academy.delmar.edu

Download Report

Transcript academy.delmar.edu

Security+ Guide to Network
Security Fundamentals, Third
Edition
Chapter 14
Security Policies and Training
Objectives
• Define organizational security policy
• List the types of security policies
• Describe how education and training can limit the
impact of social engineering
Security+ Guide to Network Security Fundamentals, Third Edition
2
Organizational Security Policies
• Plans and policies must be established by the
organization
– To ensure that users correctly implement the
hardware and software defenses
• One of the key policies is an organizational security
policy
Security+ Guide to Network Security Fundamentals, Third Edition
3
What Is a Security Policy?
• Security policy
– A written document that states how an organization
plans to protect the company’s information technology
assets
• An organization’s information security policy can
serve several functions:
–
–
–
–
It can be an overall intention and direction
It details specific risks and how to address them
It can create a security-aware organizational culture
It can help to ensure that employee behavior is
directed and monitored
Security+ Guide to Network Security Fundamentals, Third Edition
4
Balancing Trust and Control
• An effective security policy must carefully balance
two key elements: trust and control
• Three approaches to trust:
– Trust everyone all of the time
– Trust no one at any time
– Trust some people some of the time
• Deciding on the level of control for a specific policy is
not always clear
– The security needs and the culture of the organization
play a major role when deciding what level of control is
appropriate
Security+ Guide to Network Security Fundamentals, Third Edition
5
Balancing Trust and Control
(continued)
Security+ Guide to Network Security Fundamentals, Third Edition
6
Designing a Security Policy
• Definition of a policy
– Standard
• A collection of requirements specific to the system or
procedure that must be met by everyone
– Guideline
• A collection of suggestions that should be implemented
– Policy
• Document that outlines specific requirements or rules
that must be met
Security+ Guide to Network Security Fundamentals, Third Edition
7
Designing a Security Policy
(continued)
• A policy generally has these characteristics:
– Policies communicate a consensus of judgment
– Policies define appropriate behavior for users
– Policies identify what tools and procedures are
needed
– Policies provide directives for Human Resource action
in response to inappropriate behavior
– Policies may be helpful in the event that it is
necessary to prosecute violators
Security+ Guide to Network Security Fundamentals, Third Edition
8
Designing a Security Policy
(continued)
• The security policy cycle
– The first phase involves a risk management study
•
•
•
•
•
Asset identification
Threat identification
Vulnerability appraisal
Risk assessment
Risk mitigation
– The second phase of the security policy cycle is to use
the information from the risk management study to
create the policy
– The final phase is to review the policy for compliance
Security+ Guide to Network Security Fundamentals, Third Edition
9
Designing a Security Policy
(continued)
Security+ Guide to Network Security Fundamentals, Third Edition
10
Designing a Security Policy
(continued)
• Steps in development
– When designing a security policy many organizations
follow a standard set of principles
– It is advisable that the design of a security policy
should be the work of a team
– The team should first decide on the scope and goals
of the policy
– Statements regarding due care are often included
• The obligations that are imposed on owners and
operators of assets to exercise reasonable care of the
assets and take necessary precautions to protect them
Security+ Guide to Network Security Fundamentals, Third Edition
11
Designing a Security Policy
(continued)
Security+ Guide to Network Security Fundamentals, Third Edition
12
Designing a Security Policy
(continued)
• Many organizations also follow these guidelines
while developing a policy:
– Notify users in advance that a new security policy is
being developed and explain why the policy is needed
– Provide a sample of people affected by the policy with
an opportunity to review and comment on the policy
– Prior to deployment, give all users at least two weeks
to review and comment
– Allow users the authority to carry out their
responsibilities in a given policy
Security+ Guide to Network Security Fundamentals, Third Edition
13
Types of Security Policies
• The term security policy becomes an umbrella term
for all of the subpolicies included within it
Security+ Guide to Network Security Fundamentals, Third Edition
14
Security+ Guide to Network Security Fundamentals, Third Edition
15
Types of Security Policies (continued)
• Most organizations have security policies that
address:
–
–
–
–
–
–
–
–
–
Acceptable use
Security-related human resources
Password management and complexity
Personally identifiable information
Disposal and destruction
Service level agreements
Classification of information
Change management
Ethics
Security+ Guide to Network Security Fundamentals, Third Edition
16
Acceptable Use Policy (AUP)
• Acceptable use policy (AUP)
– Defines the actions users may perform while
accessing systems and networking equipment
– May have an overview regarding what is covered by
this policy
• The AUP usually provides explicit prohibitions
regarding security and proprietary information
• Unacceptable use may also be outlined by the AUP
• Acceptable use policies are generally considered to
be the most important information security policies
Security+ Guide to Network Security Fundamentals, Third Edition
17
Security-Related Human Resource
Policy
• Security-related human resource policy
– A policy that addresses security as it relates to human
resources
– Includes statements regarding how an employee’s
information technology resources will be addressed
• Due process
– The principle of treating all accused persons in an
equal fashion, using established rules and principles
• Due diligence
– Any investigation into suspicious employee conduct
will examine all material facts
Security+ Guide to Network Security Fundamentals, Third Edition
18
Password Management and
Complexity Policy
• Password management and complexity policy
– Can clearly address how passwords are created and
managed
• The policy should also specify what makes up a
strong password
Security+ Guide to Network Security Fundamentals, Third Edition
19
Password Management and
Complexity Policy (continued)
Security+ Guide to Network Security Fundamentals, Third Edition
20
Password Management and
Complexity Policy (continued)
Security+ Guide to Network Security Fundamentals, Third Edition
21
Personally Identifiable Information (PII)
Policy
• Personally identifiable information (PII) policy
– Outlines how the organization uses personal
information it collects
Security+ Guide to Network Security Fundamentals, Third Edition
22
Personally Identifiable Information (PII)
Policy (continued)
Security+ Guide to Network Security Fundamentals, Third Edition
23
Disposal and Destruction Policy
• Disposal and destruction policy
– Addresses the disposal of resources that are
considered confidential
– Often covers how long records and data will be
retained
– Involves how to dispose of equipment
Security+ Guide to Network Security Fundamentals, Third Edition
24
Service Level Agreement (SLA) Policy
• Service level agreement (SLA)
– A service contract between a vendor and a client that
specifies what services will be provided, the
responsibilities of each party, and any guarantees of
service
• Service level agreement (SLA) policy
– An organizational policy that governs the conditions to
be contained in an SLA
• Many SLA policies contain tiers of service
Security+ Guide to Network Security Fundamentals, Third Edition
25
Service Level Agreement (SLA) Policy
(continued)
Security+ Guide to Network Security Fundamentals, Third Edition
26
Classification of Information Policy
• Classification of information policy
– Designed to produce a standardized framework for
classifying information assets
• Generally, this involves creating classification
categories such as high, medium, or low
– And then assigning information into these categories
Security+ Guide to Network Security Fundamentals
27
Change Management Policy
• Change management
– Refers to a methodology for making changes and
keeping track of those changes, often manually
– Seeks to approach changes systematically and
provide documentation of the changes
• Change management policy
– Outlines how an organization will manage changes in
a “rational and predictable” manner so employees
and clients can plan accordingly
Security+ Guide to Network Security Fundamentals, Third Edition
28
Ethics Policy
• Values
– A person’s fundamental beliefs and principles used to
define what is good, right, and just
• Morals
– Values that are attributed to a system of beliefs that
help the individual distinguish right from wrong
• Ethics
– The study of what a group of people understand to be
good and right behavior and how people make those
judgments
Security+ Guide to Network Security Fundamentals, Third Edition
29
Ethics Policy (continued)
• Ethics policy
– A written code of conduct intended to be a central
guide and reference for employees in support of dayto-day decision making
– Intended to clarify an organization’s mission, values,
and principles, and link them with standards of
professional conduct
Security+ Guide to Network Security Fundamentals, Third Edition
30
Education and Training
• Education and training involve understanding the
importance of organizational training
– And how it can be used to reduce risks, such as
social engineering
Security+ Guide to Network Security Fundamentals, Third Edition
31
Organizational Training
• All computer users in an organization share a
responsibility to protect the assets of that
organization
– Users need training in the importance of securing
information, the roles that they play in security, and
the steps they need to take to ward off attacks
• All users need:
– Continuous training in the new security defenses
– To be reminded of company security policies and
procedures
Security+ Guide to Network Security Fundamentals, Third Edition
32
Organizational Training (continued)
• One of the challenges of organizational education
and training is to understand the traits of learners
Security+ Guide to Network Security Fundamentals, Third Edition
33
Organizational Training (continued)
• Training style also impacts how people learn
• Most people are taught using a pedagogical
approach
– However, for adult learners, an andragogical
approach is often preferred
• There are different learning styles
– Visual learners
– Auditory learners
– Kinesthetic
Security+ Guide to Network Security Fundamentals, Third Edition
34
Reducing Risks of Social Engineering
• Social engineering
– Relies on tricking and deceiving someone to provide
secure information
• Phishing
– One of the most common forms of social engineering
– Involves sending an e-mail or displaying a Web
announcement that falsely claims to be from a
legitimate enterprise in an attempt to trick the user
into surrendering private information
– Both the e-mails and the fake Web sites appear to be
legitimate
Security+ Guide to Network Security Fundamentals, Third Edition
35
Security+ Guide to Network Security Fundamentals, Third Edition
36
Reducing Risks of Social Engineering
(continued)
• Variations on phishing attacks:
– Spear phishing
– Pharming
– Google phishing
• Ways to recognize phishing messages include:
–
–
–
–
–
Deceptive Web links
E-mails that look like Web sites
Fake sender’s address
Generic greeting
Pop-up boxes and attachments
Security+ Guide to Network Security Fundamentals, Third Edition
37
Reducing Risks of Social Engineering
(continued)
• Ways to recognize phishing messages include:
(continued)
– Unsafe Web sites
– Urgent request
• Some organizations have turned to creating regular
reminders to users regarding phishing attacks
Security+ Guide to Network Security Fundamentals, Third Edition
38
Security+ Guide to Network Security Fundamentals, Third Edition
39
Reducing Risks of Social Engineering
(continued)
• Dumpster diving
– Involves digging through trash receptacles to find
computer manuals, printouts, or password lists that
have been thrown away
• Shoulder surfing
– Watching an individual enter a security code or
password on a keypad
• Computer hoax
– An e-mail message containing a false warning to the
recipient of a malicious entity circulating through the
Internet
Security+ Guide to Network Security Fundamentals, Third Edition
40
Summary
• A security policy is a written document that states
how an organization plans to protect the company’s
information technology assets
• A standard is a collection of requirements specific to
the system or procedure that must be met by
everyone, while a guideline is a collection of
suggestions that should be implemented
• A policy is a document that outlines specific
requirements or rules that must be met, and is the
correct means to be used for establishing security
Security+ Guide to Network Security Fundamentals, Third Edition
41
Summary (continued)
• Because a security policy is so comprehensive and
often detailed, most organizations choose to break
the security policy down into smaller “subpolicies”
• A personally identifiable information (PII) policy
outlines how the organization uses information it
collects
• To provide users with the knowledge and skills
necessary to support information security, users need
to receive ongoing training
• Social engineering relies on tricking and deceiving
someone to provide secure information
Security+ Guide to Network Security Fundamentals, Third Edition
42