In: Computer Science
Self-Exercises
Information Security Strategy
1. An information security strategic plan can position an organization to mitigate, transfer, accept or avoid information risk related to people, processes and technologies. Describe what should be included in an Information Security Strategic Plan.
2. Describe the steps in developing an information security strategy.
3. For a security strategy to be effective it should meet certain conditions, i.e. how the strategy should be. Discuss these conditions.
4. Strategy and planning requires a thorough understanding of many issues. Discuss five (5) of these issues that need to be considered when developing an information security strategy.
5. Risk management is an important process in security planning. Explain the steps to manage risks, as part of a security plan [NIST SP 800-53].
Information Security Management System (ISMS)
1. An Information Security Management System (ISMS) is a set of policies concerned with information security management or IT related risks. The governing principle behind an ISMS is that an organization should design, implement and maintain a coherent set of policies, processes and systems to manage risks to its information assets, thus ensuring acceptable levels of information security risk. Describe the "Plan-Do-Check-Act" (PDCA), or Deming cycle approach in ISMS.
2. Discuss the critical success factors for an ISMS to be effective.
3. Discuss three main problems which lead to uncertainty in information security management systems (ISMS).
4. Discuss the 11 domains of the information security management systems (ISMS).
Information Security Culture
1. Information security culture refers to ideas, customs and social behaviors of a group of people, that impacts their security. It describes the kind of behaviors organizations would like to see in their employees, in areas like cybersecurity, physical security and personnel security. Discuss three tips on how to create a cyber security culture at work.
Information Security Strategy
Answer 1 :- Following are the components of Information Security Strategic plan.
(i). Mission statement
Declaration of the organization's core purpose (generally doesn’t change over time).
Example of what I have used before, “Develop and execute a proactive, company-wide security program based on Company’s strategic business objectives.”
(ii). Vision statement
Aspirational description of what an organization would like to achieve.
Example of what I have seen used, “Incorporate a continuous security mindset into all aspects of our business functions.”
(iii). Introduction
Statement about the business and the environment the security program currently operates in. I have seen the executive leadership team use this section to state its support of the security program and why it is critical for the business.
(iv). Governance
Part of the strategic plan is where the CISO (Cheaf Information Security Officer) explains how it will be managed, who will audit its processes and how changes will be implemented over time. Remember, this is a long-term plan so ensure you have these procedures documented.
(v). Strategic objectives
Core of a CISO’s (Cheaf Information Security Officer) strategic plan which will contain the objectives identified during the most recent risk assessment that need to be remediated. This section will include the latest assessment results and should have an ongoing project plan listing the various projects that are in queue, each one should be tracked to a specific immature security control objective.
Answer 2 :- Below are the 8 steps to develop Information Security Strategy.
(i). Physical Security
List your physical assets.
List the risks to your physical assets.
List the controls to mitigate risk to physical assets.
(ii). Workstation Policy
(iii). Internet Acceptable Use Policy
(iv). Network Infrastructure Security Policy
(v). Network Server Security Policy
(vi). Mobile Device Security Policy
(vii). IoT Device Security Policy
(viii). Remote Access Policy
Answer 3:- Conditions for an effective Security Strategy
(i). Should remove Organizational Issues that impact Information Security Policy.
(ii). Organizing Information Security Policies and Standards into meaningful categories.
(iii). Reviewing draft Policies and Standards with management, Users and Legal Counsel.
(iv). To train all Personnel in the organization's information security Policies and Standards.
(v). Enforcing the Information Security Policies and Standards.
(vi). Reviewing and modifying Policies and Standards, as appropriate but atleast annualy.
Answer 4:- Allowing employees to use their own devices to access company data raises data protection issues that a business must answer.
BYOD (bring your own device) has been defined as the use of employee-owned mobile devices such as smartphones and tablets to access business enterprise content or networks.
(i). Unknown Assets on the Network
There are many businesses that don’t have a complete inventory of all of the IT assets that they have tied into their network. This is a massive problem. If you don’t know what all of the assets are on your network, how can you be sure your network is secure?
The easiest fix for this is to conduct a review of all the devices on your network and identify all of the various platforms they run. By doing this, you can know what all of the different access points are on your network and which ones are most in need of security updates.
(ii). Abuse of User Account Privileges
According to data cited by the Harvard Business Review, for the year of 2016, “60% of all attacks were carried out by insiders.” Whether it’s because of honest mistakes (accidentally sending info to the wrong email address or losing a work device), intentional leaks and misuse of account privileges, or identity theft arising from a phishing campaign or other social engineering attack that compromises their user account data, the people inside your business represent one of the biggest security problems you’ll ever face.
Because these threats come from trusted users and systems, they’re also among the hardest to identify and stop.
However, there are ways to minimize your risk in case of an insider attack. For example, if your company uses a policy of least privilege (POLP) when it comes to user access, you can limit the damage that a misused user account can do. In a POLP, every user’s access to the various systems and databases on your network is restricted to just those things that they need to do their jobs.
(iii). Unpatched Security Vulnerabilities
Many businesses are concerned with “zero day” exploits. These exploits are those unknown issues with security in programs and systems that have yet to be used against anyone. However, zero day vulnerabilities aren’t the problem—unpatched known vulnerabilities are the problem.
When a “zero day” exploit is used it can be discovered—becoming a known issue that the software vendor can begin working on. The more often the exploit is used, the more likely it is to get discovered and patched. Also, it takes a lot of effort to independently discover a completely unknown vulnerability in a system.
So, attackers generally prefer to stick to known exploits. In fact, as noted in the CSO article, “The Verizon Data Breach Report 2016 revealed that out of all detected exploits, most came from vulnerabilities dating to 2007. Next was 2011.”
In other words, vulnerabilities that were almost a decade old accounted for most of the breaches in 2016. Let that sink in.
The easiest fix for this problem is to maintain a strict schedule for keeping up with security patches. Also, gradually changing the programs and operating systems on your network to make them the same can simplify this process. For example, if every system is Windows-based or Mac-based (rather than a hodgepodge of Mac, Windows, Linux, etc.), then you only have to keep track of Mac OS or Windows OS security patch schedules and alerts.
(iv). A Lack of Defense in Depth
Eventually, despite all of your best efforts, there will be a day where an attacker succeeds in breaching your network security. However, just how much damage this attacker will be capable of depends on how the network is structured.
The problem is that some businesses have an open network structure where once an attacker is in a trusted system, they have unfettered access to all systems on the network.
If the network is structured with strong segmentation to keep all of its discrete parts separate, then it’s possible to slow down the attacker enough to keep them out of vital systems while your security team works to identify, contain, and eliminate the breach.
(v). Not Enough IT Security Management
Another common issue for many companies is that even when they have all of the best cybersecurity solutions in place, they might not have enough people in place to properly manage those solutions.
When this happens, critical cybersecurity alerts may get missed, and successful attacks may not be eliminated in time to minimize damage.
However, finding a large enough internal IT security team to manage all of your needs can be an expensive and time-consuming process. Qualified professionals are in demand, and they know it.
To build up IT security staff quickly, many businesses use the services of a dedicated partner such as Compuquip Cybersecurity. This allows these businesses to access a full team of experienced cybersecurity professionals for a fraction of the cost of hiring them full-time internally.
Some businesses use these cybersecurity solutions partners to shore up their IT security departments in the short-term while they’re preparing their own internal cybersecurity teams.
Answer 5:- Following are the steps of Information Security Risk Management.
(i). Identification
(ii). Assessment
This is the process of combining the information you’ve gathered about assets, vulnerabilities, and controls to define a risk. There are many frameworks and approaches for this, but you’ll probably use some variation of this equation:
Risk = (threat x vulnerability (exploit likelihood x exploit impact) x asset value ) - security controls
Note: this is a very simplified formula analogy. Calculating probabilistic risks is not nearly this straightforward, much to everyone’s dismay.
(iii). Treatment
Once a risk has been assessed and analyzed, an organization will
need to select treatment options:
(iv). Communication
Regardless of how a risk is treated, the decision needs to be
communicated within the organization. Stakeholders need to
understand the costs of treating or not treating a risk and the
rationale behind that decision. Responsibility and accountability
needs to be clearly defined and associated with individuals and
teams in the organization to ensure the right people are engaged at
the right times in the process.
(v). Rinse and Repeat
This is an ongoing process. If you chose a treatment plan that
requires implementing a control, that control needs to be
continuously monitored. You’re likely inserting this control into a
system that is changing over time. Ports being opened, code being
changed, and any number of other factors could cause your control
to break down in the months or years following its initial
implementation.