0% found this document useful (0 votes)
37 views40 pages

Information Security Career Insights

The document outlines the importance of information security and the growing demand for specialists in the field due to increasing cyber threats. It emphasizes the need for a multidisciplinary approach to information security, integrating technical and non-technical skills, and discusses the risk management process, including identifying threats and vulnerabilities. Additionally, it highlights various career opportunities in information security and the essential skills required for success in this domain.

Uploaded by

priyesh.infosec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views40 pages

Information Security Career Insights

The document outlines the importance of information security and the growing demand for specialists in the field due to increasing cyber threats. It emphasizes the need for a multidisciplinary approach to information security, integrating technical and non-technical skills, and discusses the risk management process, including identifying threats and vulnerabilities. Additionally, it highlights various career opportunities in information security and the essential skills required for success in this domain.

Uploaded by

priyesh.infosec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CSCI-618: Information Security

Risk Management and Legal


Issues
Introduction

Maryam Hamidirad
• Course instructor
• Head of Risk & Compliance
• Email address: [email protected]
Text Books
Chapter 1: Why Study
Information Security
Objectives

■ Recognize the growing importance of information security


specialists
■ Develop a strategy for pursuit of a career in information security
■ Comprehend information security in the context of the mission of a
business

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 5
Information is gold and it can be robbed and stolen
Introduction

■ To protect computers, networks, and the information they store,


organizations are increasingly turning to information security
specialists
■ An information security specialist is more than a technician who
prevents hackers from attacking a web site

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 7
Introduction (cont.)

■ You might ask yourself: Why study information security?


■ In this class, we’ll examine both practical and theoretical skills
security specialists use to protect information systems

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 8
The Growing Importance of IT Security and
New Career Opportunities
■ Increased services to both vendors and employees create worlds of
possibilities in satisfying customer needs, but …
■ They also create risks to the confidentiality, integrity, and availability of
confidential or sensitive data

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 9
“It is not a matter of if you will be compromised, it is when.”

“There are only two types of companies–those


that know they’ve been compromised and those
that do not know”
Recent cyber attacks
Information security resource shortage
•Global IT security skills shortages have now surpassed four
million, according to (ISC)2.
•(ISC)2 claimed the global security workforce needs to
increase by 145% to cope with a surge in hiring demand
•The future is digital and the demand is going to increase
even more
Becoming an Information Security Specialist (cont’d)

13
Becoming an Information Security Specialist (cont’d)

14
Becoming an Information Security Specialist
• Getting a degree in information security will involve taking classes in security architecture, laws and ethics,
access control, disaster recovery and planning
• Get the right certification
• Certified Information Systems Security Professional (CISSP)
• System Security Certified Practitioner (SSCP)
• Global Information Assurance Certification (GIAC):www.giac.org
• Consider earning a graduate degree in INFOSEC
• Increase your disaster recovery and risk management skills (DRI or CBCI)
• Build a home laboratory

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 15
Becoming an Information Security Specialist (cont’d)

16
Becoming an Information Security Specialist (cont.)

• Give something back to the INFOSEC community


• Get on a project working with strategic partners
• Consider an internship in IS
• Take a second look at government jobs

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 17
Multidisciplinary Approach

• Security professionals must think like business leaders


• Exposure to nontechnical areas gives INFOSEC professionals a greater
ability to address and resolve complex problems
• Including probability and statistics, psychology, English, foreign
languages, philosophy, ethics, history, and so on
• A wide range of educational experiences is a good foundation for an
INFOSEC career

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 18
Cyber security is not an IT issue, it is a business issue
Contextualizing Information Security
Information security draws upon the best practices and experiences from multiple domains
including
• Compliance, policies, and standards
• Administration, auditing, access controls, and permission controls
• Intrusion detection and prevention and incident response
• Software development security
• Physical security
• Operations control
• Public key infrastructure and key management
• Disaster recovery
• Security testing
• Software development security
• Antivirus solutions
• Training and awareness © Pearson Education 2014, Information Security: Principles
and Practices, 2nd Edition 20
Information Security Careers Meet the Needs of Business

To support business operations a number of common positions and


career opportunities are needed
• Security administrators
• Access coordinators
• Security architects and network engineers
• Security consultants

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 21
Information Security Careers Meet the Needs of Business (cont.)

• Security testers
• Policymakers and standards developers
• Compliance officers
• Incident response team members
• Governance and vendor managers

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 22
Summary

• Networked systems remain vulnerable to attacks from within and


outside an organization
• The explosive growth of e-commerce and the pervasive personal and
business uses of the Internet have created a growing demand for
information security professionals
• The principles, approaches, and concepts in INFOSEC should work
together to provide the harmonious mix of risk and reward that modern
business demands

© Pearson Education 2014, Information Security: Principles


and Practices, 2nd Edition 23
Chapter 1: “Risk
Management
Fundamentals”
Key Concepts
▪ Defining risk
▪ Balancing risk
▪ Seven domains of a typical IT infrastructure
▪ Addressing confidentiality, integrity, and availability
▪ Compliance laws and regulations
▪ Standards and guidelines used for compliance

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 25
All rights reserved.
What Is Risk?
▪ Risk: The likelihood that a loss will occur. Losses occur when a threat
exposes a vulnerability.

▪ Threat: Any activity that represents a possible danger.

▪ Vulnerability: A weakness.

▪ Loss: A loss results in a compromise to business functions or assets.

▪ Tangible

▪ Intangible

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 26
All rights reserved.
Example
Risk-Related Concerns for Business

Compromise of business functions

Compromise of business assets

Driver of business costs

Profitability versus survivability

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 28
All rights reserved.
Seven Domains of a Typical IT Infrastructure

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 29
All rights reserved.
Addressing CIA
▪ Confidentiality

▪ Integrity

▪ Availability

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 30
All rights reserved.
Why CIA matters?
Crown jewel assets that are critical assets for organizations to achieve their mission, strategy and objectives. Each
crown jewel has been classified based on its confidentiality (C), integrity (I)and availability (A) requirements, to
understand which security controls would be most important to ensure the asset is protected.

Crown Jewel Category Description C I A

Solution used for customer order processing and supply


ERP management system System
change

Customer information, order history and inventory


Customer information Data
prices

Employee information stored for payroll and other HR


Employee information Data
related purposes

High Medium Low


Risk Management
Risk
Probability of Loss

Risk
Management
Threat
Vulnerability
Potential Harm
System Weakness
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Managing Risk in Information Systems www.jblearning.com Page 32
All rights reserved.
Risk Management Elements/Process

Identify risks to
Assess risks Select controls
manage

Implement and
Evaluate controls
test controls

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 33
All rights reserved.
Survivability, and Balancing Risk and Cost
▪ Consider the cost to implement a control and the cost of not
implementing the control

▪ Spending money to manage a risk rarely adds profit; important point is


that spending money on risk management can help ensure a business’s
survivability

▪ Cost to manage a risk must be balanced against the impact value

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 34
All rights reserved.
Survivability, and Balancing Risk and Cost (Continued)

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 35
All rights reserved.
Role-based Perceptions of Risk

▪ Management

▪ System administrator

▪ Tier 1 administrator

▪ Developer

▪ End user

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 36
All rights reserved.
Risk Identification Process

Estimate
Identify likelihood of a
Identify threats
vulnerabilities threat exploiting
a vulnerability

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 37
All rights reserved.
Risk Identification Elements

Component Type or Source

Threats ▪ External or internal


▪ Natural or man-made
▪ Intentional or accidental

Vulnerabilities ▪ Audit
▪ Certification/accreditation records
▪ System logs
▪ Prior event
▪ Trouble reports
▪ Incident response teams

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 38
All rights reserved.
Techniques of Risk Management

Avoidance Transfer

Various
Mitigation Techniques of
Acceptance
Risk
Management

Cost-Benefit Analysis Residual Risk

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Managing Risk in Information Systems www.jblearning.com Page 39
All rights reserved.
Next Lecture
TEXT 1: Chapter 2 Information Security Principles of Success

TEXT 2: Chapter 2 Managing Risk: Threats, Vulnerabilities, and Exploits

Quiz #1

You might also like