead, they first
the time-based model of security by employing study their target’s physical layout to
the strategy of defense-in-depth, which entails learn about the controls it has in place
using multiple layers of controls in order to (alarms, number of guards, placement
avoid having a single point of failure. Defense- of cameras, etc.). Similarly, computer
in-depth recognizes that although no control attackers begin by collecting
can be 100% effective, the use of overlapping, information about their target. Perusing
complementary, and redundant controls an organization’s financial statements,
increases overall effectiveness because if one Securities and Exchange Commission
control fails or gets circumvented, another may (SEC) filings, website, and press releases
succeed. can yield much valuable information.
The time-based model of security provides a The objective of this initial
means for management to identify the most
Reconnaissance is to learn as much as
possible about the target and to
identify potential vulnerabilities.
2. Attempt social engineering

3. Scan and map the target- If an attacker


cannot successfully penetrate the
target system via social engineering, the
next step is to conduct more detailed
reconnaissance to identify potential
points of remote entry. The attacker
uses a variety of automated tools to
identify computers that can be
remotely accessed and the types of
software they are running.

4. Research-Once the attacker has


identified specific targets and knows
what versions of software are running
on them, the next step is to conduct
research to find known vulnerabilities
for those programs and learn how to
take advantage of those vulnerabilities.
5. Execute the attack- The criminal takes
advantage of a vulnerability to obtain
unauthorized access to the target’s
information system.
6. Cover tracks- After penetrating the
victim’s information system, most
attackers attempt to cover their tracks
and create “back doors” that they can
use to obtain access if their initial attack
is discovered and controls are
implemented to block that method of
entry.

You might also like