SlideShare a Scribd company logo
Lesson 8-Information Security
Process
Overview



Introducing information security process.

Conducting an assessment.

Developing a policy.

Implementing security.

Conducting awareness training.

Conducting audits.
Introduction to Information
Security Process




  The process of information security
Conducting an Assessment



An assessment determines:

     The total value of the organization’s information assets.

     The size of the threats with respect to confidentiality, integrity,

     availability, and accountability.

     The vulnerabilities of the information assets and the

     organization.

     The organization’s overall risk and recommended changes to

     current information security policy.
Conducting an Assessment


While conducting an assessment of an organization, examine:


 Network.
                                 Staff.
 Physical security measures.
                                 Workload and employee
 Existing policies and
                                attitude.
procedures.
                                 Adherence.
 Precautions.
                                 Business.
 Awareness.
Network (1/3)



The organization’s network is the easiest access point to

information and systems.

A network diagram helps examine each point of

connectivity.

Query network administrators to know the type of network

management system in use.

Perform a vulnerability scan of all systems.
Network (2/3)



The protection mechanism within a network should include:

     Router access control lists and firewall rules on all Internet

     access points.

     Authentication mechanisms used for remote access.

     Protection mechanisms on access points to other organizations.

     Encryption mechanism used to protect portable computers and

     to transmit and store information.
Network (3/3)



The protection mechanism within a network should include

(continued):

      Anti-virus systems in place on servers, desktops, and e-

      mail systems.

      Server security configurations.
Physical Security Measures (1/2)



Important physical security information includes identifying:

     The protection mechanisms to site, buildings, office space,

     paper records, and data center.

     The personnel responsible for the physical security.

     The critical and sensitive areas.

     The location of the communication lines within the building.

     The types of UPS in place and how long the current UPS will

     sustain.
Physical Security Measures (2/2)



Important physical security information requires knowing:

      How power is supplied to the site and data center.

      The systems connected to the UPS.

      The environment controls attached to the UPS in the

      data center.

      The type of suppression system in the data center.

      The personnel who need to be notified incase of

      power or environment control failure.
Policies and Procedures



Policies and procedures must be examined for relevance,

appropriateness, and completeness.

Procedures must define the way tasks are currently

performed.

Map requirements with stated goals.

Update policies and procedures on a regular basis.

Assess the organization’s security awareness program.

Examine the recent incident and audit reports.
Precautions



Precautions are used to restore operations when something

goes wrong.

Backup systems and disaster recovery plans are two

components of precautions.

Understand which backup system is used and how often is

it used.

Examine the disaster recovery plan for relevance and

completeness.
Awareness



Determine the staff’s level of awareness of security issues

and policies.

Create awareness of security threats, vulnerabilities, and

signs indicating that a system is compromised.

Ensure that the staff knows how to implement a disaster

recovery plan.
People



Examine whether the staff members have the necessary

skills to implement a security program.

They must understand policy work and latest security

products.

Administrator’s must be able to administer the

organization’s systems and networks.
Workload and Employee
        Attitude


Overworked employees do not contribute much to the

security environment.

Determine whether the workload is a temporary problem.

Assess management attitude with regard to security issues.

Identify responsible personnel for security within the

organization.

Employees must be aware of the management’s

commitment to security.
Adherence



While determining the intended security environment,

identify the actual security environment.

The intended security environment is defined by policy,

attitudes, and existing mechanisms.

Determine whether adherence to this policy requirement is

lacking.
Business (1/2)



Identify the cost if confidentiality, integrity, availability, or

accountability of information is compromised.

Measure vulnerabilities in monetary terms, downtime, lost

reputation, or lost business.

Identify the flow of information across the organization.
Business (2/2)



Identify organizational interdependencies.

Identify which systems and networks are important to the

primary function of the organization.

Identify the back-end systems.
Assessment Results


Analyze the information.

Assess all security vulnerabilities.

Compile a complete set of risks in the order of high to low.

Include a list of recommendations to manage each risk.

Present potential cost in terms of money, time, resources,

reputation, and lost business.

Develop a security plan.

Allocate and schedule resources to handle security.
Developing a Policy (1/2)


  Policies and procedures define the expected state of an

  organization’s security.

  It defines the tasks to be performed during implementation.

  Create policies for communication, security, system usage,

  backup, account management, incident handling, and disaster

  recovery plan.

Choosing the order of policies to develop, depends on:

      The criticality of risks.

      The time each will take to complete. Ideally, the information policy

      should be completed early in the process.
Developing a Policy (2/2)



Existing documents require frequent updating.

Use these documents and identify deficiencies.

Involve people who developed the policies.
Implementing Security (1/2)



Implementation of organizational policies include:

     Identification and implementation of technical tools and

     physical controls.

     Hiring of security staff.

     Examination of each implementation and its interactions with

     other controls.
Implementing Security (2/2)



Security reporting systems.

Authentication systems.

Internet security.

Intrusion detection systems.

Encryption.

Physical security.

Staff.
Security Reporting Systems(1/3)


It is a mechanism to track adherence to policies and

procedures.

It tracks the overall state of vulnerabilities within the

organization.

It can use manual or automated systems.

Enforce computer use policies such as:

   Tracking Internet use.

   Restricting access while maintaining login attempts.

   Removing unwanted applications from the desktop installations.
Security Reporting Systems(2/3)




System vulnerability scans include:

     Tracking the number of systems on the network.

     Tracking the number of vulnerabilities on these systems.

     Providing vulnerability reports to system administrators for

     correction or explanation.
Security Reporting Systems(3/3)



Policy adherence is a time-consuming security task.

It can be automated or manual.

The automated checks require more time to set up and

configure. They provide complete results in a timely

manner.

In manual system, a security personnel examines and

monitors all facets of the security policy.
Authentication Systems



Authentication systems are used to prove the identity of

users accessing a network.

These systems identify authorized users and grant them

physical access to a facility.

They should be implemented with proper planning.

Password restrictions, smart cards, and biometrics are few

examples of authenticated systems.
Internet Security



The implementation of Internet security includes:

     Placing an access control device such as a firewall.

     Setting up virtual private networks (VPN).

     Changing network architecture.
Intrusion Detection Systems
        (IDS)


IDS are designed to detect any unwarranted entry into a

protected area.

Choice of IDS depends on overall organization risks and

available resources.

Anti-virus software, manual and automated log examination,

host-based and network-based intrusion detection software

are a few IDS.
Encryption



Encryption can be used to protect information in transit or

while residing in storage.

Choose well-known and well-reviewed algorithm. Private

key encryption is faster than public key encryption.

Include an effective key management technique such as

link encryptors. A system must change keys periodically.
Physical Security



Ensure that a proper procedure for authenticating users is

in place.

Restrict access to data center.

Protect the data center from fire, high temperature, and

power failure.

Remodel the data center to implement fire suppression and

temperature control.

Plan for disruptions due to implementation of an UPS.
Staff



Hire skilled staff:

      Who can handle the security implementation.

      To conduct awareness training programs.

      Who will be responsible for the security of the organization.
Conducting Awareness
        Training


Conduct awareness training to provide necessary

information to:

      Employees.

      Administrators.

      Developers.

      Executives.

      Security staff.
Employees



Employees should know the importance of security.

They must be trained to identify and protect sensitive

information.

Ensure that the employees are aware of the organization

policy, password selection, and prevention of attacks.
Administrators



System administrators must be updated on the latest

hacker techniques, security threats, and security patches.

Include updates in regular administration staff meetings.

Send updates to administrators as and when they are

prepared.
Developers



Developers should know proper programming techniques to

reduce security vulnerabilities.

They should have a proper understanding of the security

department’s role during the development process.

Security issues must be addressed in the design phase.
Executives



Management must be informed of the state of security and

the progress of the program.

Periodic presentations must include the results of recent

assessments, and the status of various security projects.

Metrics that indicate the risks to the organizations must be

a part of such reports.
Security Staff



Security staff must be kept up-to-date to help them provide

appropriate services to the organization.

Conduct both internal and external training programs.

Include security-related topics in the training sessions.
Conducting Audits



Audit is the final step in the information security process.

It ensures that controls are configured correctly and map to

the policy.
Types/Components of Audits



Policy adherence audits.

Periodic and new project assessments.

Penetration tests.
Policy Adherence Audits



The audit policy determines whether or not the system

configurations adhered to the policy.

They are the traditional audit function.

Any variations are recorded as violations.

Conduct periodic audits on implementation of information

policy and storage of sensitive documents.
Periodic and New Project
        Assessments


Changes in computer and network environments results in

change in risks and assessments.

Full assessment of the organization should be performed

periodically.

Major audits and assessment must be done by an external

firm.
Penetration Tests


Penetration test attempts to exploit an identified vulnerability to gain

access to systems and information.

Test effectiveness of controls using penetration tests.

Physical penetration tests include individuals who attempt to gain

unauthorized access to a facility.

Social engineering tests include testing employees to divulge classified

information.

Products

    http://www.coresecurity.com/products/coreimpact/index.php

    http://www.immunitysec.com/products-canvas.shtml
Summary



Conducting an information security assessment involves

determining the value of an organization’s information

assets.

Policies and procedures define the work to be performed

during implementation.

The implementation of policy involves identification and

implementation of tools and controls.
Summary



Awareness training provides necessary security information

to employees.

Audits ensure that policies are being implemented and

followed.

More Related Content

PDF
Ch06 Policy
PDF
Ch09 Information Security Best Practices
PPTX
Step by-step for risk analysis and management-yaser aljohani
PPTX
Understanding the security_organization
PPTX
Security Organization/ Infrastructure
PDF
E1804012536
PPTX
Domain 5 - Identity and Access Management
PPTX
Security management concepts and principles
Ch06 Policy
Ch09 Information Security Best Practices
Step by-step for risk analysis and management-yaser aljohani
Understanding the security_organization
Security Organization/ Infrastructure
E1804012536
Domain 5 - Identity and Access Management
Security management concepts and principles

What's hot (18)

PPTX
Domain 1 - Security and Risk Management
PPT
Bis Chapter15
DOCX
Risk Assessment
PPT
The Importance of Security within the Computer Environment
PPTX
It security controls, plans, and procedures
 
PPT
Chapter008
PPT
HIPAA security risk assessments
DOCX
Information security management iso27001
PDF
Five principles for improving your cyber security
PPTX
Domain 6 - Security Assessment and Testing
PDF
Guide for Applying The Risk Management Framework to Federal Information Systems
PPT
Information Security Background
PPT
Security policy
PPT
is_1_Introduction to Information Security
PPT
Security Policies
PDF
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
PDF
SuprTEK Continuous Monitoring
PPT
Information security policy_2011
Domain 1 - Security and Risk Management
Bis Chapter15
Risk Assessment
The Importance of Security within the Computer Environment
It security controls, plans, and procedures
 
Chapter008
HIPAA security risk assessments
Information security management iso27001
Five principles for improving your cyber security
Domain 6 - Security Assessment and Testing
Guide for Applying The Risk Management Framework to Federal Information Systems
Information Security Background
Security policy
is_1_Introduction to Information Security
Security Policies
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
SuprTEK Continuous Monitoring
Information security policy_2011
Ad

Similar to Ch08 8 Information Security Process it-slideshares.blogspot.com (20)

PPTX
Security Baselines and Risk Assessments
PPTX
chapter 3 ethics: computer and internet crime
PPTX
Database development and security certification and accreditation plan pitwg
PPTX
Information Security Blueprint
PPTX
Information Systems Policy
PDF
For our discussion question, we focus on recent trends in security t.pdf
DOCX
11What is Security 1.1 Introduction The central role of co.docx
PPTX
Security Foundation and Incident Mgmt and BCMS.pptx
PPT
Introduction_to_Security_Assessments.ppt
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PPT
Information security management
PDF
1. Security and Risk Management
PDF
Describe two methods for communicating the material in an Informatio.pdf
ODP
Cissp Week 23
PDF
Building and implementing a successful information security policy
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PPTX
We Bought Some Tools
PPTX
entregable ingles 01.pptx trabajo de senati V ciclo
PDF
Vskills Certified Network Security Professional Sample Material
KEY
Mis
Security Baselines and Risk Assessments
chapter 3 ethics: computer and internet crime
Database development and security certification and accreditation plan pitwg
Information Security Blueprint
Information Systems Policy
For our discussion question, we focus on recent trends in security t.pdf
11What is Security 1.1 Introduction The central role of co.docx
Security Foundation and Incident Mgmt and BCMS.pptx
Introduction_to_Security_Assessments.ppt
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Information security management
1. Security and Risk Management
Describe two methods for communicating the material in an Informatio.pdf
Cissp Week 23
Building and implementing a successful information security policy
Cybersecurity Frameworks and You: The Perfect Match
We Bought Some Tools
entregable ingles 01.pptx trabajo de senati V ciclo
Vskills Certified Network Security Professional Sample Material
Mis
Ad

More from phanleson (20)

PDF
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Firewall - Network Defense in Depth Firewalls
PPT
Mobile Security - Wireless hacking
PPT
Authentication in wireless - Security in Wireless Protocols
PPT
E-Commerce Security - Application attacks - Server Attacks
PPT
Hacking web applications
PPTX
HBase In Action - Chapter 04: HBase table design
PPT
HBase In Action - Chapter 10 - Operations
PPT
Hbase in action - Chapter 09: Deploying HBase
PPTX
Learning spark ch11 - Machine Learning with MLlib
PPTX
Learning spark ch10 - Spark Streaming
PPTX
Learning spark ch09 - Spark SQL
PPT
Learning spark ch07 - Running on a Cluster
PPTX
Learning spark ch06 - Advanced Spark Programming
PPTX
Learning spark ch05 - Loading and Saving Your Data
PPTX
Learning spark ch04 - Working with Key/Value Pairs
PPTX
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
PPT
Lecture 1 - Getting to know XML
PPTX
Lecture 4 - Adding XTHML for the Web
Learning spark ch01 - Introduction to Data Analysis with Spark
Firewall - Network Defense in Depth Firewalls
Mobile Security - Wireless hacking
Authentication in wireless - Security in Wireless Protocols
E-Commerce Security - Application attacks - Server Attacks
Hacking web applications
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 10 - Operations
Hbase in action - Chapter 09: Deploying HBase
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch10 - Spark Streaming
Learning spark ch09 - Spark SQL
Learning spark ch07 - Running on a Cluster
Learning spark ch06 - Advanced Spark Programming
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch01 - Introduction to Data Analysis with Spark
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Lecture 1 - Getting to know XML
Lecture 4 - Adding XTHML for the Web

Recently uploaded (20)

PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Network Security Unit 5.pdf for BCA BBA.
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
GamePlan Trading System Review: Professional Trader's Honest Take
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
Advanced Soft Computing BINUS July 2025.pdf
Teaching material agriculture food technology
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.

Ch08 8 Information Security Process it-slideshares.blogspot.com

  • 2. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing security. Conducting awareness training. Conducting audits.
  • 3. Introduction to Information Security Process The process of information security
  • 4. Conducting an Assessment An assessment determines: The total value of the organization’s information assets. The size of the threats with respect to confidentiality, integrity, availability, and accountability. The vulnerabilities of the information assets and the organization. The organization’s overall risk and recommended changes to current information security policy.
  • 5. Conducting an Assessment While conducting an assessment of an organization, examine: Network. Staff. Physical security measures. Workload and employee Existing policies and attitude. procedures. Adherence. Precautions. Business. Awareness.
  • 6. Network (1/3) The organization’s network is the easiest access point to information and systems. A network diagram helps examine each point of connectivity. Query network administrators to know the type of network management system in use. Perform a vulnerability scan of all systems.
  • 7. Network (2/3) The protection mechanism within a network should include: Router access control lists and firewall rules on all Internet access points. Authentication mechanisms used for remote access. Protection mechanisms on access points to other organizations. Encryption mechanism used to protect portable computers and to transmit and store information.
  • 8. Network (3/3) The protection mechanism within a network should include (continued): Anti-virus systems in place on servers, desktops, and e- mail systems. Server security configurations.
  • 9. Physical Security Measures (1/2) Important physical security information includes identifying: The protection mechanisms to site, buildings, office space, paper records, and data center. The personnel responsible for the physical security. The critical and sensitive areas. The location of the communication lines within the building. The types of UPS in place and how long the current UPS will sustain.
  • 10. Physical Security Measures (2/2) Important physical security information requires knowing: How power is supplied to the site and data center. The systems connected to the UPS. The environment controls attached to the UPS in the data center. The type of suppression system in the data center. The personnel who need to be notified incase of power or environment control failure.
  • 11. Policies and Procedures Policies and procedures must be examined for relevance, appropriateness, and completeness. Procedures must define the way tasks are currently performed. Map requirements with stated goals. Update policies and procedures on a regular basis. Assess the organization’s security awareness program. Examine the recent incident and audit reports.
  • 12. Precautions Precautions are used to restore operations when something goes wrong. Backup systems and disaster recovery plans are two components of precautions. Understand which backup system is used and how often is it used. Examine the disaster recovery plan for relevance and completeness.
  • 13. Awareness Determine the staff’s level of awareness of security issues and policies. Create awareness of security threats, vulnerabilities, and signs indicating that a system is compromised. Ensure that the staff knows how to implement a disaster recovery plan.
  • 14. People Examine whether the staff members have the necessary skills to implement a security program. They must understand policy work and latest security products. Administrator’s must be able to administer the organization’s systems and networks.
  • 15. Workload and Employee Attitude Overworked employees do not contribute much to the security environment. Determine whether the workload is a temporary problem. Assess management attitude with regard to security issues. Identify responsible personnel for security within the organization. Employees must be aware of the management’s commitment to security.
  • 16. Adherence While determining the intended security environment, identify the actual security environment. The intended security environment is defined by policy, attitudes, and existing mechanisms. Determine whether adherence to this policy requirement is lacking.
  • 17. Business (1/2) Identify the cost if confidentiality, integrity, availability, or accountability of information is compromised. Measure vulnerabilities in monetary terms, downtime, lost reputation, or lost business. Identify the flow of information across the organization.
  • 18. Business (2/2) Identify organizational interdependencies. Identify which systems and networks are important to the primary function of the organization. Identify the back-end systems.
  • 19. Assessment Results Analyze the information. Assess all security vulnerabilities. Compile a complete set of risks in the order of high to low. Include a list of recommendations to manage each risk. Present potential cost in terms of money, time, resources, reputation, and lost business. Develop a security plan. Allocate and schedule resources to handle security.
  • 20. Developing a Policy (1/2) Policies and procedures define the expected state of an organization’s security. It defines the tasks to be performed during implementation. Create policies for communication, security, system usage, backup, account management, incident handling, and disaster recovery plan. Choosing the order of policies to develop, depends on: The criticality of risks. The time each will take to complete. Ideally, the information policy should be completed early in the process.
  • 21. Developing a Policy (2/2) Existing documents require frequent updating. Use these documents and identify deficiencies. Involve people who developed the policies.
  • 22. Implementing Security (1/2) Implementation of organizational policies include: Identification and implementation of technical tools and physical controls. Hiring of security staff. Examination of each implementation and its interactions with other controls.
  • 23. Implementing Security (2/2) Security reporting systems. Authentication systems. Internet security. Intrusion detection systems. Encryption. Physical security. Staff.
  • 24. Security Reporting Systems(1/3) It is a mechanism to track adherence to policies and procedures. It tracks the overall state of vulnerabilities within the organization. It can use manual or automated systems. Enforce computer use policies such as: Tracking Internet use. Restricting access while maintaining login attempts. Removing unwanted applications from the desktop installations.
  • 25. Security Reporting Systems(2/3) System vulnerability scans include: Tracking the number of systems on the network. Tracking the number of vulnerabilities on these systems. Providing vulnerability reports to system administrators for correction or explanation.
  • 26. Security Reporting Systems(3/3) Policy adherence is a time-consuming security task. It can be automated or manual. The automated checks require more time to set up and configure. They provide complete results in a timely manner. In manual system, a security personnel examines and monitors all facets of the security policy.
  • 27. Authentication Systems Authentication systems are used to prove the identity of users accessing a network. These systems identify authorized users and grant them physical access to a facility. They should be implemented with proper planning. Password restrictions, smart cards, and biometrics are few examples of authenticated systems.
  • 28. Internet Security The implementation of Internet security includes: Placing an access control device such as a firewall. Setting up virtual private networks (VPN). Changing network architecture.
  • 29. Intrusion Detection Systems (IDS) IDS are designed to detect any unwarranted entry into a protected area. Choice of IDS depends on overall organization risks and available resources. Anti-virus software, manual and automated log examination, host-based and network-based intrusion detection software are a few IDS.
  • 30. Encryption Encryption can be used to protect information in transit or while residing in storage. Choose well-known and well-reviewed algorithm. Private key encryption is faster than public key encryption. Include an effective key management technique such as link encryptors. A system must change keys periodically.
  • 31. Physical Security Ensure that a proper procedure for authenticating users is in place. Restrict access to data center. Protect the data center from fire, high temperature, and power failure. Remodel the data center to implement fire suppression and temperature control. Plan for disruptions due to implementation of an UPS.
  • 32. Staff Hire skilled staff: Who can handle the security implementation. To conduct awareness training programs. Who will be responsible for the security of the organization.
  • 33. Conducting Awareness Training Conduct awareness training to provide necessary information to: Employees. Administrators. Developers. Executives. Security staff.
  • 34. Employees Employees should know the importance of security. They must be trained to identify and protect sensitive information. Ensure that the employees are aware of the organization policy, password selection, and prevention of attacks.
  • 35. Administrators System administrators must be updated on the latest hacker techniques, security threats, and security patches. Include updates in regular administration staff meetings. Send updates to administrators as and when they are prepared.
  • 36. Developers Developers should know proper programming techniques to reduce security vulnerabilities. They should have a proper understanding of the security department’s role during the development process. Security issues must be addressed in the design phase.
  • 37. Executives Management must be informed of the state of security and the progress of the program. Periodic presentations must include the results of recent assessments, and the status of various security projects. Metrics that indicate the risks to the organizations must be a part of such reports.
  • 38. Security Staff Security staff must be kept up-to-date to help them provide appropriate services to the organization. Conduct both internal and external training programs. Include security-related topics in the training sessions.
  • 39. Conducting Audits Audit is the final step in the information security process. It ensures that controls are configured correctly and map to the policy.
  • 40. Types/Components of Audits Policy adherence audits. Periodic and new project assessments. Penetration tests.
  • 41. Policy Adherence Audits The audit policy determines whether or not the system configurations adhered to the policy. They are the traditional audit function. Any variations are recorded as violations. Conduct periodic audits on implementation of information policy and storage of sensitive documents.
  • 42. Periodic and New Project Assessments Changes in computer and network environments results in change in risks and assessments. Full assessment of the organization should be performed periodically. Major audits and assessment must be done by an external firm.
  • 43. Penetration Tests Penetration test attempts to exploit an identified vulnerability to gain access to systems and information. Test effectiveness of controls using penetration tests. Physical penetration tests include individuals who attempt to gain unauthorized access to a facility. Social engineering tests include testing employees to divulge classified information. Products http://www.coresecurity.com/products/coreimpact/index.php http://www.immunitysec.com/products-canvas.shtml
  • 44. Summary Conducting an information security assessment involves determining the value of an organization’s information assets. Policies and procedures define the work to be performed during implementation. The implementation of policy involves identification and implementation of tools and controls.
  • 45. Summary Awareness training provides necessary security information to employees. Audits ensure that policies are being implemented and followed.