Lec06 2023
Lec06 2023
Cyber Security
Lecture 6:
Safety in Digital World
Learning Objectives
• List the elements of key information security management practices
• Discuss information security constraints on general hiring processes
• Explain the role of information security in employee terminations
• Describe the security practices used to regulate employee behavior
and prevent misuse of information
• Discuss the Cybersecurity metrics, advantages and challenges
• Describe the key components of , and suitable strategies for the
implementation of, a security performance measurement program
• Discuss the benchmarking and baselining
Introduction to Security Practices
• Value proposition – organizations strive to deliver the most value with
a given level of investment
• The development and use of sound and repeatable information
security (InfoSec) management practices can bring the organizations
closer to meeting this objective
• Challenge that seldom be considered in organization:
The need for a close working relationship between (1) information security,
(2) the HR department, and (3) every department that is engaged in
personnel management, specifically in hiring, evaluating and terminating
employees
Introduction to Security Practices
• Why need close working relationship?
• Part of each phase of the personnel management life cycle could potentially
result in a risk to the security of the organization’s information assets
• To overcome the challenge
• InfoSec should share the responsibility of educating the rest of the
organization on how to avoid accidental information disclosure
Source: Whitman, M. E., & Mattford, H. J. (2019). Management of Information Security (6th
ed.). Cengage Learning. ISBN: 9781337671545
Security Employment Practices –
Hiring
• InfoSec into the hiring process (job description)
Review and update job descriptions to include InfoSec responsibilities
Screen for unwanted disclosures 不必要的披露。 . Example: advertising
open positions omit 忽略 description about access privileges 特权 or
type of sensitive information to which the position would have access
• If a job interview includes a site visit 现场参观 , the tour should avoid
secure and restricted sites.
• The candidate is not yet bound 限 by organizational policy or employment
contract
Security Employment Practices –
Hiring
Background checks
• Should be conducted before the organization extends an offer to any
candidate
• Can uncover past criminal behavior or other information that suggests
a potential for future misconduct
• Background checks differ in their levels of details and depth:
• Military background check V.S InfoSec positions background check
Security Employment Practices –
Contracts and Employment
• Once a candidate has accepted a job offer, the employment contract
becomes an important security instrument
• Job candidates can be offered “employment contingent upon
agreement” 就业以协议为准”
• They are not formally hired into a position unless they agree to the binding
organizational policies
• Once the candidate signs the security agreements, the remainder of the
employment contract may be executed 被处决
Security Employment Practices –
Contracts and Employment
New Hire Orientation
• New employees should receive an extensive InfoSec briefing
• Should cover policies, security procedures, access levels and training
on the secure use of information systems
• Ready to report to their position: they should be thoroughly briefed
on the security component of their particular jobs, the rights and
responsibilities
Security Employment Practices –
Contracts and Employment
On-the-job security training
• The periodic Security Education Training and Awareness (SETA)
activities should be conducted
• Keep security at the forefront of employee’s minds
• Minimize employee mistakes
Source: Whitman, M. E., & Mattford, H. J. (2019). Management of Information Security (6th
ed.). Cengage Learning. ISBN: 9781337671545
Information Security Performance Measurement -
building the performance measurement program
• Phase 1
• Identify relevant stakeholders and their interests in InfoSec measurement
• Primary stakeholders with key responsibilities or data ownership
• Secondary stakeholders relevant tasks in their jobs
• Phase 2
• Identify and document the InfoSec performance goals and objectives
• Phase 3
• Focus on organization-specific InfoSec practices
• How security controls should be implemented
• Any specific policies and procedures that define the baseline of the practices
Information Security Performance Measurement -
building the performance measurement program
• Phase 4
• Review the existing measurements and data repositories 查看现有的测量和
数据存储库
• Applicable information is extracted and used
• Phase 5, 6 and 7
• Track process implementation, effectiveness and mission impact
Source: Whitman, M. E., & Mattford, H. J. (2019). Management of Information Security (6th
ed.). Cengage Learning. ISBN: 9781337671545
Information Security Performance Measurement -
specifying InfoSec measurements
• One of the critical tasks in the measurement process is to assess and
quantify what will be measured
• Must obtain more detailed measurements
• Measurements collected from production statistics depend greatly on
the number of systems and the number of users of the system
• Link the outcome of each project, in term of loss control or risk
reduction, to the recourses consumed
Information Security Performance Measurement -
collecting InfoSec measurements
• Designing the collection process requires thoughtful consideration of the
intent of the measurement along with a thorough knowledge of how
production services are delivered
• One of the priorities in building an InfoSec process measurement
program is determining whether these measurements are:
• Macro-focus or
• Micro-focus
• Macro-focus measurements: examine the performance of the overall
security program
• Micro-focus measurements: examine the performance of an individual
control or group of controls within the InfoSec program
Information Security Performance Measurement -
collecting InfoSec measurements
• It is important to ensure that individual metrics are prioritized in the
same manner as the processes that they measure
• Low-, medium- or high-priority ranking system
• Weighted scale approach – assigning values to each measurement based on
its importance in the overall InfoSec program
• Literally, hundreds of measurements could be used; only those
associated with appropriate-level priority activities should be
incorporated
Information Security Performance Measurement -
implementing InfoSec performance measurements
• Once developed, InfoSec performance measurements must be
implemented and integrated into the ongoing InfoSec management
operations
• Performance measurement is an ongoing and continuous
improvement operation
• The collection of all measurement data should be part of standard
operating procedure across the organization
Information Security Performance Measurement -
reporting InfoSec performance measurements
• In most cases, simply listing the performance measurements collected
does not adequately convey their meaning
• E.g: a line chart showing the number of malicious code attacks occurring per
day
• May provide more info the number of new malicious code variants on the
Internet in that time period (take precaution)
• How to do reporting? - present correlated metrics
• use pie, line, scatter or bar charts?
• Which colors denote which kinds of results
Information Security Performance Measurement -
reporting InfoSec performance measurements
• Must consider to whom the results of the performance measurement
program should be disseminated?
• How they should be delivered?
• Usually, these types of reports are presented in meetings with key
executive peers 这些类型的报告是在与主要执行同行的会议上提
出的
• It is seldom advisable to broadcast complex metrics-based reports to
large groups, unless the key points are well established and
embedded in a more complete context, such as a press release
Information Security Performance Measurement -
reporting InfoSec performance measurements
• Many organizations choose
to implement a
consolidated summary of
key performance
measurements using a
dashboard of security
indicators 使用安全指标仪
表板实施关键绩效衡量的
综合摘要
Source: Whitman, M. E., & Mattford, H. J. (2019). Management of Information Security (6th
ed.). Cengage Learning. ISBN: 9781337671545
Benchmarking 标杆管理
• Benchmarking is an attempt to improve information security practices
by comparing an organization’s efforts against practices of a similar
organization or an industry-developed standard
• with other organizations similar in size, structure or industry
An example:
A baseline for the number of attacks per week that an organization
experiences. In the future, this baseline can serve as a reference point
to determine whether the average number of attacks is increasing or
decreasing.