5 Week
5 Week
5 Week
(5th Week)
Outline
• 2. Management ıssues
—2.1. IT Security Management and Risk
Assessment
—2.2. IT Security Controls, Plans and Procedures
—2.3. Physical and Infrastructure Security
—2.4. Human Resources Security
—2.5. Security Auditing
— 2.6. Legal and Ethical Aspects
2.4. Human Resources Security
2.4. Outline
• Security Awareness, Training, and Education
• Employment Practices and Policies
• E-Mail and Internet Use Policies
• Computer Security Incident Response Teams
Security Awareness, Training,
and Education
Actions by disgruntled
Errors and omissions Fraud
employees
ION
CAT
U
ED
IT S
and ecurity
NG Pr o Spe
AINI fess ciali
iona sts
TR Edu ls
catio
Exp n and
erie
nce A
Fu
Man
age Rela and Re nctiona I
tive spon l Ro B
Acq to IT sibil les
uir Des iti
e ig Syst es
an n ems
Dev d Imple
e
lop me
a nt
Opend Rev
rate iew
a
Evand A
luat
e Use I
B
Invo A
lved ll Em
with ploy
IT ees
S
Bas ecuri Syst
ics a ty ems
nd L ics
itera Bas
cy ty
uri acy
Sec Liter
and
B = beginning
I = intermediate Emp All
loye
A = advanced es
Secu
Awa rity y
urit
r en Sec eness
ess ar
Aw
ESS
REN
A
AW
Programmers,
• Develop a security mindset in the
developers, system
developer
maintainers
•Ensure that employees, contractors, and third-party users are aware of information
security threats and concerns and their responsibilities and liabilities with regard to
information security
•Are equipped to support the organizational security policy in their work
•Reduce the risk of human error
Security principles:
•Least privilege
•Separation of duties
•Limited reliance on key employees
Termination of Employment
• Termination security objectives:
• Ensure employees, contractors, and third party users exit
organization or change employment in an orderly manner
• The return of all equipment and the removal of all access
rights are completed
Critical actions:
• Remove name from all authorized access lists
• Inform guards that ex-employee general access is not allowed
• Remove personal access codes, change physical locks and lock
combinations, reprogram access card systems
• Recover all assets, including employee ID, portable USB storage
devices, documents, and equipment
• Notify by memo or e-mail appropriate departments
Email and Internet Use Policies
• Organizations are incorporating specific e-mail
and Internet use policies into their security
policy document
• Concerns for employers:
• Work time consumed in non-work-related activities
• Computer and communications resources may be
consumed, compromising the mission that the IT resources
are designed to support
• Risk of importing malware
• Possibility of harm, harassment, inappropriate
online conduct
Suggested Policies
Unlawful
Standard of Reasonable Security
activity
conduct personal use policy
prohibited
Con st it u e n cy
Terminology
..The group of users, sites, networks or organizations served by the
CSIRT.
I n cide n t
...... A violation or imminent threat of violation of computer security
policies, acceptable use policies, or standard security practices.
Tr ia ge
The process of receiving, initial sorting, and prioritizing of information
to facilitate its appropriate handling.
Vu ln e r a bilit y
.. A characteristic of a piece of technology which can be exploited to
perpetrate a security incident. For example, if a program
unintentionally allowed ordinary users to execute arbitrary operating
system commands in privileged mode, this "feature" would be a
vulnerability.
Detecting Incidents
• Incidents may be detected by users or
administration staff
• Staff should be encouraged to make reports of system
malfunctions or anomalous behaviors
• Automated tools
• System integrity verification tools
• Log analysis tools
• Network and host intrusion detection systems (IDS)
• Intrusion prevention systems
Triage Function
•Ensure that all information destined for the incident handling service is
channeled through a single focal point
•Commonly achieved by advertising the triage function as the single point
of contact for the whole incident handling service
Goal:
Identify typical
Describe the action categories of incidents
Detail how to identify
taken to recover from and the approach
the cause
the incident taken to respond to
them
Identify the
Identify management
circumstances when
personnel responsible
security breaches
for making critical
should be reported to
decisions and how to
third parties such as the
contact them
police or relevant CERT
H ot line / H e lpde sk I nfor m a t ion
Ca ll Ce nt e r Re que st
I DS
I ncide nt
Tr ia ge
r e por t
Em a il
Ot he r Vulne r a bilit y
Re por t
Obt a in
Ana lyze cont a ct
info
Re solut ion