Chapter 2 Planning for Security.ppt
《Chapter 2 Planning for Security.ppt》由会员分享,可在线阅读,更多相关《Chapter 2 Planning for Security.ppt(69页珍藏版)》请在麦多课文档分享上搜索。
1、Chapter 2 Planning for Security,Presented by: Ryan Horvath, Jennifer Kaufman, Sergey Morozov & Kalagee Shah,2,Outline,The Role of Planning Precursors to Planning Values Statement Vision Statement Mission Statement Strategic Planning Creating a Strategic Plan Planning Levels Planning and the CISO(Chi
2、ef Info Security Officer) Planning for Information Security Implementation,3,Chapter Objectives,Identify the roles in organizations that are active in the planning process Grasp the principal components of information security system implementation planning in the organizational planning scheme.,4,C
3、hapter Organization,5,Planning Influences,Employees Management Stockholders Outside stakeholders Physical environment Political and legal environment Competitive environment Technological environment,6,Information Security Professionals,Professionals that support the information security program Chi
4、ef Information Officer (CIO) Chief Information Security Office (CISO) Security Managers Security Technicians Data Owners Data Custodians Data Users,Slide 6,7,Planning Definition,Planning is creating action steps toward goals and then controlling them Provides direction for the organizations future A
5、llows managing resources Optimizes the use of the resources Coordinates the effort of independent organizational units,8,Precursors to Planning,Values Statement Vision Statement Mission Statement,9,Values Statement,Principles Qualities Benchmarks What your company is? Microsoft: Integrity, honesty,
6、passion, and respectfulness are significant parts of Microsofts corporate philosophy,10,Vision Statement,Ambitious Best-case scenario Future goals Where your company wants to be? Microsoft: A personal computer in every home running Microsoft software,11,Mission Statement,Organizations business Areas
7、 of operation Internal External How your company is going to get there? Google: Organize the worlds information and make it universally accessible and useful.,12,Strategic Planning,Strategy lays out the long-term direction to be taken by organization It guides organizational efforts, and focuses res
8、ources toward specific, clearly defined goals. Strategic planning includes Mission statement Vision statement Values statement Coordinated plans for sub units,13,Creating a Strategic Plan,Organization Develops a general strategy Creates specific strategic plans for major divisions Each level of tran
9、slates those objectives into more specific objectives for the level below,14,Top-Down Strategic Planning,15,Creating a Strategic Plan,Strategic goals are translated into tasks Specific Measurable Achievable Realistic Timely,16,Planning Levels,Strategic Planning Five or more year focus Strategic plan
10、 separated into strategic goals for each department Tactical Planning One to three year focus Breaks strategic goals into a series of incremental objectives,17,Planning Levels,Operational Planning Organize the ongoing, day-to-day performance of tasks Includes clearly identified coordination activiti
11、es across department boundaries Communications requirements Weekly meetings Summaries Progress reports,18,Planning Levels,19,Strategic Plan Elements,Introduction by senior executive Executive Summary Mission Statement and Vision Statement Organizational Profile and History Strategic Issues and Core
12、Values Program Goals and Objectives Management/Operations Goals and Objectives Appendices (optional) Strengths, weaknesses, opportunities and threats (SWOT) analyses, surveys, budgets &etc,20,10 Tips For Strategic Planning,Create a compelling vision statement Embrace the use of balanced scorecard ap
13、proach Deploy a draft high level plan early, and get input from stakeholders Make the evolving plan visible,21,10 Tips For Planning (cont.),5. Make the process invigorating for everyone 6. Be persistent 7. Make the process continuous 8. Provide meaning 9. Be yourself 10. Have fun,22,Planning For Inf
14、oSec Implementation,Commonly the CISO directly reports to the CIO. The CIO and CISO play important roles in translating overall strategic planning into tactical and operational information security plans CISO plays a more active role planning the details,23,CISO Job Description,Creates strategic inf
15、ormation security plan with a vision for the future of information security Understands fundamental business activities performed by the company Suggests appropriate information security solutions that uniquely protect these activities Improves status of information security by developing action pla
16、ns schedules budgets status reports top management communications,24,Planning for Information Security,CIO: translates strategic plan into departmental and InfoSec objectives CISO: translates InfoSec objectives into tactical and operational objectives Implementation can now begin Implementation of i
17、nformation security can be accomplished in two ways Bottom-up Top-down,25,Bottom-Up Approach,Grass-roots effort Individual administrators try to improve security No coordinated planning from upper management No coordination between departments Unpredictable funding,26,Top-Down Approach,Strong upper
18、management support A dedicated champion Assured funding Clear planning and implementation process Ability to influence organizational culture,27,Approaches to Security Implementation,28,Joint Application Development,Outcome of the objective directly affects the end users Key end users assigned to de
19、velopment teams Processes documented and integrated into organizational culture Ensures continuation of Application Seldom found in bottom-up initiatives,29,The Systems Development Life Cycle (SDLC),Methodology for the design and implementation of an information system SDLC-based projects may be ini
20、tiated by events or planned Each phase concludes with a review or a feasibility analysis,30,Phases of an SecSDLC,31,Investigation Phase for SecSDLC,Identifies problem to be solved Begins with the objectives, constraints, and scope of the project A preliminary cost/benefit analysis is then developed
21、Ends with a feasibility analysis,32,Feasibility,33,SDLC vs. SecSDLC: Investigation,Common steps Outline project scope/goals Estimate costs Evaluate existing resources Analyze feasibility,Steps unique to SecSDLC Define project process and goals and document them in the program security policy,34,Anal
22、ysis in the SecSDLC,35,Analysis in SecSDLC,A preliminary analysis of Existing security polices Current threats and attacks Legal issues Risk management Process of identifying, assessing & evaluation of levels of risks facing the organization,36,Threats,Know your enemy: Its the first step in mounting
23、 an effective defense Enemy = ThreatsThreat is an object, person or other entities that represents constant danger to information asset Well-understood and well-researched Grouped by activities,37,Threats,38,Attacks,Attack is an event that exploits the vulnerability Attack is accomplished by threat
24、agent A vulnerability is an identified weakness of controlled information asset An exploit is a technique use to compromise an information asset,39,Types of attacks,Back doors Brute force Dictionary Man-in-middle Password crack Social engineering Spear phishing Phishing,40,Types of attacks (cont.),B
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CHAPTER2PLANNINGFORSECURITYPPT
