11-Mod 3 Information Security Management-13!08!2024
11-Mod 3 Information Security Management-13!08!2024
Audit
Module 3: Information Security Management
Backup of Security Devices- Overview
• Backup is an additional copy of data that can be used for restore and
recovery purposes
• Restores are fast and easy to manage as the entire list of files and folders are in
one backup set.
Disadvantages
• Backups can take very long as each file is backed up again every time the full
backup is run.
• The exact same files are be stored repeatedly resulting in inefficient use of
storage.
Incremental backup
• Incremental backup is a backup of all changes made since the
last backup.
• With incremental backups, one full backup is done first and
subsequent backup runs are just the changed files and new
files added since the last backup.
DIFFERENTIAL BACKUP
• Mirror backups are as the name suggests a mirror of the source being
backed up.
• With mirror backups, when a file in the source is deleted, that file is
eventually also deleted in the mirror backup.
• First and most importantly, a security policy must be backed by the company’s
senior management team.
• Without their support, the cooperation needed across departments will likely
doom the implementation.
• Make sure that the tools are in place to conform to the policy. For
example, if the policy specifies that a certain network be monitored,
make sure that monitoring capabilities exist on that network
segment.
• You will need to carefully consider the necessary security processes and
procedures after you have your policy finished.
• For example, the Backup Policy may detail the schedules for backups and off-site
rotation of backup media, however it won’t say exactly how these tasks are to be
accomplished.
• A training session should be held to go over the policies that will impact users as
well as provide basic information security awareness training.
• Coordinate with HR
Review the security policy
• Create a process so that the policy is periodically reviewed by the
appropriate persons.
• This should occur both at certain intervals (i.e. once per year), and
when certain business changes occur (i.e. the company opens in a
new location).
• User Reports: Incident reports from employees or users who might have
noticed suspicious activity.
Identify Immediate Causes
• Identify the immediate technical cause(s) of the incident,
such as:
• A malware infection.
• An exploited vulnerability in outdated software.
• Misconfigurations in firewall or security controls.
• Unauthorized access due to weak authentication
mechanisms.
• The 5 Whys: Ask “Why” repeatedly until you identify the underlying cause.
• Fault Tree Analysis: Create a logical diagram to map out possible causes
leading to the incident.