Lec1-01- Comparing Security Roles and Security Controls
Lec1-01- Comparing Security Roles and Security Controls
Security
(416CY)
Lecture 01
Outlines
© netriders.academy 2
1.1- Compare and Contrast Information Security Roles
1.2- Compare and Contrast Security Control And Framework Types
© netriders.academy 3
INFORMATION SECURITY
• Information Security (or infosec) refers to the protection of data resources from
unauthorized access, attack, theft, or damage.
• Data may be vulnerable because of the way it is stored, the way it is transferred,
or the way it is processed.
• Secure information has three properties, often referred to as the CIA Triad:
✓ Confidentiality: means that certain information should only be knownto certain people.
✓ Integrity: means that the data is stored and transferred as intended and that any
modification is authorized.
✓ Availability: means that information is accessible to those authorized to view or modifyit.
© netriders.academy 4
INFORMATION SECURITY (cont.)
• Some security models and researchers identify other properties that secure
systems should exhibit.
• The most important of these is non-repudiation.
• Non-repudiation means that a subject cannot deny doing something, such as
creating, modifying, or sending a resource.
• For Example: a legal document, such as a will, must usually be witnessed when it
is signed.
• If there is a dispute about whether the document was correctly executed, the
witness can provide evidence that it was.
© netriders.academy 5
INFORMATION SECURITY COMPETENCIES
© netriders.academy 6
INFORMATION SECURITY ROLES AND RESPONSIBILITIES
© netriders.academy 7
INFORMATION SECURITY ROLES AND RESPONSIBILITIES
(cont.)
• As part of the process of adopting an effective organizational security posture,
employees must be aware of their responsibilities.
• The structure of security responsibilities will depend on the size and hierarchy of
an organization, but these roles are typical.
✓ Overall internal responsibility for security might be allocated to a dedicated department,run
by a Director of Security, Chief Security Officer (CSO), or Chief Information Security Officer
(CISO).
✓ Managers may have responsibility for a domain, such as building control, ICT, oraccounting.
✓ Technical and specialist staff have responsibility for implementing, maintaining, and
monitoring the policy.
✓ Non-technical staff have the responsibility of complying with policy and with anyrelevant
legislation.
© netriders.academy 8
INFORMATION SECURITY BUSINESS UNITS
© netriders.academy 9
INFORMATION SECURITY BUSINESS UNITS (cont.)
2. Incident Response
• A dedicated cyber incident response team (CIRT)/computer security incident response
team (CSIRT)/computer emergency response team (CERT) as a single point-of-contact
for the notification of security incidents.
• This function might be handled by the SOC, or it might be established as an independent
business unit.
✓Preventive—the control acts to eliminate or reduce the likelihood that an attack can
succeed, A preventative control operates before an attack can take place, Access
control lists (ACL) configured on firewalls and file system objects are preventative-
type controls, Anti-malware software also acts as a preventative control, by blocking
processes identified as malicious from executing.
✓Detective—the control may not prevent or deter access, but it will identify and
record any attempted or successful intrusion, A detective control operates during
the progress of an attack, Logs provide one of the best examples of detective-type
controls.
• Security controls can also be classified in types according to the goal or function
they perform (cont.)