Principles of Information System Security: Text and Cases Gurpreet Dhillon PowerPoint Prepared by Youlong Zhuang University of Missouri-Columbia Principles of Information System Security: Text and Cases Chapter Six Security of Formal Systems in Organizations: An Introduction Learning Objectives Identify the key aspects of formal information system security Explain structures of responsibility Understand organizational buy-in Explain the importance of security policies Recommend issues in good security policy formulation Copyright 2006 John Wiley & Sons, Inc. 6-3 Formal IS Security Creating organizational structures and processes to ensure security and integrity Creating and sustaining proper responsibility structures Maintaining integrity of the roles Creating adequate business processes Establishing an overarching strategy and policy Copyright 2006 John Wiley & Sons, Inc. 6-4 Ten Deadly Sins of IS Security Management, Table 6.1 Deadly sins of information system security 1. Not realizing that information security is a corporate governance responsibility (the buck stops right at the top) 2. Not realizing that information security is a business issue and not a technical issue 3. Not realizing the fact that information security governance is a multi-dimensional discipline (information security governance is a complex issue, and there is no silver bullet or single ‘off the shelf’ solution) 4. Not realizing that an information security plan must be based on identified risks 5. Not realizing (and leveraging) the important role of international best practices for information security management 6. Not realizing that a corporate information security policy is absolutely essential 7. Not realizing that information security compliance enforcement and monitoring is absolutely essential 8. Not realizing that a proper information security governance structure (organization) is absolutely essential 9. Not realizing the core importance of information security awareness amongst users 10. Not empowering information security managers with the infrastructure, tools and supporting mechanisms to properly perform their responsibilities Copyright 2006 John Wiley & Sons, Inc. 6-5 Four Classes of Formal IS Security Security strategy and policy Responsibility and authority structures Business processes Roles and skills Copyright 2006 John Wiley & Sons, Inc. 6-6 Formal IS Security Dimensions Responsibility and authority structures Organizational buy-in Security policy Copyright 2006 John Wiley & Sons, Inc. 6-7 Responsibility and Authority Structures Determine the performance of the formal controls systems Provide a means to understand the manner in which responsible agents are identified Understand the underlying patterns of behavior Manifest the roles and reporting structures of organizational members Copyright 2006 John Wiley & Sons, Inc. 6-8 Mapping Structures of Responsibility Identify the agents who determine what takes place, and what behavior is realized Agents are associated with communication acts which serve to change the social world, which in turn constitutes the world of interrelated obligations An ontology chart represents the invariants in any domain as patterns of behavior to be realized by agents acting therein Copyright 2006 John Wiley & Sons, Inc. 6-9 A Simple Representation of Structures of Responsibility Figure 6.1 Printer Network Data Source Access supplies Data Access stores Access Storage Device sited PC Room Position . Role # Administ rat or Organisation # incumbency Access Person Figure 1, A simple semantic schema for a secure environment Copyright 2006 John Wiley & Sons, Inc. 6-10 Mapping Structures of Responsibility (Cont’d) Invariants on the right of the chart can only be realized when those on their left have been realized Each invariant pattern is shown as a node in the chart The analysis task is to elicit for each node the responsible agents and the norms used by the organization The chart is a useful platform to study the norms and structure of an organization Copyright 2006 John Wiley & Sons, Inc. 6-11 Mapping Structures of Responsibility (Cont’d) Sketches the generic affordances that constrain any agent in this domain Implicitly creates a place for the agents at each node who decide Who has access to a PC Which PCs have access to what data Which PCs are sited in which rooms Agents make decisions in line with prevailing norms, which should reflect the practices espoused by the firm; and the practices conform to various over arching jurisdictions Copyright 2006 John Wiley & Sons, Inc. 6-12 Using Structures of Responsibility Maps Compare responsible structure against the explicit security management structure of an enterprise Between the formal and the informal systems Lead to the substantive actions required of members of the firm It can be difficult to attribute responsibility if the norms are not strong Copyright 2006 John Wiley & Sons, Inc. 6-13 Using Structures of Responsibility Maps (Cont’d) Two security procedures are revealed when a person is given access to a PC which has access to the network The ‘start’ and ‘finish’ of an incumbency The ‘start’ and ‘finish’ of access to a PC Understand the underlying repertoires of behavior Copyright 2006 John Wiley & Sons, Inc. 6-14 Organizational Buy-in Support from an organization’s executive leadership is the most challenging task It is also a challenge to educate employees A two-fold need for executive leadership buy-in Assures staff buy-in Ensures funding Copyright 2006 John Wiley & Sons, Inc. 6-15 Organizational Buy-in (Cont’d) Support from the IT Department is also essential Consensus needs to be reached regarding the best practices to protect enterprise information assets User support is another important ingredient Copyright 2006 John Wiley & Sons, Inc. 6-16 NIST’s Seven Steps for Effective Security Training Identify Program Scope, Goals, and Objectives To all types of people who interact with IT systems Organizational wide program needs to be supplemented by more system-specific programs Identify Training Staff Knowledge and communication skills Copyright 2006 John Wiley & Sons, Inc. 6-17 NIST’s Seven Steps for Effective Security Training (Cont’d) Identify Target Audiences Motivate Management and Employees Presents only the information needed by the particular audience Show how participation will benefit the organization Administer the Program Visibility, selection of appropriate training methods, topics, materials, and presentation techniques Copyright 2006 John Wiley & Sons, Inc. 6-18 NIST’s Seven Steps for Effective Security Training (Cont’d) Maintain the Program A training program that meets an organization’s needs today may become ineffective when the organization starts to use a new application or changes its environment Evaluate the Program How much information is retained, to what extent security procedures are being followed, and general attitudes toward security Copyright 2006 John Wiley & Sons, Inc. 6-19 Security Policy Numerous security problems have been attributed to the lack of a security policy Possible vulnerabilities related to security policies occurs at three levelspolicy development, implementation, and reinterpretation More details in Chapter Seven Copyright 2006 John Wiley & Sons, Inc. 6-20 Good Security Policy Formulation An organization incorporates the strategic direction of the company both at a micro and macro levels Clarification of the strategic agenda sets the stage for developing the security model The security policies determine the processes and techniques required to provide the security but not the technology Copyright 2006 John Wiley & Sons, Inc. 6-21 Good Security Policy Formulation (Cont’d) The implementation of security policies entails the development of procedures to implement the techniques defined in the security policies Security processes and techniques should be monitored constantly A response policy is an integral part of a good security policy Establish procedures and practices for educating all stakeholders Copyright 2006 John Wiley & Sons, Inc. 6-22 Layers in Designing Formal IS Security, Figure 6.2 Plan Responses Evaluate and Monitor Procedures Implemented Define Implementation of Techniques Develop a Security Policy Clarifying the Security Model I M P L E ME N T A T I O N Increase Awareness and Educate Setting the Strategic Direction Copyright 2006 John Wiley & Sons, Inc. 6-23 Concluding Remarks Good formal IS security is a function of Organizational considerations related to the structures of responsibility Ensuring organizational buy in Establishing security plans and policies and relating them to the organizational vision Copyright 2006 John Wiley & Sons, Inc. 6-24 Copyright 2006 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permission Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein. Copyright 2006 John Wiley & Sons, Inc. 6-25
© Copyright 2026 Paperzz