SlideShare a Scribd company logo
Principles of Information Security,
Fifth Edition
Chapter 4
Planning for Security
Lesson 3 – Design of
Security Architecture
Learning Objectives
• Upon completion of this material, you should be
able to:
– Describe management’s role in the development,
maintenance, and enforcement of information
security policy, standards, practices, procedures,
and guidelines
– Explain what an information security blueprint is,
identify its major components, and explain how it
supports the information security program
Principles of Information Security, Fifth Edition 2
Learning Objectives (cont’d)
– Discuss how an organization institutionalizes its
policies, standards, and practices using education,
training, and awareness programs
– Describe what contingency planning is and how it
relates to incident response planning, disaster
recovery planning, and business continuity plans
Principles of Information Security, Fifth Edition 3
Design of Security Architecture
• Spheres of security: foundation of the security
framework
• Levels of controls:
– Management controls set the direction and scope of
the security processes and provide detailed
instructions for its conduct.
– Operational controls address personnel and physical
security, and the protection of production
inputs/outputs.
– Technical controls are the tactical and technical
implementations related to designing and integrating
security in the organization.
Principles of Information Security, Fifth Edition 4
Principles of Information Security, Fifth Edition 5
Design of Security Architecture
(cont’d)
• Defense in depth
– Implementation of security in layers
– Requires that organization establish multiple layers
of security controls and safeguards
• Security perimeter
– Border of security protecting internal systems from
outside threats
– Does not protect against internal attacks from
employee threats or onsite physical threats
Principles of Information Security, Fifth Edition 6
Principles of Information Security, Fifth Edition 7
Principles of Information Security, Fifth Edition 8
Security Education, Training, and
Awareness Program
• Once general security policy exists, implement
security education, training, and awareness (SETA)
program
• SETA is a control measure designed to reduce
accidental security breaches.
• The SETA program consists of security education,
security training, and security awareness.
• Enhances security by improving awareness,
developing skills, and knowledge, and building in-
depth knowledge
Principles of Information Security, Fifth Edition 9
Security Education
• Everyone in an organization needs to be trained
and aware of information security; not every
member needs a formal degree or certificate in
information security.
• When formal education is deemed appropriate, an
employee can investigate courses in continuing
education from local institutions of higher learning.
• A number of universities have formal coursework in
information security.
Principles of Information Security, Fifth Edition 10
Security Training
• Provides members of the organization with detailed
information and hands-on instruction to prepare
them to perform their duties securely
• Management of information security can develop
customized in-house training or outsource the
training program.
• Alternatives to formal training include conferences
and programs offered through professional
organizations.
Principles of Information Security, Fifth Edition 11
Security Awareness
• One of the least frequently implemented but most
beneficial programs is the security awareness
program.
• Designed to keep information security at the
forefront of users’ minds
• Need not be complicated or expensive
• If the program is not actively implemented,
employees may begin to neglect security matters,
and risk of employee accidents and failures are
likely to increase.
Principles of Information Security, Fifth Edition 12
Principles of Information Security, Fifth Edition 13
Continuity Strategies
• Incident response plans (IRPs); disaster recovery plans
(DRPs); business continuity plans (BCPs)
• Primary functions of above plans:
– IRP focuses on immediate response; if attack escalates
or is disastrous, process changes to disaster recovery
and BCP.
– DRP typically focuses on restoring systems after
disasters occur; as such, it is closely associated with
BCP.
– BCP occurs concurrently with DRP when damage is
major or ongoing, requiring more than simple restoration
of information and information resources.
Principles of Information Security, Fifth Edition 14
Principles of Information Security, Fifth Edition 15
Continuity Strategies (cont’d)
• Before planning can actually begin, a team has to
start the process.
• Champion: high-level manager to support,
promote, and endorse findings of the project
• Project manager: leads project and ensures sound
project planning process is used, a complete and
useful project plan is developed, and project
resources are prudently managed
• Team members: should be managers, or their
representatives, from various communities of
interest: business, IT, and information security
Principles of Information Security, Fifth Edition 16
Principles of Information Security, Fifth Edition 17
Contingency Planning (CP) Process
• Includes the following steps:
– Develop CP policy statement
– Conduct business impact analysis
– Identify preventive controls
– Create contingency strategies
– Develop contingency plan
– Ensure plan testing, training, and exercises
– Ensure plan maintenance
Principles of Information Security, Fifth Edition 18
Principles of Information Security, Fifth Edition 19
CP Policy
• Should contain the following sections:
– Introductory statement of philosophical perspective
– Statement of scope/purpose
– Call for periodic risk assessment/BIA
– Specification of CP’s major components
– Call for/guidance in the selection of recovery options
– Requirement to test the various plans regularly
– Identification of key regulations and standards
– Identification of key people responsible for CP operations
– Challenge to the organization members for support
– Administrative information
Principles of Information Security, Fifth Edition 20
Business Impact Analysis (BIA)
• Investigation and assessment of various adverse
events that can affect organization
• Assumes security controls have been bypassed, have
failed, or have proven ineffective, and attack has
succeeded
• Organization should consider scope, plan, balance,
knowledge of objectives, and follow-ups
• Three stages:
– Determine mission/business processes and recovery criticality
– Identify recovery priorities for system resources
– Identify resource requirements
Principles of Information Security, Fifth Edition 21
Principles of Information Security, Fifth Edition 22

More Related Content

PPT
IT Security management and risk assessment
 
PPT
Lesson 1- Intrusion Detection
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
PPT
Chapter 3: Information Security Framework
PPT
Information security management
PPT
Introduction to Information Security
PPT
Network security policies
PPT
information security management
IT Security management and risk assessment
 
Lesson 1- Intrusion Detection
Information Assurance And Security - Chapter 1 - Lesson 1
Chapter 3: Information Security Framework
Information security management
Introduction to Information Security
Network security policies
information security management

What's hot (20)

PPTX
CISSP - Chapter 2 - Asset Security
PPTX
Security misconfiguration
PPTX
A5: Security Misconfiguration
PPSX
Security policies
PPTX
Operating system security
PPTX
Multi cloud security architecture
PPTX
Domain 2 - Asset Security
PPTX
SABSA Implementation(Part I)_ver1-0
PPTX
Recon and Bug Bounties - What a great love story!
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
Database security
PPTX
04. availability-concepts
PDF
Secure software design
PPT
Introduction To OWASP
DOCX
The CIA Triad - Assurance on Information Security
PPTX
Security Information and Event Management (SIEM)
PPTX
System security
PPT
NIST 800-92 Log Management Guide in the Real World
PPTX
CISSP - Chapter 3 - System security architecture
PDF
Mobile Application Penetration Testing
CISSP - Chapter 2 - Asset Security
Security misconfiguration
A5: Security Misconfiguration
Security policies
Operating system security
Multi cloud security architecture
Domain 2 - Asset Security
SABSA Implementation(Part I)_ver1-0
Recon and Bug Bounties - What a great love story!
VAPT - Vulnerability Assessment & Penetration Testing
Database security
04. availability-concepts
Secure software design
Introduction To OWASP
The CIA Triad - Assurance on Information Security
Security Information and Event Management (SIEM)
System security
NIST 800-92 Log Management Guide in the Real World
CISSP - Chapter 3 - System security architecture
Mobile Application Penetration Testing
Ad

Similar to Lesson 3 (20)

PPT
Lesson 1- Information Policy
PPT
chapter chapter chapter 05.ppt presentation
PPT
Principles of information security Chapter 5.ppt
PPT
Lesson 1 - Introduction
PPT
Information Assurance And Security - Chapter 2 - Lesson 1
PPTX
Chapter 2 - Lesson 2.pptx
PPT
Information Assurance And Security - Chapter 2 - Lesson 2
PPT
Lesson 1- Risk Managment
PPTX
Database development and security certification and accreditation plan pitwg
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
Lesson 1- Information Policy
chapter chapter chapter 05.ppt presentation
Principles of information security Chapter 5.ppt
Lesson 1 - Introduction
Information Assurance And Security - Chapter 2 - Lesson 1
Chapter 2 - Lesson 2.pptx
Information Assurance And Security - Chapter 2 - Lesson 2
Lesson 1- Risk Managment
Database development and security certification and accreditation plan pitwg
Information Assurance And Security - Chapter 1 - Lesson 4
Ad

More from MLG College of Learning, Inc (20)

PPTX
PPTX
PC111-lesson1.pptx
PPTX
PC LEESOON 6.pptx
PPTX
PC 106 PPT-09.pptx
PPTX
PPTX
PPTX
PPTX
PC 106 Slide no.02
PPTX
PPTX
PPTX
PC 106 Slide 1.pptx
PDF
Db2 characteristics of db ms
PDF

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Classroom Observation Tools for Teachers
PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Cell Structure & Organelles in detailed.
RMMM.pdf make it easy to upload and study
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial diseases, their pathogenesis and prophylaxis
Classroom Observation Tools for Teachers
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Abdominal Access Techniques with Prof. Dr. R K Mishra
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Final Presentation General Medicine 03-08-2024.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Cell Structure & Organelles in detailed.

Lesson 3

  • 1. Principles of Information Security, Fifth Edition Chapter 4 Planning for Security Lesson 3 – Design of Security Architecture
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Describe management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines – Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program Principles of Information Security, Fifth Edition 2
  • 3. Learning Objectives (cont’d) – Discuss how an organization institutionalizes its policies, standards, and practices using education, training, and awareness programs – Describe what contingency planning is and how it relates to incident response planning, disaster recovery planning, and business continuity plans Principles of Information Security, Fifth Edition 3
  • 4. Design of Security Architecture • Spheres of security: foundation of the security framework • Levels of controls: – Management controls set the direction and scope of the security processes and provide detailed instructions for its conduct. – Operational controls address personnel and physical security, and the protection of production inputs/outputs. – Technical controls are the tactical and technical implementations related to designing and integrating security in the organization. Principles of Information Security, Fifth Edition 4
  • 5. Principles of Information Security, Fifth Edition 5
  • 6. Design of Security Architecture (cont’d) • Defense in depth – Implementation of security in layers – Requires that organization establish multiple layers of security controls and safeguards • Security perimeter – Border of security protecting internal systems from outside threats – Does not protect against internal attacks from employee threats or onsite physical threats Principles of Information Security, Fifth Edition 6
  • 7. Principles of Information Security, Fifth Edition 7
  • 8. Principles of Information Security, Fifth Edition 8
  • 9. Security Education, Training, and Awareness Program • Once general security policy exists, implement security education, training, and awareness (SETA) program • SETA is a control measure designed to reduce accidental security breaches. • The SETA program consists of security education, security training, and security awareness. • Enhances security by improving awareness, developing skills, and knowledge, and building in- depth knowledge Principles of Information Security, Fifth Edition 9
  • 10. Security Education • Everyone in an organization needs to be trained and aware of information security; not every member needs a formal degree or certificate in information security. • When formal education is deemed appropriate, an employee can investigate courses in continuing education from local institutions of higher learning. • A number of universities have formal coursework in information security. Principles of Information Security, Fifth Edition 10
  • 11. Security Training • Provides members of the organization with detailed information and hands-on instruction to prepare them to perform their duties securely • Management of information security can develop customized in-house training or outsource the training program. • Alternatives to formal training include conferences and programs offered through professional organizations. Principles of Information Security, Fifth Edition 11
  • 12. Security Awareness • One of the least frequently implemented but most beneficial programs is the security awareness program. • Designed to keep information security at the forefront of users’ minds • Need not be complicated or expensive • If the program is not actively implemented, employees may begin to neglect security matters, and risk of employee accidents and failures are likely to increase. Principles of Information Security, Fifth Edition 12
  • 13. Principles of Information Security, Fifth Edition 13
  • 14. Continuity Strategies • Incident response plans (IRPs); disaster recovery plans (DRPs); business continuity plans (BCPs) • Primary functions of above plans: – IRP focuses on immediate response; if attack escalates or is disastrous, process changes to disaster recovery and BCP. – DRP typically focuses on restoring systems after disasters occur; as such, it is closely associated with BCP. – BCP occurs concurrently with DRP when damage is major or ongoing, requiring more than simple restoration of information and information resources. Principles of Information Security, Fifth Edition 14
  • 15. Principles of Information Security, Fifth Edition 15
  • 16. Continuity Strategies (cont’d) • Before planning can actually begin, a team has to start the process. • Champion: high-level manager to support, promote, and endorse findings of the project • Project manager: leads project and ensures sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed • Team members: should be managers, or their representatives, from various communities of interest: business, IT, and information security Principles of Information Security, Fifth Edition 16
  • 17. Principles of Information Security, Fifth Edition 17
  • 18. Contingency Planning (CP) Process • Includes the following steps: – Develop CP policy statement – Conduct business impact analysis – Identify preventive controls – Create contingency strategies – Develop contingency plan – Ensure plan testing, training, and exercises – Ensure plan maintenance Principles of Information Security, Fifth Edition 18
  • 19. Principles of Information Security, Fifth Edition 19
  • 20. CP Policy • Should contain the following sections: – Introductory statement of philosophical perspective – Statement of scope/purpose – Call for periodic risk assessment/BIA – Specification of CP’s major components – Call for/guidance in the selection of recovery options – Requirement to test the various plans regularly – Identification of key regulations and standards – Identification of key people responsible for CP operations – Challenge to the organization members for support – Administrative information Principles of Information Security, Fifth Edition 20
  • 21. Business Impact Analysis (BIA) • Investigation and assessment of various adverse events that can affect organization • Assumes security controls have been bypassed, have failed, or have proven ineffective, and attack has succeeded • Organization should consider scope, plan, balance, knowledge of objectives, and follow-ups • Three stages: – Determine mission/business processes and recovery criticality – Identify recovery priorities for system resources – Identify resource requirements Principles of Information Security, Fifth Edition 21
  • 22. Principles of Information Security, Fifth Edition 22