Cle Unit-Iii
Cle Unit-Iii
Cle Unit-Iii
To minimize liability and reduce risks from electronic and physical threats, and to reduce all
losses from legal action, information security practitioners must thoroughly understand the
current legal environment, stay current with laws and regulations, and watch for new and
emerging issues. By educating the management and employees of an organization on their legal
and ethical obligations and the proper use of information technology and information security,
security professionals can help keep an organization focused on its primary objectives.
Laws: Laws are rules that mandate or prohibit certain behavior; they are drawn from ethics, which
define socially acceptable behaviors. The key difference between laws and ethics is that laws carry the
authority of a governing body, and ethics do not.
Ethics: Ethics in turn are based on cultural mores: the fixed moral attitudes or cus- toms
of a particular group. Some ethical standards are universal.
Liability is the legal obligation of an entity that extends beyond criminal or contract law; it
includes the legal obligation to make restitution, or to compensate for wrongs committed.
The bottom line is that if an employee, acting with or without the authorization of the employer,
performs an illegal or unethical act that causes some degree of harm, the employer can be held
financially liable for that action.
Due care standards are met when an organization makes sure that every employee knows what is
acceptable or unacceptable behavior, and knows the consequences of illegal or unethical actions.
Due diligence requires that an organization make a valid effort to protect others and continually
maintains this level of effort.
Jurisdiction that is, the court’s right to hear a case if a wrong is committed in its territory or
involves its citizenry.
Long arm jurisdiction the long arm of the law extending across the country or around the world
to draw an accused individual into its court systems.
organization, information security professionals help maintain security via the establishment and
enforcement of policies. These policies guidelines that describe acceptable and unacceptable
employee behaviors in the workplace function as organizational laws, complete with penalties,
judicial practices, and sanctions to require compliance.
For a policy to become enforceable, it must meet the following five criteria:
Dissemination (distribution): The organization must be able to demonstrate that the relevant
policy has been made readily available for review by the employee. Common dissemination
techniques include hard copy and electronic distribution.
Review (reading): The organization must be able to demonstrate that it disseminated the
document in an intelligible form, including versions for illiterate, non-English read- ing, and
reading-impaired employees. Common techniques include recordings of the policy in English
and alternate languages.
Compliance (agreement): The organization must be able to demonstrate that the employee agreed
to comply with the policy through act or affirmation. Common techniques include logon banners,
which require a specific action (mouse click or keystroke) to acknowledge agreement, or a
signed document clearly indicating the employee has read, understood, and agreed to comply
with the policy.
Uniform enforcement: The organization must be able to demonstrate that the policy has been
uniformly enforced, regardless of employee status or assignment.
Types of Law
1. Civil law comprises a wide variety of laws that govern a nation or state and deal with the
relationships and conflicts between organizational entities and people.
2. Criminal law addresses activities and conduct harmful to society, and is actively
enforced by the state. Law can also be categorized as private or public.
3. Private law encompasses family law, commercial law, and labor law, and regulates the
relationship between individuals and organizations.
4. Public law regulates the structure and administration of government agencies and their
relationships with citizens, employees, and other governments. Public law includes
criminal, administrative, and constitutional law.
In 2002 Congress passed the FISMA(Federal information Security Management Law) which
mandates all agencies establish information security programs to protect their information assets.
The following agencies ,regulated business and individuals are exempt from some of the
regulations so they can perform their duties
a) Census
2. Accident: Individuals with authorization and privileges to manage information within the
organization are most likely to cause harm or damage by accident. Careful planning and
control helps prevent accidental modification to systems and data.
3. Intent: Criminal or unethical intent goes to the state of mind of the person performing
the act; it is often necessary to establish criminal intent to successfully prosecute
offenders. Protecting a system against those with intent to cause harm or damage is best
accomplished by means of technical controls, and vigorous litigation or prosecution if
these controls fail.
2. professional associations: such as the Association for Computing Machinery (ACM) and the
Information Systems Security Association—and certification agencies—such as the International
Information Systems Security Certification Consortium, Inc., or (ISC) 2—work to establish the
profession’s ethical codes of conduct.
Risk Management
Risk management is the process of identifying risk, as represented by vulnerabilities, to an
organization’s information assets and infrastructure, and taking steps to reduce this risk to an
acceptable level.
Risk management involves three major undertakings: risk identification, risk assessment,
and risk control.
1. Risk identification is the examination and documentation of the security posture of an
organization’s information technology and the risks it faces.
2. Risk assessment is the determination of the extent to which the organization’s
information assets are exposed or at risk.
3. Risk control is the application of controls to reduce the risks to an organization’s data
and information systems. The various components of risk management and their
relationship to each other
Roles of the community of interest
• Each community of interest has a role to play in managing the risks that an organization
encounters.
• Management must also ensure that sufficient time, money personnel and other resources
are allocated to the information security and IT groups to meet the organization security
needs.
• IT operations, IT community and IF security are the 3 communities that are responsible
for the following
a) Evaluating current and proposed risk control
b) Decide which control actions are more effective
c) Installing the needed controls
d) Controls remain effective
• Residual Risk (Risk Tolerance): The risk to information assets that remains even after
current controls have been applied.
• Risk Appetite: The quantity and nature of risk that organizations are willing to accept as
they evaluate the tradeoffs between perfect security and unlimited accessibility.
1. Risk Identification:
A risk management strategy requires that information security professionals know their
organizations’ information assets that is, identify, classify, and prioritize them. Once the
organizational assets have been identified, a threat assessment process identifies and
quantifies the risks facing each asset.
• Risk can exist everywhere in the organization; representatives will come from every
department and will include users, managers, IT groups and information security groups.
• The process must then be planned with periodic deliverables, reviews and presentations
to management.
Identify
&prioritize
threats
Specify asset
vulnerabilities
Traditional
System SesSDLC Components Risk Management System
Components Components
People Employees Trusted
employees Other
staff
Nonemployees People at trusted
organizations Strangers
Data classification scheme: A formal access control methodology used to assign a level of
confidentiality to a information asset and thus restrict the number of people who can access it.
For most NSI(National Security Information)which is vital to the security of the nation ,the govt
uses a 3 level classification scheme.
a)Top Secret
b)Secret
c)Confidential
Stage-1
Stage-2
b)Evaluate loss event frequency
(iv)Derive vulnerability
Stage-3
Stage-4
Calculate Risk
Accept Risk
acceptability
Risk Control:
a)Application of policy
3. Mitigation : attempts to reduce the impact of an attack rather than reduce the
success of attack itself.
This approach requires the creation of three types of contingency plans:
a) Incident Response plan(IR)
b) Disaster Recovery plan(DR)
c) Business Continuity plan(BC)
4. Acceptance: The risk control strategy that indicates the organization is willing
to accept the current level of risk. As a result, the organization makes a conscious
decision to do nothing to protect an information asset from risk and to accept the
outcome from any resulting exploitation.
5.Termination: The risk control strategy that eliminates all risk associated with an
information asset by removing it from service. It directs the organization to avoid
business activities that introduce uncontrollable risk.
Fig : Risk Control Cycle