IS3350 Security Issues in Legal Context

19
© ITT Educational Services, Inc. All rights reserved. IS3350 Security Issues in Legal Context Unit 1 Information Systems Security Overview

description

IS3350 Security Issues in Legal Context. Unit 1 Information Systems Security Overview. Learning Objective. Recognize the legal aspects of the information security triad: Availability Integrity Confidentiality. Key Concepts. Availability, Integrity, and Confidentiality (AIC Triad) - PowerPoint PPT Presentation

Transcript of IS3350 Security Issues in Legal Context

Page 1: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.

IS3350 Security Issues in Legal Context

Unit 1

Information Systems Security Overview

Page 2: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 2IS3350 Security Issues in Legal Context

Learning Objective

Recognize the legal aspects of the information security triad: Availability Integrity Confidentiality

Page 3: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 3IS3350 Security Issues in Legal Context

Key ConceptsAvailability, Integrity, and Confidentiality

(AIC Triad)Basic information system security conceptsRisk analysis and mitigationMechanisms for organizational information

securityData classifications requiring specialized

legal consideration

Page 4: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 4IS3350 Security Issues in Legal Context

EXPLORE: CONCEPTS

Page 5: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 5IS3350 Security Issues in Legal Context

Confidentiality

Integrity Availability

Information Security

CIA Triad

Page 6: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 6IS3350 Security Issues in Legal Context

Shoulder Surfing Social Engineering Spear Phishing Malware Spyware Logic Bomb Back Door Denial of Service

Information Security Common Concerns

Page 7: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 7IS3350 Security Issues in Legal Context

General Military Classification

General Corporate Classification

Top SecretCorporate

Confidential

Secret Client Confidential

Confidential Proprietary

RestrictedPublic

Unclassified

Data Classification

Page 8: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 8IS3350 Security Issues in Legal Context

Legal Mechanisms to Ensure Information Security

Laws• Gramm-Leach-Bliley Act, HIPPA,

Sarbanes-Oxley (SOX), and others Information Regulations• Financial, credit card, health, etc.

Agencies• FTC, Banks, DHHS, SEC, DOE, etc.

Page 9: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 9IS3350 Security Issues in Legal Context

Vulnerability ~ asset weaknesses

Mitigation ~ safeguard assets

Threat Agent ~ hacker or malware

Exploits ~ threats carried out

Risks ~ minimized by asset owner

Risk Management Concepts

Page 10: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 10IS3350 Security Issues in Legal Context

EXPLORE: PROCESS

Page 11: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 11IS3350 Security Issues in Legal Context

Owner

Safeguard

Vulnerability

Risk

Asset

Threat Agent

Threat

Risk Management Process

Page 12: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 12IS3350 Security Issues in Legal Context

EXPLORE: ROLES

Page 13: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 13IS3350 Security Issues in Legal Context

Senior Management

Information Technology Department

Legal Department

Chief Information Security Officer

Roles in Risk Management

Page 14: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 14IS3350 Security Issues in Legal Context

EXPLORE: CONTEXT

Page 15: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 15IS3350 Security Issues in Legal Context

Information Security in Different Contexts

Government Organizations

Corporations

High Interest in Confidentiality

High Interest in Availability

Mandatory Access

Lattice-Based Models

Discretionary Access

Role-Based Models

Page 16: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 16IS3350 Security Issues in Legal Context

Discretionary Access Control (DAC):

discretion of the owner

Mandatory Access Control (MAC):

security labels & classifications

Role-Based Access Control (RBAC):

job function or role

Access Control Models

Page 17: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 17IS3350 Security Issues in Legal Context

EXPLORE: RATIONALE

Page 18: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 18IS3350 Security Issues in Legal Context

Cyberspace theft

Internet extortion

Online pedophilia

Jurisdiction issues

Electronic signature issues

Law and Information Security

Page 19: IS3350 Security Issues in Legal Context

© ITT Educational Services, Inc. All rights reserved.Page 19IS3350 Security Issues in Legal Context

Summary

Availability, Integrity, and Confidentiality (AIC Triad)

Basic information system security conceptsRisk analysis and mitigationMechanisms for organizational information

securityData classifications requiring specialized

legal consideration