Developing It Security Risk Management Plan

  • Uploaded by: Kefa Rabah
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Developing It Security Risk Management Plan as PDF for free.

More details

  • Words: 1,657
  • Pages: 5
Module I

Kefa Rabah

IT Risk Management Plan – The Way Forward

Module I Risk Management Plan A Case Study

SerengetiGroup IT Security Project Solution

www.serengetisys.com

Bedrock City University (BCU) Secure Network Infrastructure Project Developing IT Security Risk Management Plan The Way Forward Document History: Date Feb 02, 2008

Version # BCU-RMP-001

Author(s) BCU-ISESC,

Description of Changes Final Issue

SISC

A Global Open Versity Reading Room Academic Technical Publication Permissions: A GOV Open Knowledge Academic Access License

Learn more, visit: www.serengetisys.com www.globalopenversity.org

Kefa Rabah

CIS300 - IT Risk Mgmt & Compliance Strategies

PAGE 2 OF 50

Bright 2Future

Module I

IT Risk Management Plan – The Way Forward

Kefa Rabah

Module I Developing IT Security Risk Management Plan Abstract As attacks on enterprise grow more sophisticated and diverse; companies need to rethink their network defense and entire enterprise risk management strategies. Security for that matter is not only about protecting the network, but also the data. That requires a combination of tactics, from securing the network perimeter to encrypting data on mobile and storage devices. Today, many enterprises look at network as taking a layered approach. As security become more complex, businesses increasingly see a need for enterprise security strategies, as well as ways to collate information from the various tools and evaluate their performance. And they are grappling with new issues created by growing mobility and anywhere, anytime access – making the remote users the “new perimeter” frontier and not the firewall – thus increasing risk to enterprise resources. In this respect, IT managers are currently focusing more and more on getting end-to-end visibility. However, more importantly – the road to an enterprise security strategy and risk management starts with consulting stakeholders to determine what level of risk is acceptable. Then you can formulate a policy that lays out the controls that will achieve the goals via implementing – a solid IT security risk management plan – geared towards organizations’ IT security objectives driven by business requirements for improved performance. 1.0 INTRODUCTION Risk management is a much talked about, but little understood area of the IT Security industry. While risk management has been practiced by other industries for hundreds of years, little historical data exists to support qualitative analysis in the IT environment. The industry approach to-date has been to buy technology without really understanding the potential underlying risks. To further complicate matters, new government regulations create additional pressure to ensure sensitive data is protected from compromise and disclosure. Processes need to be developed that not only identify the sensitive data, but also identify the level of risk posed due to noncompliance of corporate security policies. Serengeti Information Security Consulting (SISC) at Bedrock City has developed security procedures based on industry standards that evaluate and mitigate areas deemed not compliant to internal security policies and standards. Through the use of quantitative analysis, AISC is able to determine areas that present the greatest risk, which allows for identification and prioritization of security investments. 1.1 OVERVIEW OF RISK MANAGEMENT IN IT SECURITY FIELD The fundamental precept of information security is to support the mission of the organization. All organizations are exposed to uncertainties, some of which impact the organization in a negative or positive manner. In order to support the organization, IT security professionals must be able to help their organizations’ management understand and manage these uncertainties. Managing uncertainties is not an easy task. Limited resources and an ever-changing landscape of threats and vulnerabilities make completely mitigating all risks impossible. Therefore, IT security professionals must have a toolset to assist them in sharing a commonly understood view with IT and business managers concerning the potential impact of various IT security related threats to the mission. This toolset needs to be consistent, repeatable, cost-effective and reduce risks to a reasonable level. However, due to the complex nature of the network infrastructure and its integrated information system, it CIS300 - IT Risk Mgmt & Compliance Strategies

PAGE 3 OF 50

Bright 3Future

Module I

Kefa Rabah

IT Risk Management Plan – The Way Forward

is important to present the reader with a clear picture of the risky business of protecting information systems. In this respect, risk assessment plays a vital role in any information-security program, ensuring that resources are being allocated in the most effective way to support the business objectives. Because resources are always limited, controls should be applied to areas that represent the biggest risks. It's crucial that the risk-assessment process link security exposures to business needs; risks should be measured against the potential impact to the confidentiality, integrity or availability of any critical business process. Basically stated, every security control has an associated cost, and there must be a business reason for it to be implemented. Risk-assessment methodologies should be used to provide justification and prioritization for the implementation of security controls to mitigate risks. 1.2 Historical Perspective of Risks in the IT Security Field A few years ago not many computers were connected to the Internet. Nowadays with the prices for broadband falling and households joining the Internet, things changed. The same is happening with the small to medium to corporate sector businesses. While email was not widely used, nowadays every company needs that form of communication in some form. With these changing habits, the risk is changing as well. A point to note here – you cannot eliminate risk – you can only reduce it! Moreover, in the computing age of today, we have witnessed the growing popularity of the Internet and networks in our society. With these tools at our fingertips, we are able to communicate and do business even more quickly and efficiently than ever before. For example, businesses can market their products online so customers do not have to leave their homes, and banks can conduct transfers and manage accounts with more ease, speed, and functionality than with the paperwork of the past. Also, what is probably the most popular means of communication, email, is used by just about everyone each and every day. Furthermore, today, the world continues to witness an explosion in mobile technology designed to help people communicate faster and more easily. We carry powerful digital computers in our pockets, exchange digital information in addition to voice data with our mobile phones, and surf the Web with high-end PDAs. In the near future, especially the coming of age of 3G wireless devices, every type of electronic data channel will be used to exchange every type of electronic information. This has become even more challenging with the entry of “Incredible Hulk” of smart-phone family, the iPhone 2.0. One of the great challenges of the ability to communicate digitally is securing the increased amount of electronic information now exchanged over the network. To make the matter worse today, everyone wants to be everywhere and anywhere and be reached via his tech-mobile system exchanging data with enterprise network. And that makes mobile security risk management a top priority for many businesses that want to offer high-end mobile customer application. It is clear that these modern conveniences have made our lives much smoother. However, as we continue to add these conveniences to our lives, we open the door to more numerous, possibly even more dangerous, outlets for attacks ranging from malware to identity theft. With the prominence of identity theft on the rise, we must all be weary of the security of online communication. Moreover, in today’s network environment, and as every organization tries to deliver value from IT while managing an increasingly complex range of IT-related risks, the effective use of best practice can help to avoid reinventing wheels, optimize the use of scarce IT resources and reduce the occurrence of major IT risks, such as: Project failures, Wasted investments, Security breaches, System crashes, and Failures by service providers to understand and meet customer requirements. See Fig. 1 for the evolution of IT threats.

CIS300 - IT Risk Mgmt & Compliance Strategies

PAGE 4 OF 50

Bright 4Future

Module I

IT Risk Management Plan – The Way Forward

Kefa Rabah

While a few years ago every network needed to have a firewall and then everything was good, things changed here as well. Our society today, is based and relay on a free flow of information. That is, in realtime, information is constantly and continuously moving around, leaving and entering inter-networks (the Internet) around the world at any one instance. Today, therefore, IT professional’s main problem is, that this information can not be protected by a simple firewall, because that information will not stay in one place but “move around”. One could argue that we then should keep the information in one place where we can protect them. But, as mentioned above, our society needs that flow of information to further evolve and keep pace with ongoing industrial revolution and constantly ever changing innovative ideas being fueled by the ever rapidly evolving cyber-space, the Internet, and on its wake the mighty and vicious cyber-crime fueled by tech-savvy cybercriminals run by organized criminals looking upon the Web as a new – and extremely lucrative – source of ill-gotten gain mainly via identity theft. High Sophistication of Hackers Tools Packet Forging/Spoofing Boot Nets

Stealth Diagnostics

Internet Worms

DDOS

Sniffers

Sweepers Back Doors

Internet

SQL Injections Hijacking Sessions

Exploiting Known Disabling Audits Vulnerabilities Viruses Script Kiddies Self Replication code

Password Cracking

Trojan Horses Password Guessing

1980

Technical Knowledge Required 1990

2000

2010

Fig. 1: Threats are more dangerous; and easier to use

The Full document has moved to docstoc.com. You may access it from here: http://www.docstoc.com/docs/28838188/?key=MmFlZGE5ZGEt&pass=YTRlOS00ZDQ1

----------------------------------------------Kefa Rabah is the Founder and CIO, of Serengeti Systems Group Inc. Kefa is knowledgeable in several fields of Science & Technology, IT Security Compliance and Project Management, and Renewable Energy Systems. He is also the founder of Global Open Versity, a place to enhance your educating and career goals using the latest innovations and technologies.

CIS300 - IT Risk Mgmt & Compliance Strategies

PAGE 5 OF 50

Bright 5Future

Related Documents


More Documents from "Angelica Mae Laluna Feria"