lecture_6

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

Lecture 6

Information Security (Cont’d)


Overview
• Organizational Structures

• Roles and Responsibilities

• Information Classification

• Risk Management

2
Organizational Structure
• Organization of and official responsibilities for
security vary
– BoD, CEO, BoD Committee
– Director, Manager
• IT/IS Security
• Audit

3
Typical Org Chart
Board of Directors/Trustees President

CIO

Security Director

Project Enterprise
Security Analyst System Auditor
Security Architect Security Architect

4
Security-Oriented Org Chart
Board of Directors/Trustees President

CIO

IT Audit Manager Security Director

Enterprise Project
System Auditor Security Analyst
Security Architect Security Architect

5
Further Separation
Board of Directors/Trustees President

Audit Committee Internal Audit CIO

IT Audit Manager Security Director

Enterprise Project
System Auditor Security Analyst
Security Architect Security Architect

6
Organizational Structure
• Audit should be separate from implementation
and operations
– Independence is not compromised
• Responsibilities for security should be defined
in job descriptions
• Senior management has ultimate responsibility
for security
• Security officers/managers have functional
responsibility
7
Roles and Responsibilities
• Best Practices:
– Least Privilege
– Mandatory Vacations
– Job Rotation
– Separation of Duties

8
Roles and Responsibilities
• Owners
– Determine security requirements
• Custodians
– Manage security based on requirements
• Users
– Access as allowed by security requirements

9
Information Classification
• Not all information has the
same value
• Need to evaluate value based on CIA
• Value determines protection level
• Protection levels determine procedures
• Labeling informs users on handling

10
Information Classification
• Government classifications:
– Top Secret
– Secret
– Confidential
– Sensitive but Unclassified
– Unclassified

11
Information Classification
• Private Sector classifications:
– Confidential
– Private
– Sensitive
– Public

12
Information Classification
• Criteria:
– Value
– Age
– Useful Life
– Personal Association

13
Risk Management
• Risk Management is identifying, evaluating,
and mitigating risk to an organization
– It’s a cyclical, continuous process
– Need to know what you have
– Need to know what threats are likely
– Need to know how and how well it is protected
– Need to know where the gaps are

14
Identification
• Assets
• Threats
– Threat-sources: man-made, natural
• Vulnerabilities
– Weakness
• Controls
– Safeguard

15

You might also like