0% found this document useful (0 votes)
23 views27 pages

Chapter 4 Lecture Topics

Chapter 4 discusses the business drivers of information security, emphasizing the importance of risk management, contingency planning (BIA, BCP, DRP), and compliance with laws. It highlights the need to assess risks, threats, and vulnerabilities while addressing the challenges posed by mobile workers and personally owned devices. The chapter provides a comprehensive overview of strategies to protect organizational IT resources and ensure business continuity.

Uploaded by

Nahid F. Gh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views27 pages

Chapter 4 Lecture Topics

Chapter 4 discusses the business drivers of information security, emphasizing the importance of risk management, contingency planning (BIA, BCP, DRP), and compliance with laws. It highlights the need to assess risks, threats, and vulnerabilities while addressing the challenges posed by mobile workers and personally owned devices. The chapter provides a comprehensive overview of strategies to protect organizational IT resources and ensure business continuity.

Uploaded by

Nahid F. Gh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

CHAPTER 4

Business Drivers
of Information
Security

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com.
Learning Objective(s) and Key Concepts

Learning Objective(s) Key Concepts

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Explain information systems security  Risk management and approaches
and its effect on people and
 An overview of contingency planning:
businesses.
business impact analysis (BIA),
business continuity plan (BCP), and
disaster recovery plan (DRP)
 Assessing risks, threats, and
vulnerabilities
 Adhering to compliance laws and
governance
 Mobile workers and use of personally
owned devices
Risk Management’s Importance to the Organization (1 of 2)

 Identifying, assessing, prioritizing, and addressing risks is a core business


driver necessary to ensure any organization’s longevity

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Risk management activities should align with the organization’s strategic goals
 Risks can be positive or negative
 Minimize the effects of negative risks
 Maximize the effects of positive risks

 Common pitfall in building a risk management plan is to limit the scope of the
risk identification process to just inside the organization
 Consider reliance on third-party entities to conduct business, such as vendors and
supply chain
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Risks, Threats, and Vulnerabilities
Risk Management’s Importance to the Organization (2 of 2)

 Process of identifying, assessing, prioritizing, and addressing risks

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Ensures you have planned for risks that may affect your organization
 Risk methodology
 A description of how you will manage risk

 Risk register
 A list of identified risks
Understanding the Relationship Between a BIA, a BCP,
and a DRP

 Protecting an organization’s IT resources and ensuring that events do not


interrupt normal business functions

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Business impact analysis (BIA)
 Business continuity plan (BCP)
 Disaster recovery plan (DRP)
BIA

 An analysis of an organization’s functions and activities that classifies them as


critical or noncritical

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Identifies the impact to the business if one or more IT functions fails
 Identifies the priority of different critical systems
BIA Recovery Goals and Requirements

 Recovery point objective (RPO)


 The target state of recovered data that allows an organization to continue normal

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
processing; the maximum amount of data loss that is acceptable
 Recovery time objective (RTO)
 The maximum allowable time in which to recover the function

 Business recovery requirements


 Identify any other business functions that must already be in place for the specified
recovery function to occur and help in determining the recovery sequence
 Technical recovery requirements
 Define the technical prerequisites that are needed to support each critical business
function
BCP (1 of 2)

 A written plan for a structured response to any events that result in an


interruption to critical business activities or functions

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Order of priorities:
1. Safety and well-being of people
2. Continuity of critical business functions and operations
3. Continuity of components within the seven domains of an IT infrastructure
BCP (2 of 2)

 Elements of a complete BCP:


 Statement defining the policy, standards, procedures, and guidelines for

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
deployment
 Project team members with defined roles, responsibilities, and accountabilities
 Emergency response procedures and protection of life, safety, and infrastructure
 Situation and damage assessment
 Resource salvage and recovery
 Alternate facilities or triage for short- or long-term emergency mode of operations
and business recovery
DRP (1 of 2)

 Directs the actions necessary to recover resources after a disaster

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Extends and supports the BCP by identifying events that could cause damage
to resources that are necessary to support critical business functions
 Consider what could happen to each resource:
 Threat analysis
 Impact scenarios
 Recovery requirement documentation
 Disaster recovery
DRP (2 of 2)

 Hot site
 Has environmental utilities, hardware, software, and data like original data center

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Warm site
 Has environmental utilities and basic computer hardware

 Cold site
 Has basic environmental utilities but no infrastructure components

 Mobile site
 Trailer with necessary environmental utilities that can operate as warm or cold site
DRP Tests

 Checklist test

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Structured walk-through
 Simulation test
 Parallel test
 Full-interruption test
Assessing Risks, Threats, and Vulnerabilities

 Risk Management Guide for Information Technology Systems (NIST SP800-30)

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
 ISO/IEC 27005:2018 “Information Security Risk Management”
Closing the Information Security Gap

 Security gap
Difference between the security controls in place and controls you need to

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
address vulnerabilities
 Gap analysis
Comparison of the security controls in place and the controls you need to
address all identified threats
Steps for Conducting a Gap Analysis (1 of 2)

 Identify the applicable elements of the security policy and other standards

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Assemble policy, standard, procedure, and guideline documents
 Review and assess the implementation of the policies, standards, procedures,
and guidelines
 Collect inventory information for all hardware and software components
Steps for Conducting a Gap Analysis (2 of 2)

 Interview users to assess knowledge of and compliance with policies

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Compare the current security environment to policies in place
 Prioritize identified gaps for resolution
 Document and implement the remedies to conform to policies
Adhering to Compliance Laws (1 of 2)

 Family Education Rights and Privacy Act (FERPA)

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Federal Financial Institutions Examination Council (FFIEC)
 Children’s Online Privacy Protection Act of 1998 (COPPA)
 Gramm-Leach-Bliley Act (GLBA)
 Government Information Security Reform Act (Security Reform Act) of 2000
 The USA PATRIOT Act of 2001
 Federal Information Security Management Act (FISMA)
Adhering to Compliance Laws (2 of 2)

 Sarbanes-Oxley Act (SOX)

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 California Security Breach Information Act (SB 1386) of 2003
 Health Insurance Portability and Accountability Act (HIPAA)
 Federal Information Security Modernization Act (FISMA)
 European Union General Data Protection Regulation (GDPR) of 2016
 Payment Card Industry Data Security Standard (PCI DSS)
 California Consumer Privacy Act (CCPA) of 2018
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Security Compliance Laws and Standards Timeline
Keeping Private Data Confidential (1 of 2)

 Ensuring availability and integrity is important

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Cannot undo a confidentiality violation
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
The Three Tenets of Information Security
Keeping Private Data Confidential (2 of 2)

 Authentication controls  Authorization controls


• Passwords and PINs  Authentication server rules and

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
• Smart cards and tokens permissions
• Biometric devices  Access control lists
• Digital certificates  Intrusion detection and prevention
• Challenge-response handshakes  Physical access control
• Kerberos authentication  Connection and access policy
• One-time passwords filters
 Network traffic filters
Mobile Workers and Use of Personally Owned Devices

 Mobility
 Allows remote workers and employees to be connected to the IT infrastructure in

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
almost real time
 Bring Your Own Device (BYOD)
 Employees using their personally owned devices for business and personal use
BYOD Concerns

 Data ownership  Onboard camera/video

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Support ownership  Onboarding/ offboarding
 Patch management  Adherence to corporate policies
 Antivirus management  User acceptance
 Forensics  Architecture/ infrastructure
considerations
 Privacy
 Legal concerns
 Acceptable use policy
Endpoint and Device Security

 Full device encryption  Asset tracking

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 Remote wiping  Inventory control
 Lockout  Mobile device management
 Screen locks  Device access control
 Global positioning system (GPS)  Removable storage
 Application control  Disabling unused features
 Storage segmentation
Summary

 Risk management and approaches

Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
 An overview of contingency planning: business impact analysis (BIA), business
continuity plan (BCP), and disaster recovery plan (DRP)
 Assessing risks, threats, and vulnerabilities
 Adhering to compliance laws and governance
 Mobile workers and use of personally owned devices

You might also like