SlideShare a Scribd company logo
Dilla University
College of Engineering and Technology
Department of Computer Science
Computer Security /CoSc 582
Chapter Seven
Information Security
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
1
Outline
Part I
1. Introduction
2. Policy
3. Program Security Policy
4. Issue-Specific Security Policy (ISSP)
5. System-Specific Policy
6. Guidelines for Policy Management
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
2
Introduction
• This chapter focuses on information
security policy:
– What it is
– How to write it
– How to implement it
– How to maintain it
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
3
Policy
• Policy is an essential foundation of effective infosec
program
• A Security policy is a set of rules that protect an
organization’s assets.
• An organization’s security policies should reflect
– The organization’s goals in creating the policies, and
– The context in which the organization operates.
• The computer and network environment, and
• The organizational environment.
• Private or Public
– Applicable laws, rules and regulations
– Organizational culture.
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
4
• The success of an information resources
protection program depends on the policy
generated, & on the attitude of
management toward securing information
on automated systems.
• The primary responsibility is to set the
information resource security policy for
the organization with the objectives of
– reduced risk,
– compliance with laws & regulations,
– & assurance of operational continuity,
– information integrity, & confidentiality.”
Cont. …
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
5
• A quality infosec program begins & ends with policy
• Policies are least expensive means of control & often
the most difficult to implement
• Basic rules to follow when shaping policy:
– Never conflict with law
– Stand up in court
– Properly supported and administered
– Contribute to the success of the organization
– Involve end users of information systems
Cont. …
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
6
Focus on the systemic solutions, not specifics
Bulls-eye model layers
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
7
Bulls-eye model layers
1. Policies: first layer of defense
2. Networks: threats first meet
organization’s network
3. Systems: computers & manufacturing
systems
4. Applications: all applications systems
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
8
• Policies are important reference
documents for internal audits & for
resolution of legal disputes about
management’s due diligence
• Policy documents can act as a clear
statement of management’s intent
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
9
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
10
• Policy: plan or course of action that
influences & determines decisions
• Standards: more detailed statement of
what must be done to comply with policy
• Practices, procedures & guidelines:
explain how employees will comply with
policy
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
11
• For policies to be effective, they must
be:
– Properly disseminated
– Read
– Understood
– Agreed-to
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
12
• Policies require constant modification &
maintenance
• In order to produce a complete infosec
policy, management must define 3 types
of infosec policy:
– Security Program (General) security
policies
– Issue-specific infosec policies
– Systems-specific infosec policies
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
13
Security Program (General)
security policies
• The Security Program Policy is an executive
level document.
– Drafted by the Information Security Officer.
– Generally 2 to 10 pages in length.
• It shapes the philosophy of security in the IT
environment.
• It defines the
– Purpose,
– Scope.
– Constraints, and
– Applicability
• of the security program in the organization.
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
14
Security Program (General)
security policies
• The Security Program Policy assigns
responsibilities for the various areas of
security, including
– System administration,
– Maintenance of security policies, and
– Practices and responsibilities of users.
• Addresses compliance with the security policy
– General compliance to ensure meeting security
requirements,
– Use of specific penalties and disciplinary actions.
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
15
Issue-Specific Security
Policy (ISSP)
• Issue Specific Security Policies are
guidelines to instruct employees how to use
technologies and processes.
• As the name implies, they are very specific
policies. They
– Address specific areas of technology,
– Require frequent updates,
– Contain statements of the organization’s
position on specific issues
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
16
ISSP topics could include
• email
• use of Internet & World Wide Web
• specific minimum configurations of
computers to defend against malware
• prohibitions against hacking or testing
organization security controls
• home use of company-owned computer
equipment
• use of personal equipment on company
networks
• use of telecommunications technologies
• use of photocopy equipment
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
17
Systems-Specific Policies
(SysSPs)
• System-Specific Policies are usually
coded standards and procedures used
while configuring or maintaining
systems:
– For example, an access control list that
defines which users may access a
particular system or data.
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
18
Systems-Specific Policies
(SysSPs)
• System-Specific Policies can be organized into
two general groups:
– Access Control Lists: Lists, matrices and capability
tables governing the rights and privileges of a
particular user to a particular system. They
• Regulate access, e.g., who, what, when, where, and how.
• Regulate privileges, e.g., read, write, create, modify,
delete, compare, copy.
– Configuration Rules: The specific configuration
information entered into security systems to guide
their behavior.
• They govern the configuration of systems such as
– Firewalls,
– Intrusion detection systems (IDSs), and
– Proxy servers.
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
19
Guidelines for Policy
Development
• Often useful to view policy development
as a two-part project:
1. Design & develop policy (or redesign
& rewrite outdated policy)
2. Establish management processes to
perpetuate policy within organization
• The former is an exercise in project
management, while the latter requires
adherence to good business practices
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
20
• Policy development or re-development
projects should be well planned,
properly funded, & aggressively
managed to ensure completion on time &
within budget
• When a policy development project is
undertaken, the project can be guided
by the SecSDLC process
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
21
1. Investigation Phase
• The policy development team should:
– Obtain support from senior management, &
active involvement of IT management
– Clearly articulate goals of policy project
– Gain participation of correct individuals
affected by recommended policies
– more ...
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
22
– Be composed from Legal, Human Resources
& end-users
– Assign project champion with sufficient
stature & prestige
– Acquire a capable project manager
– Develop detailed outline of & sound
estimates for, the cost & scheduling of the
project
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
23
2. Analysis Phase
• Should include the following activities:
• New or recent risk assessment or IT
audit documenting the current infosec
needs of the organization
• Key reference materials, including any
existing policies
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
24
3 & 4. Design phase
• Should include:
– How policies will be distributed
– How verification of distribution will be
accomplished
– Specifications for any automated tools
– Revisions to feasibility analysis reports
based on improved costs & benefits as
design is clarified
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
25
5. Implementation Phase
• Write the policies!
• Make certain policies are enforceable as
written
• Policy distribution is not always as
straightforward
• Effective policy:
– Is written at a reasonable reading level
– Attempts to minimize technical jargon &
management terminology
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
26
One way to measure
readability
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
27
6. Maintenance Phase
• Maintain & modify policy as needed to ensure that it
remains effective as a tool to meet changing threats
• Policy should have a built-in mechanism via which
users can report problems with the policy, preferably
anonymously
• Periodic review should be built into the process
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
28
Part II
• Introduction
• Security Standard Criteria and
Product Security Evaluation Process
• Computer Products Evaluation
Standards
• Major Evaluation Criteria
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
29
Introduction
• Security Evaluation Process
• Security Standards and Criteria
– The Orange Book
– U.S. Federal Criteria
– Information Technology Security
Evaluation Criteria (ITSEC)
– The Trusted Network Interpretation
(TNI): The Red Book
– Common Criteria (CC)
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
30
Security Standards, Criteria
and Evaluation Process
• Purpose
• Criteria
• Process
• Structure
• Outcome/benefit
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
31
Purpose of Evaluation
• Certification
• Accreditation
• Evaluation
• Potential market benefit
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
32
Criteria
• Defines several degrees of rigor
acceptable at each testing level of
security
• Defines the formal requirements the
product need to meet at each Assurance
level
• Assurance levels are based on Trusted
Computer System Evaluation (TCSEC)
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
33
Process of Evaluation
• Two evaluation directions:
– Product-oriented
– Process-oriented
• 6-steps
– Proposal review
– Technical assessment
– Advice
– Intensive preliminary technical review
– Evaluation
– Rating maintenance phase
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
34
Structure of Evaluation
• Functionality – what and how much the
product can do
• Effectiveness – whether the product
meets the effectiveness threshold
• Assurance – give buyer assurance and
guarantee
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
35
Outcome/Benefits
• A great product
– For evaluator, cut down the evaluation cost
without cutting the value of evaluation
– For buyer, result in good product to
enhance the security
• Evaluation of a computer product can be
done using either a standard or a
criteria
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
36
Computer Products
Evaluation Standards
• American National Standards Institute (ANSI)
• British Standards Institute (BSI)
• Institute of Electrical and Electronic Engineers Standards
Association (IEEE-SA)
• International Information System Security Certification
Consortium (ISC)2
• International Organization for Standardization (ISO)
• National Institute of Standards and Technology (NIST)
• National Security Agency (NSA)
• International Architecture Board (IAB)
• Organization for the Advancement of Structured
Information Standards (OASIS)
• Underwriters Laboratories
• Worldwide Web Consortium (W3C)
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
37
Major Evaluation Criteria
• The Orange Book
• U.S. Federal Criteria
• Information Technology Security
Evaluation Criteria (ITSEC)
• The Trusted Network Interpretation
(TNI): The Red Book
• Common Criteria (CC)
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
38
The Orange Book
• Three Objectives
– A yardstick for user
– Guidance for manufacturer
– Basis for security requirements
• Two requirements
– Specific security feature requirements
– Assurance requirements
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
39
The Orange Book
• Four Assurance Levels: Each division represents
a significant difference in the trust an
individual or organization can place on the
evaluated system.
– Class D – Minimal Protection
– Class C
• C1: Discretionary Security Protection (DSP)
• C2: Controlled Access Protection (CAP)
– Class B
• B1: Labeled Security Protection
• B2: Structured Protection
• B3: Security Domain
– Class A1: Verified Protection
Fiseha B. (MSc.) May 2014 ,Dilla
University, Department of Computer
Science
40

More Related Content

PPT
Policy-1.pptznlaldjwodmwlznalpqjdc ktpanV
PDF
Security policy.pdf
PPT
Chapter 5 Planning for Security-students.ppt
PPT
Policy formation and enforcement.ppt
PPTX
12 security policies
PPT
Information security policy_2011
PPT
Information security policy_2011
PPT
CLE-Unit-III.ppt
Policy-1.pptznlaldjwodmwlznalpqjdc ktpanV
Security policy.pdf
Chapter 5 Planning for Security-students.ppt
Policy formation and enforcement.ppt
12 security policies
Information security policy_2011
Information security policy_2011
CLE-Unit-III.ppt

Similar to Chapter-7.pptx (20)

PPTX
Security Policies and Standards
PPT
Security policy
PPT
develop security policy
PPSX
Security policies
DOCX
CHAPTER 5 Security Policies, Standards, Procedures, a
PPTX
Importance Of A Security Policy
PPTX
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
PPTX
Security Governance Primer - Eric Vanderburg - JURINNOV
PPTX
242714436-Organizational-Security-Policies.pptx
PDF
ANS_Ch_06_Handouts.pdf
PPTX
Chapter 1: Understanding Policy
PDF
Information security policy how to writing
PPTX
Cyber Security unit-4.pptx for computers
PPT
Lesson 1- Information Policy
PDF
Security Policies Frameworks for Information Protection and Compliance.pdf
PPTX
Policy Writing (1).pptx for the ISMS and risk assessment GRC
PPT
4482L3.ppt
PDF
How to set up your security policy
Security Policies and Standards
Security policy
develop security policy
Security policies
CHAPTER 5 Security Policies, Standards, Procedures, a
Importance Of A Security Policy
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Security Governance Primer - Eric Vanderburg - JURINNOV
242714436-Organizational-Security-Policies.pptx
ANS_Ch_06_Handouts.pdf
Chapter 1: Understanding Policy
Information security policy how to writing
Cyber Security unit-4.pptx for computers
Lesson 1- Information Policy
Security Policies Frameworks for Information Protection and Compliance.pdf
Policy Writing (1).pptx for the ISMS and risk assessment GRC
4482L3.ppt
How to set up your security policy
Ad

More from AmanuelZewdie4 (10)

PPTX
Chapter 7 - Wireless Network Security.pptx
PDF
Chapter 3- Intrusion Detection.pdf
PPT
lecture04.ppt
PPTX
Chapter 7 Other Emerging Technologies.pptx
PPT
Chapter Introduction to Modular Programming.ppt
PPTX
Chapter 3 Telecom Sys.pptx
PPT
Chapter 3 Software.ppt
PPTX
chapter 6 Ethics and Professionalism of ET.pptx
PPTX
Chapter 5 - Augmented Reality.pptx
PPTX
chapter 6 Satellite Systems.pptx
Chapter 7 - Wireless Network Security.pptx
Chapter 3- Intrusion Detection.pdf
lecture04.ppt
Chapter 7 Other Emerging Technologies.pptx
Chapter Introduction to Modular Programming.ppt
Chapter 3 Telecom Sys.pptx
Chapter 3 Software.ppt
chapter 6 Ethics and Professionalism of ET.pptx
Chapter 5 - Augmented Reality.pptx
chapter 6 Satellite Systems.pptx
Ad

Recently uploaded (20)

PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Business Ethics Teaching Materials for college
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Pre independence Education in Inndia.pdf
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
01-Introduction-to-Information-Management.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Structure & Organelles in detailed.
PPTX
Pharma ospi slides which help in ospi learning
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Abdominal Access Techniques with Prof. Dr. R K Mishra
The Final Stretch: How to Release a Game and Not Die in the Process.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
TR - Agricultural Crops Production NC III.pdf
Business Ethics Teaching Materials for college
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pre independence Education in Inndia.pdf
Open folder Downloads.pdf yes yes ges yes
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
01-Introduction-to-Information-Management.pdf
human mycosis Human fungal infections are called human mycosis..pptx
O5-L3 Freight Transport Ops (International) V1.pdf
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Structure & Organelles in detailed.
Pharma ospi slides which help in ospi learning

Chapter-7.pptx

  • 1. Dilla University College of Engineering and Technology Department of Computer Science Computer Security /CoSc 582 Chapter Seven Information Security Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 1
  • 2. Outline Part I 1. Introduction 2. Policy 3. Program Security Policy 4. Issue-Specific Security Policy (ISSP) 5. System-Specific Policy 6. Guidelines for Policy Management Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 2
  • 3. Introduction • This chapter focuses on information security policy: – What it is – How to write it – How to implement it – How to maintain it Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 3
  • 4. Policy • Policy is an essential foundation of effective infosec program • A Security policy is a set of rules that protect an organization’s assets. • An organization’s security policies should reflect – The organization’s goals in creating the policies, and – The context in which the organization operates. • The computer and network environment, and • The organizational environment. • Private or Public – Applicable laws, rules and regulations – Organizational culture. Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 4
  • 5. • The success of an information resources protection program depends on the policy generated, & on the attitude of management toward securing information on automated systems. • The primary responsibility is to set the information resource security policy for the organization with the objectives of – reduced risk, – compliance with laws & regulations, – & assurance of operational continuity, – information integrity, & confidentiality.” Cont. … Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 5
  • 6. • A quality infosec program begins & ends with policy • Policies are least expensive means of control & often the most difficult to implement • Basic rules to follow when shaping policy: – Never conflict with law – Stand up in court – Properly supported and administered – Contribute to the success of the organization – Involve end users of information systems Cont. … Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 6
  • 7. Focus on the systemic solutions, not specifics Bulls-eye model layers Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 7
  • 8. Bulls-eye model layers 1. Policies: first layer of defense 2. Networks: threats first meet organization’s network 3. Systems: computers & manufacturing systems 4. Applications: all applications systems Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 8
  • 9. • Policies are important reference documents for internal audits & for resolution of legal disputes about management’s due diligence • Policy documents can act as a clear statement of management’s intent Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 9
  • 10. Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 10
  • 11. • Policy: plan or course of action that influences & determines decisions • Standards: more detailed statement of what must be done to comply with policy • Practices, procedures & guidelines: explain how employees will comply with policy Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 11
  • 12. • For policies to be effective, they must be: – Properly disseminated – Read – Understood – Agreed-to Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 12
  • 13. • Policies require constant modification & maintenance • In order to produce a complete infosec policy, management must define 3 types of infosec policy: – Security Program (General) security policies – Issue-specific infosec policies – Systems-specific infosec policies Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 13
  • 14. Security Program (General) security policies • The Security Program Policy is an executive level document. – Drafted by the Information Security Officer. – Generally 2 to 10 pages in length. • It shapes the philosophy of security in the IT environment. • It defines the – Purpose, – Scope. – Constraints, and – Applicability • of the security program in the organization. Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 14
  • 15. Security Program (General) security policies • The Security Program Policy assigns responsibilities for the various areas of security, including – System administration, – Maintenance of security policies, and – Practices and responsibilities of users. • Addresses compliance with the security policy – General compliance to ensure meeting security requirements, – Use of specific penalties and disciplinary actions. Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 15
  • 16. Issue-Specific Security Policy (ISSP) • Issue Specific Security Policies are guidelines to instruct employees how to use technologies and processes. • As the name implies, they are very specific policies. They – Address specific areas of technology, – Require frequent updates, – Contain statements of the organization’s position on specific issues Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 16
  • 17. ISSP topics could include • email • use of Internet & World Wide Web • specific minimum configurations of computers to defend against malware • prohibitions against hacking or testing organization security controls • home use of company-owned computer equipment • use of personal equipment on company networks • use of telecommunications technologies • use of photocopy equipment Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 17
  • 18. Systems-Specific Policies (SysSPs) • System-Specific Policies are usually coded standards and procedures used while configuring or maintaining systems: – For example, an access control list that defines which users may access a particular system or data. Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 18
  • 19. Systems-Specific Policies (SysSPs) • System-Specific Policies can be organized into two general groups: – Access Control Lists: Lists, matrices and capability tables governing the rights and privileges of a particular user to a particular system. They • Regulate access, e.g., who, what, when, where, and how. • Regulate privileges, e.g., read, write, create, modify, delete, compare, copy. – Configuration Rules: The specific configuration information entered into security systems to guide their behavior. • They govern the configuration of systems such as – Firewalls, – Intrusion detection systems (IDSs), and – Proxy servers. Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 19
  • 20. Guidelines for Policy Development • Often useful to view policy development as a two-part project: 1. Design & develop policy (or redesign & rewrite outdated policy) 2. Establish management processes to perpetuate policy within organization • The former is an exercise in project management, while the latter requires adherence to good business practices Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 20
  • 21. • Policy development or re-development projects should be well planned, properly funded, & aggressively managed to ensure completion on time & within budget • When a policy development project is undertaken, the project can be guided by the SecSDLC process Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 21
  • 22. 1. Investigation Phase • The policy development team should: – Obtain support from senior management, & active involvement of IT management – Clearly articulate goals of policy project – Gain participation of correct individuals affected by recommended policies – more ... Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 22
  • 23. – Be composed from Legal, Human Resources & end-users – Assign project champion with sufficient stature & prestige – Acquire a capable project manager – Develop detailed outline of & sound estimates for, the cost & scheduling of the project Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 23
  • 24. 2. Analysis Phase • Should include the following activities: • New or recent risk assessment or IT audit documenting the current infosec needs of the organization • Key reference materials, including any existing policies Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 24
  • 25. 3 & 4. Design phase • Should include: – How policies will be distributed – How verification of distribution will be accomplished – Specifications for any automated tools – Revisions to feasibility analysis reports based on improved costs & benefits as design is clarified Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 25
  • 26. 5. Implementation Phase • Write the policies! • Make certain policies are enforceable as written • Policy distribution is not always as straightforward • Effective policy: – Is written at a reasonable reading level – Attempts to minimize technical jargon & management terminology Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 26
  • 27. One way to measure readability Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 27
  • 28. 6. Maintenance Phase • Maintain & modify policy as needed to ensure that it remains effective as a tool to meet changing threats • Policy should have a built-in mechanism via which users can report problems with the policy, preferably anonymously • Periodic review should be built into the process Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 28
  • 29. Part II • Introduction • Security Standard Criteria and Product Security Evaluation Process • Computer Products Evaluation Standards • Major Evaluation Criteria Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 29
  • 30. Introduction • Security Evaluation Process • Security Standards and Criteria – The Orange Book – U.S. Federal Criteria – Information Technology Security Evaluation Criteria (ITSEC) – The Trusted Network Interpretation (TNI): The Red Book – Common Criteria (CC) Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 30
  • 31. Security Standards, Criteria and Evaluation Process • Purpose • Criteria • Process • Structure • Outcome/benefit Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 31
  • 32. Purpose of Evaluation • Certification • Accreditation • Evaluation • Potential market benefit Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 32
  • 33. Criteria • Defines several degrees of rigor acceptable at each testing level of security • Defines the formal requirements the product need to meet at each Assurance level • Assurance levels are based on Trusted Computer System Evaluation (TCSEC) Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 33
  • 34. Process of Evaluation • Two evaluation directions: – Product-oriented – Process-oriented • 6-steps – Proposal review – Technical assessment – Advice – Intensive preliminary technical review – Evaluation – Rating maintenance phase Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 34
  • 35. Structure of Evaluation • Functionality – what and how much the product can do • Effectiveness – whether the product meets the effectiveness threshold • Assurance – give buyer assurance and guarantee Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 35
  • 36. Outcome/Benefits • A great product – For evaluator, cut down the evaluation cost without cutting the value of evaluation – For buyer, result in good product to enhance the security • Evaluation of a computer product can be done using either a standard or a criteria Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 36
  • 37. Computer Products Evaluation Standards • American National Standards Institute (ANSI) • British Standards Institute (BSI) • Institute of Electrical and Electronic Engineers Standards Association (IEEE-SA) • International Information System Security Certification Consortium (ISC)2 • International Organization for Standardization (ISO) • National Institute of Standards and Technology (NIST) • National Security Agency (NSA) • International Architecture Board (IAB) • Organization for the Advancement of Structured Information Standards (OASIS) • Underwriters Laboratories • Worldwide Web Consortium (W3C) Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 37
  • 38. Major Evaluation Criteria • The Orange Book • U.S. Federal Criteria • Information Technology Security Evaluation Criteria (ITSEC) • The Trusted Network Interpretation (TNI): The Red Book • Common Criteria (CC) Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 38
  • 39. The Orange Book • Three Objectives – A yardstick for user – Guidance for manufacturer – Basis for security requirements • Two requirements – Specific security feature requirements – Assurance requirements Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 39
  • 40. The Orange Book • Four Assurance Levels: Each division represents a significant difference in the trust an individual or organization can place on the evaluated system. – Class D – Minimal Protection – Class C • C1: Discretionary Security Protection (DSP) • C2: Controlled Access Protection (CAP) – Class B • B1: Labeled Security Protection • B2: Structured Protection • B3: Security Domain – Class A1: Verified Protection Fiseha B. (MSc.) May 2014 ,Dilla University, Department of Computer Science 40