Alabama State University Data Security Periodic Reviews Essay

User Generated

fhcrefnvlna14

Business Finance

Alabama State University

Description

1200 words total. 3 APA cited references and reference list. No PLAGIARISM!!!

1. Describe the roles of the CIO and the CISO.

2. Describe an information security policy, which provides rules for the protection of the information assets of an organization.

3. Describe three continuity strategies, using hot, warm or cold sites.

For question 4, 250 words total. 2 APA cited references and reference list. No PLAGIARISM!!!

Unformatted Attachment Preview

chapter 2 V I C K E R S , Planning for Security You got to be careful if you don’t know where you’re going, T because you might not get there. E YOGI BERRA A wasn’t her first meeting with Mike Edwards, the chief Iris was a little uneasy. While this information officer (CIO), it was R her first planning meeting. Around the table, the other information technology (IT) department heads were chatting, drinking their coffee. Iris D had carefully written “Strategic Planning Meeting” and stared at her notepad, where she nothing else. R Mike entered the room, followed A by his assistants. Stan, his lead executive assistant, was loaded down with stacks of copied documents, which he and the other assistants began handing out. Iris took her copy and scanned the title: Random Widget Works, Inc. (RWW), Strategic Planning Document, Information Technology Division, FY 2014–2018. 1 “As you know, it’s annual planning 1 time again,” Mike began. “You just got your copies of the multiyear IT strategic plan. Last month, you each received your numbered copy of the 9 company strategic plan.” Iris remembered the half-inch-thick document she had carefully read and then locked in her filing 1 cabinet. Mike continued: “I’m going to T go through the IT vision and mission statements, and then review the details of how the IT plan will allow us to meet the objectives articulated in the strategic plan. In 30 days, you’llSsubmit your draft plans to me for review. Don’t hesitate to come by to discuss any issues or questions.” 35 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 36 Chapter 2 Later that day, Iris dropped by Mike’s office to discuss her planning responsibilities. This duty was not something he had briefed her about yet. “I’m sorry, Iris,” Mike said. “I meant to spend some time outlining your role as security manager. I’m afraid I can’t do it this week; maybe we can start next week by reviewing some key points I want you to make sure are in your plan. In the meantime, I suggest you ask the other business section chiefs for copies of their strategic plans and look for areas that don’t overlap with IT’s.” The next day, Iris had lunch with her mentor, Charley Moody. After they ordered, Iris said, “We just started on our strategic planning project and I’m developing a security strategic plan. You know, I’ve never worked up one of these from scratch before. Got any good advice on what to look for?” V I After they finished lunch, the pair went out to the parking lot. Inside Charley’s trunk were C two cardboard boxes marked “BOOKS.” He opened one and rummaged around for a few seconds. “Here,” he said, handing K Iris a textbook. She read the title out loud: “Strategic E Planning.” “This one is from a planning seminar R I did a while back,” Charley explained. “I have a later edition, but there really isn’t much difference between the two. I was cleaning out some of my redundant books. I was going S to donate these to the library book sale. It’s yours if you want it. It might help with your planning project.” , “Sure,” Charley responded. “Actually, I have something for you in my car that might help.” Charley closed the trunk and said, “Read over the first few chapters—that’ll give you the basics. Then sit down with your planning documents from corporate management and from IT. For T think about what your department needs to do to meet each goal stated by the CEO and CIO, it. Write up how you think the company E as a whole, and your team in particular, can satisfy that objective. Then go back and describe the resources you’ll need to make it happen.” A R Charley shook his head. “There’s more to it than that, but this will get you started. Once D of what I know about how to frame your plans and you’ve got that done, I can share some format them for use in the planning Rprocess.” A “That’s it?” Iris asked. LEARNING OBJECTIVES Upon completion of this material, you should be able to: • • • • 1 Identify the roles in organizations 1 that are active in the planning process Explain the principal components 9 of information security (InfoSec) system implementation planning in the organizational planning scheme 1 Differentiate between strategic organization InfoSec planning and specialized T contingency planning (CP) S List and explain the unique considerations and relationships that exist among the types of specialized CP—incident response, disaster recovery, and business continuity planning (BCP) 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 37 Introduction Chapter 1 discussed InfoSec management within the context of general management, covering many of the elements of general and project management as they apply to InfoSec. The broader subject of planning encompasses general organizational planning as well as the specific processes involved with planning for InfoSec. This subject is divided into two chapters (see Figure 2-1). This chapter covers organizational planning—specifically, the process of planning for InfoSec. And Chapter 3 covers a very important topic in InfoSec planning— contingency planning—in greater detail. It is difficult to overstate how essential planning is to business and organizational management. In a setting where there are continual constraints on resources, both human and finanV cial, good planning enables an organization to make the most out of the materials at hand. While a chief information security officer (CISO)—also called a “chief security officer” I (CSO), “director of InfoSec,” or “vice president for InfoSec”—and other InfoSec managers can generate an urgent response C to an immediate threat, they are well advised to utilize a portion of their routinely allocated K resources toward the long-term viability of the InfoSec program. However, some organizations spend too much time, money, and human effort on planE their investment. Each organization must balance the ning with too little return to justify benefits of the chosen degree of planning effort against the costs of the effort. R The Role of Planning S , Planning usually involves many interrelated groups and organizational processes. The groups T three communities of interest discussed in Chapter 1; they involved in planning represent the may be internal or external to E the organization and can include employees, management, Chapter 2 A R Information Security Planning D R A Organizational Planning 1 1 Tactical Planning 9 Operational Planning 1 T Planning for Information Security Programs S Strategic Planning Chapter 3 Contingency Planning Incident Response Planning Disaster Recovery Planning Business Continuity Planning Assembling and Testing Contingency Plans Figure 2-1 Information security and planning Copyright © 2014 Cengage Learning®. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 38 Chapter 2 stockholders, and other outside stakeholders. Among the other factors that affect planning are the physical environment, the political and legal environment, the competitive environment, and the technological environment. For the purposes of this text, the term stakeholder is used to describe those entities, whether people or organizations, that have a “stake” or vested interest in a particular aspect of the planning or operation of the organization. In this case, the area of concern is the information assets in use in a particular organization. This is distinctly different from the term “stockholder,” which describes someone who is an owner of the organization via ownership of the organization’s common or preferred stock shares. Stakeholders are typically asked for input whenever strategic decisions affecting their “stake” are planned. When planning, members of the InfoSec community of interest use the same processes and methodologies that the general management and IT management communities of interest use. Because the InfoSec community of interest seeks to influence the entire organization, an effecV tive InfoSec planner should know how the organizational planning process works so that parI ticipation in this process can yield measurable results. Before you can explore the positioning of InfoSec within an organization’sCplanning processes, however, you must first understand the concept of organizational planning. K Planning is the dominant means of managing resources in modern organizations. It entails the Eintended to achieve specific goals during a defined period enumeration of a sequence of actions of time, and then controlling the implementation of these steps. Planning provides direction for R the organization’s future. Without specific and detailed planning, organizational units would S attempt to meet objectives independently, with each unit being guided by its own initiatives and ideas. Such an uncoordinated effort would not only fail to meet objectives, it will result in an inef, ficient use of resources. Organizational planning, when conducted by the various segments of the organization, provides a uniform script that increases efficiency and reduces waste and duplication of effort by each organizational T unit within the individual communities of interest. E use of a top-down process in which the organization’s Organizational planning should make leadership chooses the direction andAinitiatives that the entire organization should pursue. Initially, the organizational plan contains few specific detailed objectives; instead, it outlines genR eral objectives. D planning process is the creation of detailed plans—that The primary goal of the organizational is, systematic directions for how to Rmeet the organization’s objectives. This task is accomplished with a process that begins with the general and ends with the specific. A Precursors to Planning 1 To implement effective planning, 1 an organization’s leaders usually begin from previously developed positions that explicitly state the organization’s ethical, entrepreneurial, and philo9 sophical perspectives. In recent years, the critical nature of the first of these perspectives—the 1 into focus. Widely publicized ethical lapses at such ethical perspective—has come sharply organizations as Enron, WorldCom, T Fannie Mae, IBM, and HP illustrate the importance of solid and well-articulated ethical underpinnings. While ethical failures of this magnitude are, S and regulators have implemented standards and reguone hopes, exceptional, industry groups lations that assess an organization’s ability to achieve compliance with legal requirements and industry-recommended practices. When an organization’s stated positions do not match the demonstrated ethical, entrepreneurial, and philosophical approaches of its management 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 39 teams, the developmental plan—which is guided by the organization’s values, vision, mission, and strategy—becomes unmanageable. Values Statement One of the first positions that management must articulate is the values statement. The trust and confidence of stakeholders and the public are important factors for any organization. By establishing a formal set of organizational principles and qualities in a values statement, as well as benchmarks for measuring behavior against these published values, an organization makes its conduct and performance standards clear to its employees and the public. The quality management movement of the 1980s and 1990s amply illustrated that organizations with strong values can earn greater loyalty from customers and employees. Microsoft has a formal employee Vmission and values statement published on its Web site, as shown in Figure 2-2. I Integrity, honesty, passion, and respectfulness are significant parts of Microsoft’s corporate C philosophy. RWW’s values statement might take the following form: K Random Widget Works values commitment, honesty, integrity, and social E responsibility among its employees and is committed to providing its services in harmony with its corporate, social, legal, and natural environments. R S , T E A R D R A 1 1 9 1 T S Figure 2-2 Microsoft’s mission and values statement Source: Microsoft. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 40 Chapter 2 Vision Statement The second underpinning of organizational planning is the vision statement. The vision statement expresses what the organization wants to become. Vision statements should therefore be ambitious; after all, they are meant to express the aspirations of the organization and to serve as a means for visualizing its future. In other words, the vision statement is the bestcase scenario for the organization’s future. Many organizations mix or combine the vision statement and the mission statement. RWW’s vision statement might take the following form: Random Widget Works will be the preferred manufacturer of choice for every business’s widget equipment needs, with an RWW widget in every gizmo in use. V This is a very bold, ambitious vision statement. It may not seem very realistic, but vision I the probable, only the possible. The vision statement is statements are not meant to express a concise statement of where the organization wants to go. C K E The mission statement explicitly declares the business of the organization and its intended areas of operations. It is, in a sense, the organization’s identity card. RWW’s mission stateR ment might take the following form: S Random Widget Works designs and manufactures quality widgets and associated , in modern business environments. equipment and supplies for use Mission Statement Not the 12-page sleeping pill you expected? A mission statement should be concise, should reflect both internal and external operations, and should be robust enough to remain valid T for a period of four to six years. Simply put, the mission statement must explain what the E organization does and for whom. A Many organizations encourage or require each division or major department—including the InfoSec department—to generate itsRown mission statement. These mission statements can be as concise as the example provided, D expressing a strong commitment to the confidentiality, integrity, and availability of information, or they can provide a more detailed description of the InfoSec department’s function,R as shown in the following example. This mission statement appears in Information Security A Roles and Responsibilities Made Easy, by Charles Cresson Wood. The Information Security Department is charged with identifying, assessing, and appropriately managing risks1to Company X’s information and information systems. It evaluates the options 1 for dealing with these risks, and works with departments throughout Company X to decide upon and then implement con9 trols that appropriately and proactively respond to these same risks. The Department is also responsible for1developing requirements that apply to the entire organization as well as external information systems in which Company X partiT cipates (for example, extranets) [these requirements include policies, standards, and procedures]. The focal point S for all matters related to information security, this Department is ultimately responsible for all endeavors within Company X that seek to avoid, prevent, detect, correct, or recover from threats to information or information systems.1 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 41 According to Wood, these threats include: ● Unauthorized access to information ● Unauthorized use of information ● Unauthorized disclosure of information ● Unauthorized diversion of information ● Unauthorized modification of information ● Unauthorized destruction of information ● Unauthorized duplication of information ● Unavailability of information2 2 V The mission statement is the follow-up to the vision statement. If the vision statement states I go, the mission statement describes how it wants to get where the organization wants to there. Taken together, the mission, C vision, and values statements provide the philosophical foundation for planning and guide the creation of the strategic plan. K E R Strategic Planning S Strategic planning lays out the long-term direction to be taken by the organization. It guides organizational efforts and focuses resources toward specific, clearly defined goals in the midst , of an ever-changing environment. As you learned in Chapter 1, a clearly directed strategy flows from top to bottom, and a sysT tematic approach is required to translate it into a program that can inform and lead all members of the organization. As shown in the sample hierarchical chart in Figure 2-3, strategic E plans formed at the highest levels of the organization are translated into more specific strategic plans for intermediate layers ofAmanagement. These plans are then converted into tactical CEO CIO CISO Security Mgr Security Admin Security Tech R D R A 1 1 9 1 T S Organizational Strategy Information Technology Strategy Information Security Strategy Information Security Tactical Planning Information Security Operational Planning Figure 2-3 Top-down strategic planning Copyright © 2014 Cengage Learning®. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 42 Chapter 2 planning for supervisory managers and eventually provide direction for the operational plans undertaken by the nonmanagement members of the organization. This multilayered approach encompasses two key objectives: general strategy and overall strategic planning. First, general strategy is translated into specific strategy; second, overall strategic planning is translated into lower-level tactical and operational planning. Each of these steps is discussed next. Creating a Strategic Plan After an organization develops a general strategy, it must create an overall strategic plan by extending that general strategy into specific strategic plans for major divisions. Each level of each division translates those objectives into more specific objectives for the level below. For example, a CEO might develop the following general statement of strategy: Providing the highest quality V health care service in the industry. To execute this broad strategy andIturn the general statement into action, the executive team (sometimes called the C-level of theCorganization, as in CEO, COO, CFO, CIO, and so on) must first define individual responsibilities. For example, the CIO might respond to the K statement: CEO’s statement with this more specific E information service in support of the highest Providing high-level health care quality health care service in R the industry. The chief operations officer (COO)Smight derive a different strategic goal that focuses more on his or her specific responsibilities: , Providing the highest quality medical services. The CISO might interpret the CIO’s and COO’s goals as follows: T Ensuring that quality health E care information services are provided securely and in compliance with all local, state, and federal information processing, informaA including HIPAA. tion security, and privacy statutes, R The conversion of goals from the strategic level to the next lower level is perhaps more art than science. It relies on the executive’s ability to know and understand the strategic goals D of the entire organization, to know and appreciate the strategic and tactical abilities of each R negotiate with peers, superiors, and subordinates. This unit within the organization, and to mix of skills helps to achieve the proper A balance in articulating goals that fall within performance capabilities. 1 Once the organization’s overall strategic 1 plan is translated into strategic goals for each major division or operation, the next step is to translate these strategies into tasks with specific, 9 measurable, achievable, and time-bound objectives. Strategic planning then begins a transfor1 mation from general, sweeping statements toward more specific and applied objectives. Strategic plans are used to create tactical plans, which are in turn used to develop operational T plans. Figure 2-4 illustrates the various planning levels discussed in this section. S Planning Levels Tactical planning has a more short-term focus than strategic planning—usually one to three years. It breaks down each applicable strategic goal into a series of incremental objectives. Each objective should be specific and ideally will have a delivery date within a year. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security Division A Strategic Plan Division A Tactical Plan Division A Operational Plan Division B Strategic Plan Division B Tactical Plan Division B Operational Plan 43 Overall Strategic Plan V I Copyright © 2014 Cengage Learning . C Budgeting, resource allocation, K and personnel are critical components of the tactical plan. Although these components may be discussed in general terms at the strategic planning level, E because they must be in place before the tactical plan can they are crucial at the tactical level be translated into the operational R plan. Tactical plans often include project plans and resource acquisition planning documents (such as product specifications), project budgets, Sannual reports. project reviews, and monthly and , Because tactical plans are often created for specific projects, some organizations call this proFigure 2-4 Strategic planning levels ® cess project planning or intermediate planning. The CISO and the security managers use the tactical plan to organize, prioritize, and acquire resources necessary for the major projects T and to provide support for the overall strategic plan. E Managers and employees use operational plans, which are derived from the tactical plans, to Aperformance of tasks. An operational plan includes clearly organize the ongoing, day-to-day identified coordination activitiesR that span department boundaries, communications requirements, weekly meetings, summaries, progress reports, and associated tasks. These plans are carefully designed to reflect the D organizational structure, with each subunit, department, or project team conducting its ownRoperational planning and reporting components. Frequent communication and feedback from the teams to the project managers and/or team leaders A and then up to the various management levels will make the planning process as a whole more manageable and successful. For example, operational planning 1 within InfoSec may encompass such objectives as the selection, configuration, and deployment of a firewall, or the design and implementation of 1 awareness (SETA) program. Each of these tasks needs a security education, training, and effective tactical planning that covers 9 its entire development life cycle. 1 T The first priority of the CISO and the InfoSec management team should be the structure of a S strategic plan. While each organization may have its own format for the design and distribuPlanning and the CISO tion of a strategic plan, the fundamental elements of planning are the same for all types of enterprises. There are a number of excellent text, trade, and reference books on strategic planning, and the serious InfoSec manager is encouraged to explore this topic. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 44 Chapter 2 Here are the basic components of a typical strategic plan: I. Executive Summary II. Mission Statement and Vision Statement III. Organizational Profile and History IV. Strategic Issues and Core Values V. Program Goals and Objectives VI. Management/Operations Goals and Objectives VII. Appendices (optional) [strengths, weaknesses, opportunities, and threats (SWOT) 3 analyses, surveys, budgets, V etc.] You have already learned about Isome of these components. Those areas not previously discussed are very straightforward, such as the organizational profile/history, and the C conducted by the organization or highlight informaappendices. They originate in studies tion about the environment in which K the organization operates. The appendices may help the organization identify new directions or eliminate directions that are less profitable E can consult studies such as the CSI surveys, the than anticipated. InfoSec planners “Threats to Information Security” R studies described in detail later in this chapter, and internal risk assessments to help identify trends of interest or relevance to the organization. S These documents are key resources that can identify areas that should be addressed by the InfoSec strategic plan. , Brian Ward, a principal with Affinity Consulting, offers the following tips for planning: T meaningful vision statement that communicates what 1. Articulate a comprehensive and the organization strives to accomplish. It should attract those persons of a like mind to E join in the effort to achieve that goal. A 2. Endeavor to bring a sense of logical analysis of the objectives and what has been R use a model known as the “balanced scorecard” to accomplished. Many organizations track outcomes against intentions to measure effects against prior actions. D 3. Work from an overarching plan that has been developed with the input from key R stakeholders. 4. Strive for transparency in the A planning process so that inevitable changes to plans are explained to stakeholders. 5. Work to make planning a process 1 that engages all involved to work toward the common objectives. 1 6. Stick with the process over time since results may not always be achieved as quickly as 9 intended. 1 methods of planning that are adopted as part of the 7. Develop consistent and repeatable organization’s culture. T S 8. Explain what is being done so that stakeholders perceive the intentions of the process. 9. Use processes that fit the organization’s culture. 10. Make the process as engaging as possible so that participants are not overwhelmed and feel put upon by the required actions.4 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 45 Information Security Governance Strategic planning and corporate responsibility is best accomplished using an approach many call governance, risk management, and compliance (GRC). GRC seeks to integrate these three, previously separate responsibilities into one holistic approach that can provide sound executive-level strategic planning and management of the InfoSec function. Governance is covered in the following section; risk management is covered in Chapters 8 and 9; compliance to regulations is covered in Chapter 12. The subjects themselves are neither new nor unique to InfoSec; however, the recognition of the need to integrate the three at the executive level is becoming increasingly important to practitioners in the field. The governance of InfoSec is a strategic planning responsibility whose importance has grown V InfoSec practices and sound InfoSec governance a comin recent years. Many consider good ponent of U.S. homeland security. Unfortunately, InfoSec is all too often regarded as a techniI cal issue when it is, in fact, a management issue. In order to secure information assets, an organization’s management mustCintegrate InfoSec practices into the fabric of the organization, expanding corporate governance policies and controls to encompass the objectives of K the InfoSec process. E InfoSec objectives must be addressed at the highest levels of an organization’s management Roffer a sustainable approach. When security programs are team in order to be effective and designed and managed as a technical S specialty in the IT department, they are less likely to be effective. A broader view of InfoSec encompasses all of an organization’s information assets, , including the knowledge being managed by those IT assets. These valuable commodities must be protected regardless of how the information is processed, stored, or transmitted, and with a thorough understanding of the risks to, and the benefits of, the information assets. T According to the Information Technology Governance Institute (ITGI), InfoSec governance E includes all the accountabilities and methods undertaken by the board of directors and executive management to provide strategic A direction, establishment of objectives, measurement of progress toward those objectives, verification that risk management practices are appropriate, R and validation that the organization’s assets are used properly.5 D R Inculcating a culture that recognizes the criticality of information and InfoSec to the A organization According to the ITGI, boards of directors should supervise strategic InfoSec objectives by: ● ● Verifying that management’s investment in InfoSec is properly aligned with organizational strategies and the organization’s risk environment 1 1 Demanding reports from the various layers of management on the InfoSec program’s 6 effectiveness and adequacy9 1 Desired Outcomes T InfoSec governance consists of the leadership, organizational structures, and processes that S safeguard information. Critical to the success of these structures and processes is effective ● Assuring that a comprehensive InfoSec program is developed and implemented ● communication among all parties, which requires constructive relationships, a common language, and shared commitment to addressing the issues. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 46 Chapter 2 Done properly, this should result in five basic outcomes of InfoSec governance: ● Strategic alignment of InfoSec with business strategy to support organizational objectives ● Risk management by executing appropriate measures to manage and mitigate threats to information resources ● Resource management by utilizing InfoSec knowledge and infrastructure efficiently and effectively Performance measurement by measuring, monitoring, and reporting InfoSec governance metrics to ensure that organizational objectives are achieved Value delivery by optimizing InfoSec investments in support of organizational objectives ● ● The National Association of Corporate Directors (NACD), the leading membership organizaV United States, recognizes the importance of InfoSec. It tion for boards and directors in the recommends four essential practicesI for boards of directors: 1. Place InfoSec on the board’s C agenda. 2. Identify InfoSec leaders, hold them accountable, and ensure support for them. K 3. Ensure the effectiveness of the corporation’s InfoSec policy through review and approval. E 4. Assign InfoSec to a key committee and ensure adequate support for that committee.7 R Benefits of Information Security Governance S InfoSec governance, if properly implemented, can yield significant benefits, including: ● ● ● ● ● ● ● ● , An increase in share value for organizations Increased predictability and reduced uncertainty of business operations by lowering T to definable and acceptable levels information-security-related risks Protection from the increasing Epotential for civil or legal liability as a result of information inaccuracy or the absence of due care A Optimization of the allocation of limited security resources R Assurance of effective InfoSec policy and policy compliance Dand effective risk management, process improvement, A firm foundation for efficient and rapid incident response R A level of assurance that critical A decisions are not based on faulty information Accountability for safeguarding information during critical business activities, such as mergers and acquisitions, business process recovery, and regulatory response.8 1 When developing an InfoSec governance program, the designers should ensure that the 1 program includes: ● An InfoSec risk management 9 methodology ● A comprehensive security strategy 1 explicitly linked with business and IT objectives ● An effective security organizational structure T ● A security strategy that talks about S the value of information being protected and delivered ● Security policies that address each aspect of strategy, control, and regulation ● A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 47 ● Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk ● A process to ensure continued evaluation and updating of security policies, standards, procedures, and risks Implementing Information Security Governance How can an organization implement effective security governance? According to the Corporate Governance Task Force (CGTF), the organization should engage in a core set of activities suited to their needs: ● Conduct an annual InfoSec evaluation, the results of which the CEO should review with staff and then report to the board of directors ● Conduct periodic risk assessments of information assets as part of a risk management I program C Implement policies and procedures based on risk assessments to secure information assets ● V ● Establish a security management K structure to assign explicit individual roles, responsibilities, authority, and accountability ● Develop plans and initiate actions to provide adequate InfoSec for networks, facilities, systems, and information R Treat InfoSec as an integral Spart of the system life cycle ● ● ● ● ● ● ● E Provide InfoSec awareness,, training, and education to personnel Conduct periodic testing and evaluation of the effectiveness of InfoSec policies and procedures Create and execute a plan T for remedial action to address any InfoSec deficiencies E response procedures Develop and implement incident Establish plans, procedures, Aand tests to provide continuity of operations Use security best practices R guidance, such as the ISO 27000 series, to measure InfoSec performance9 D The CGTF recommends following a governance framework such as the initiating, diagnosR ing, establishing, acting, and learning (IDEAL) model, which is named for its stages, as shown in Figure 2-5. The IDEALAmodel is shown in more detail in Figure 2-6. This framework, discussed in detail in the document “Information Security Governance: A Call to Action,” defines the responsibilities of the board of directors/trustees, the senior organizational executive (i.e., CEO), 1 executive team members, senior managers, and all employees and users. The source document 1 can be found at www.cyber.st.dhs.gov/docs/Information% 20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf. Figure 2-7 shows 9 the various responsibilities of these functional roles. The document also outlines the requirements 1 in additional detail in Chapter 6 of this text, and provides for an InfoSec program, discussed recommendations for organizational unit reporting and program evaluation. T Security Convergence S The convergence of security-related governance in organizations has been observed since the broad deployment of information systems began in the 1970s and 1980s. The trade press has discussed the issues surrounding this merging of management accountability in the areas of 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 48 Chapter 2 I Initiating Lay the groundwork for a successful improvement effort. D Diagnosing Determine where you are relative to where you want to be. E Establishing Plan the specifics of how you will reach your destination. A Acting Do the work according to the plan. L Learning Learn from the experience and improve your ability to adopt new improvements in the future. Figure 2-5 General governance framework V I C K E R S , Source: Software Engineering Institute. This publication incorporates portions of “IDEALISM: A User’s Guide for Software Process Improvement” by Bob McFeeley, Copyright 1996 Carnegie Mellon University, with special permission from its Software Engineering Institute. Any material of Carnegie Mellon University and/or its Software Engineering Institute contained herein is furnished on an “as-is” basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied, as to any matter, including, but not limited to, warranty of fitness for purpose or merchant ability, exclusivity, or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement. This publication has not been reviewed nor is it endorsed by Carnegie Mellon University or its Software Engineering Institute. IDEALSM is a service mark of Carnegie Mellon University. The IDEALSM Model Stimulus for Change Learning Propose Future Actions Analyse and Validate Implement Solution T E Set Build Charter Content Sponsorship Infrastructure A R Initiating Characterize Current & D Desired States R Develop Diagnosing A Recommendations Set Priorities Acting Refine Solution Pilot ∕ Test Solution Create Solution Plan Actions Develop 1 Approach 1 Establishing 9 1 framework Figure 2-6 The IDEAL model governance Source: Software Engineering Institute. This publication T incorporates portions of “IDEALISM: A User’s Guide for Software Process Improvement” by Bob McFeeley, Copyright 1996 Carnegie Mellon University, with special permission from its Software Engineering Institute. S Engineering Institute contained herein is furnished on an “as-is” basis. Carnegie Any material of Carnegie Mellon University and/or its Software Mellon University makes no warranties of any kind, either expressed or implied, as to any matter, including, but not limited to, warranty of fitness for purpose or merchant ability, exclusivity, or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement. This publication has not been reviewed nor is it endorsed by Carnegie Mellon University or its Software Engineering Institute. IDEALSM is a service mark of Carnegie Mellon University. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security Responsibilities 49 Functional Role Examples • Oversee overall “Corporate Security Posture” (Accountable to Board) • Chief Executive Officer • Brief board, customers, public • Set security policy, procedures, program, training for Company • Respond to security breaches (investigate, mitigate, litigate) • • • • Chief Security Officer Chief Information Officer Chief Risk Officer Department ∕Agency Head V I • Implement/audit/enforce/assess compliance C • Mid-Level Manager K • Communicate policies, program (training) E • Implement policy; report security • Enterprise Staff ∕ Employees R vulnerabilities and breaches S Figure 2-7 Information security governance responsibilities , • Responsible for independent annual audit coordination Source: Software Engineering Institute. This publication incorporates portions of “IDEALISM: A User’s Guide for Software Process Improvement” by Bob McFeeley, Copyright 1996 Carnegie Mellon University, with special permission from its Software Engineering Institute. Any material of Carnegie Mellon University and/or its Software Engineering Institute contained herein is furnished on an “as-is” basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied, as to any matter, including, but not limited to, warranty of fitness for purpose or merchant ability, exclusivity, or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement. This publication has not been reviewed nor is it endorsed by Carnegie Mellon University or its Software Engineering Institute. IDEALSM is a service mark of Carnegie Mellon University. T E A R D risk management, computer security, network security, corporate (physical) security, corporate and InfoSec as such trends waxed Rand waned over the years. More formal discussion has also occurred, such as a 2005 report titled “Convergence of Enterprise Security Organizations,” which the consulting firm Booz A Allen Hamilton issued in conjunction with the professional organizations ASIS, ISACA, and ISSA.10 The report looked at industry practices in the areas of security convergence at U.S.-based global organizations with annual revenues from $1 to $100 1 toward more convergence, including how organizations billion. And it identified key drivers seek to reduce costs and gain improved results as they reduce their reliance on physical assets 1 and make increased use of logical assets. This is occurring as organizations face increasing com9 as well as ongoing pressures to reduce costs. The report pliance and regulatory requirements concluded that while convergence1is a driving force, the real value remains in aligning security functions (whether converged or diverged) with the business mission. T A 2007 report prepared by the consulting firm Deloitte, which was commissioned by the S Alliance for Enterprise Security Risk Management, further explored the topic of convergence and identified enterprise risk management (ERM) as a value-adding approach that can gain superior alignment of security functions with the business mission while offering opportunities to lower costs.11 While that report limits its perspective to the two traditional facets of ERM 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 50 Chapter 2 control elements (i.e., IT security and physical security), it does identify the key approaches organizations are using to achieve unified ERM, including: ● Combining physical security and InfoSec under one leader as one business function ● Using separate business functions (each with a separate budget and autonomy) that report to a common senior executive ● Using a risk council approach to provide a collaborative approach to risk management where representatives from across the organization work collectively to set policy about assuming risk to the organization The Deloitte report proposes the risk council approach as the preferred mechanism and goes on to explore what makes effective ERM and how risk councils can be used to best effect. In 2007, the Open Compliance andVEthics Group commissioned a report to explore some of the complexities of GRC and howI these key functions might best be executed.12 The key finding of this report is that GRC functions (including those defined as part of ERM) are C often fragmented and often not integrated to the degree needed for streamlined operations. The report also identified the benefits K of increased levels of ERM along with integration and convergence of governance and compliance business functions. E The current accepted industry practices are toward achieving a synthesis of these approaches to reap R the benefits of ERM. This could mean the degree to which an organization integrates managerial S risk control facilities within that organization in order to command and control over the multiple address the business mission requirements , to manage risk and conform to compliance objectives. Today, most organizations of appreciable size have moved toward the maximum degree of convergence suitable for their form of governance while working within the limits of geoT We can therefore assume that there is a natural incligraphic and organizational dispersion. nation toward more security convergence. E A Planning for InformationRSecurity Implementation The CIO and CISO play importantDroles in translating overall strategic planning into tactical and operational InfoSec plans. Depending on the InfoSec function’s placement within the R organizational chart (discussed in detail in Chapter 5), the objectives of the CIO and A the CISO reports directly to the CIO. In that case, the the CISO may differ. Most commonly, CIO charges the CISO and other IT department heads with creating and adopting plans that are consistent with and supportive of the entire organizational strategy. The CIO must also 1 ensure that the various IT functional areas in the organization provide broad support for the plan and that no areas are omitted 1 or ignored. The CISO plays a more active role9in the development of the planning details than the CIO does. Consider the following job1description for the InfoSec department manager from Charles Cresson Wood’s Information Security Roles and Responsibilities Made Easy: ● T Creates a strategic InfoSec plan with a vision for the future of InfoSec at S InfoSec technology, this vision meets a variety Company X (utilizing evolving of objectives such as management’s fiduciary and legal responsibilities, customer expectations for secure modern business practices, and the competitive requirements of the marketplace) 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 51 View Point The Role of the Chief Security Officer By Robert Lang, Assistant Vice President for Strategic Security and Safety at Kennesaw State University The evolution of the role of the CSO should instead be called a “revolution” of the role of the CSO since that role has seen great change in recent years, to the betterment of all concerned. In prior years, the CSO position was usually dedicated to InfoSec, focusing mainly on the ever-present disaster recovery issue, which every company V using IT faces. In that role, the CSO’s primary concern was to maintain a continuity of I However, some CSOs also focused on physical secuoperations for the IT department. rity (personnel as well as the C physical plant and critical infrastructure), leading them to an interest in the IT needed to maintain those operations. K The main weakness in putting one person in charge of both the IT infrastructure E and the physical security of people and buildings is the inherent tendency to point fingers when incidents occur.RIf controls to mitigate loss fail or the plans to optimize incident response come up short, the situation usually devolves into nameS calling and accusations of professional malfeasance toward the other half of the , security program. Many people use the term “convergence” to describe the effort to merge the IT protection role and the physical asset protection and personnel safety role. This T trend has progressed rapidly in recent years. This is particularly noticeable in the convergence of the technical E means of control used by each side merging into common systems. For example, A video surveillance using security cameras and central monitoring stations is often implemented over the common networking infrastrucR ture from the IT department. As physical security programs using security guards D to optimize costs, they rely on advanced and inteand even sworn officers seek grated IT systems. This convergence is resisted by some, with claims of specialized R expertise or incompatible objectives. However, the trend toward security converA gence continues. By accepting the emerging reality that a CSO is no longer limited to being the chief physical security officer,1 the door is now open to enable more organizations to navigate their way to a security convergence that is the right way for them to 1 organize their efforts. Done properly, this will result in a seamless program that embraces the concept that 9all organization members—employee or contractor, security guard or secretary,1 salesman or manager—are responsible for what happens within the facility. T Best practices in business, government, and nonprofit organizations alike require a S collective responsibility for InfoSec, incident response, disaster recovery, and business (Continued) 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 52 Chapter 2 continuity. Most organizations resisting the convergence of these practices focus on one at the expense of the others. Eventually, the imperative to converge will become obvious. In the meantime, organizations that seek to “put on a show” of physical security, with security officers stationed at the front door, but that don’t try to integrate their physical and InfoSec are essentially waiting for the next crisis or incident to forced them to account for their lack of preparation. In each organization, the CSO’s new role awaits the emergence of a manager who has the power to invoke change, who looks at the broad view of the organization, and who is motivated to institutionalize control programs to limit the risk from the broad spectrum of security concerns. This new vision for converged security goes Vsign-in procedures. It seeks to integrate the best of well beyond guards, badges, and physical security and asset protection with InfoSec processes. Thus, it spans disaster I recovery, password protection, identity management, and all of the solutions that C risk from the myriad threats all organizations are deployed to manage operational face. The best organizations achieve K an integrated ERM program in which business continuity is not just a programE or a check box on an audit report, but an organizational culture making all processes in the organization seamlessly resilient and R recoverable. The CSO’s new role is that of S an agent of change. Without easing up on the roles they’ve been playing in physical security and safety, CSOs must integrate , those aspects that come from information protection. Finding the change agent needed to make this a reality is challenging. That person must have skills and understanding that embrace physical security and InfoSec while also having a T deep understanding of the threat environment. Creating an ERM and business E continuity culture will require definition or redefinition of the many processes A but with an understanding that no real change and procedures already in place, can occur until all the people R in the organization know what to do, how to do it, and are comfortable with reacting swiftly and diligently during any untoward D event. Does this new CSO have to beRequipped with all the detailed expertise and all the experience to perform each andAevery aspect of the job? In a perfect world, probably. In this world, the knowledge and experience may not need to be as deep or as detailed. The more important ability is a vision that transcends the arbitrary division 1 keeping an organization from being able to plan, of security responsibilities that are react, and recover from any untoward event. This person must do all that while 1 maintaining a security posture that, though unobtrusive, maintains an effective 9 degree of security and safety presence at all times. The CSO’s role is undergoing1significant change. Every new threat that emerges, each new risk that is identified,Tand every new technology that emerges will continue to change the role. A better tile for this role might therefore be “chief resilS ience officer,” since the quest for resilience is a key element of every successful organization and the key characteristic of the new CSO. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 53 Top-down approach— initiated by top management 2 CEO CFO CIO CISO VPSystems COO VPNetworks V Systems Network Mgr Mgr I Security Systems Network C Admin Admin Admin K Systems Network Security Tech Tech Tech E Bottom-up approach—initiated by R administrators and technicians S Figure 2-8 Approaches to security , implementation Security Mgr Copyright © 2014 Cengage Learning®. ● ● Understands the fundamental business activities performed by Company X T and, based on this understanding, suggests appropriate InfoSec solutions that E uniquely protect these activities A Develops action plans, schedules, budgets, status reports, and other top management communications intended to improve the status of InfoSec at Company X13 R Once the organization’s overallDstrategic plan has been translated into IT and InfoSec departmental objectives by the CIO, and then further translated into tactical and operational R plans by the CISO, the implementation of InfoSec can begin. A Implementation of InfoSec can be accomplished in two ways: bottom-up or top-down. These two basic approaches are illustrated in Figure 2-8. The bottom-up approach might 1 begin as a grass-roots effort in which systems administrators attempt to improve the security of 1 their systems. The key advantage of this approach is that it utilizes the technical expertise of the individual administrators who work with the information systems on a daily basis. System 9 and network administrators possess in-depth knowledge that can greatly enhance the state of1InfoSec in the organization. These professionals know and understand many of the threats to their systems and the mechanisms needed to protect them successfully. Unfortunately, this T approach seldom works, as it lacks a number of critical features, such as coordinated planning S from upper management, coordination between departments, and the provision of sufficient resources. The top-down approach, in contrast, features strong upper-management support, a dedicated champion, usually assured funding, a clear planning and implementation process, and the 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 54 Chapter 2 ability to influence organizational culture. High-level managers provide resources; give direction; issue policies, procedures, and processes; dictate the goals and expected outcomes of the project; and determine who is accountable for each of the required actions. The most successful top-down approach also incorporates a formal development strategy referred to as the systems development life cycle (SDLC). For any top-down approach to succeed, high-level management must buy into the effort and provide its full support to all departments. Such an initiative must have a champion—ideally, an executive with sufficient influence to move the project forward, ensure that it is properly managed, and push for its acceptance throughout the organization. Typically, the champion of a far-reaching InfoSec program is the CIO or another senior executive such as the vice president of information technology (VP-IT). Without this high-level support, many mid-level administrators fail to dedicate enough V resources to the project or dismiss it as a low priority. Involvement and support of end users I is also critical to the success of this type of effort. Because the process and outcome of the initiative most directly affect these individuals, they C process. Key end users should be assigned to design must be included in the InfoSec planning teams, known as joint application K design (JAD)—teams. A successful JAD must be able to survive employee turnover; it should not be vulnerable to changes in personnel. For this reaE be documented and integrated into organizational culson, the processes and procedures must ture. They must be adopted and promoted by the organization’s management. These attriR butes are seldom found in projects that begin as bottom-up initiatives. In order for the JAD S approach to be successful, the following key steps are recommended: , 1. Identify project objectives and limitations. 2. Identify critical success factors. T E activities. Define the schedule of workshop Select the participants. A Prepare the workshop material. R Organize workshop activities and D exercises. Prepare, inform, and educate the R14 workshop participants. Coordinate workshop logistics. A 3. Define project deliverables. 4. 5. 6. 7. 8. 9. The success of InfoSec plans can be enhanced by using the processes of system analysis and design, a discipline that is an integral part of most academic curricula in the field of IT. The 1 following sections offer a brief overview of this topic but do not replace a more detailed study of the discipline. 1 9 Systems Development Life Cycle Introduction to the Security 1 for the design and implementation of an information In general, an SDLC is a methodology system in an organization. A methodology is a formal approach to solving a problem based T on a structured sequence of procedures. Using a methodology ensures a rigorous process and S the desired final objective. Organizations often reuse a increases the likelihood of achieving successful methodology as they gain experience with it. This tried-and-true approach is combined with sound project management practices to develop key project milestones, allocate resources, select personnel, and perform the tasks needed to accomplish a project’s objectives. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 55 Sometimes, the SDLC is used to develop custom applications or deploy a purchased solution. A variation of this methodology, used to create a comprehensive security posture, is called the security systems development life cycle (SecSDLC). System projects may be initiated in response to specific conditions or combinations of conditions. The impetus to begin an SDLC-based project may be event-driven—that is, a response to some event in the business community, inside the organization, or within the ranks of employees, customers, or other stakeholders. Alternatively, it could be plan-driven—that is, the result of a carefully developed planning strategy. Either way, once an organization recognizes the need for a project, the use of a methodology can ensure that development proceeds in an orderly, comprehensive fashion. At the end of each phase, a structured review or reality check takes place, during which the team and its management-level reviewers decide whether the project should be continued, V discontinued, outsourced, or postponed until additional expertise or organizational knowledge is acquired. I The following sections illustrate an approach to the SecSDLC that uses a traditional waterfall C model” indicates that the work products of each phase fall model SDLC. The term “waterfall into the next phase to serve as its Kstarting point. While the SecSDLC may differ from the traditional SDLC in several specific activities, the overall methodology is the same. The SecSDLC E of specific threats and the risks that they represent as well process involves the identification as the subsequent design and implementation of specific controls to counter those threats and R manage the risk. The process turns InfoSec into a coherent program rather than a series of S responses to individual threats and attacks. Figure 2-9 shows the phases in the SecSDLC. , While there are a number of other models besides the waterfall model, the intent is to use the waterfall as an illustrative method of understanding the base requirements. The current recommended practice is to use a methodology that has a specific set of stages, which also T requires periodic review of previous efforts, and can, as needed, revert or redirect to a previous stage if progress is currentlyEunsatisfactory. The waterfall model is not intended as the definitive approach, nor is it represented as the only approach. Organizations may prefer A other models, like the Spiral, agile development, or rapid application development. Here, however, the waterfall approachR will serve as a basis for discussion. D R A Investigation Analysis 1 1 Physical Design 9 Implementation 1 Repeat when system no longer viable Maintenance T and Change S Logical Design Figure 2-9 SDLC Waterfall methodology Copyright © 2014 Cengage Learning®. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 56 Chapter 2 Investigation in the SecSDLC The investigation phase of the SecSDLC begins with a directive from upper management specifying the process, outcomes, and goals of the project as well as its budget and other constraints. Frequently, this phase begins with the affirmation or creation of security policies on which the security program of the organization is or will be founded. Teams of managers, employees, and consultants are assembled to investigate problems, define their scope, specify goals and objectives, and identify any additional constraints not covered in the enterprise security policy. (A more detailed treatment of InfoSec policy is presented in Chapter 4.) Finally, an organizational feasibility analysis determines whether the organization has the resources and commitment to conduct a successful security analysis and design. Unfortunately, many InfoSec projects are initiated in response to a significant security breach within an organization. While these circumstances may not be the ideal conditions under which to begin work on an V organization’s InfoSec posture, the SecSDLC team should emphasize that improvement is now under way. I Analysis in the SecSDLC In C the analysis phase, the team studies the documents from the investigation phase. The development team that was assembled during the investigation phase K conducts a preliminary analysis of existing security policies or programs along with documented current threats and associated controls. E This phase also includes an analysis of relevant legal issues that could affect the design of the security solution. Increasingly, privacy laws are a R major consideration when making decisions about information systems that manage personal S information. Recently, many state legislatures have made certain computer-related activities that were once unregulated illegal, so a detailed understanding of these issues is vital. , The risk management task also begins in this stage. Risk management is the process of identifying, assessing, and evaluating the levels of risk an organization faces—specifically, the threats to T information stored and processed by the organization. In the organization’s security and to the this context, it is helpful to ponder the E words of the famous Chinese general Sun Tzu: If you know the enemy and know A yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.RIf you know neither the enemy nor yourself, you will succumb in every battle.15 D The analysis process begins by getting R to know your adversary. In InfoSec, the adversary is the entire set of threats and attacks that your systems face as they provide services to your A organization and its customers. To better understand the analysis phase of the SecSDLC, you should know something about 1 the kinds of threats facing organizations in the modern, connected world of IT. In this context, a threat is an object, person, or other entity that represents a constant danger to an 1 asset. While each enterprise’s categorization of threats will vary, threats are relatively well researched and consequently fairly9 well understood. To better understand the numerous threats facing an organization, a 1scheme has been developed to group threats by their respective activities. This model consists of 12 general categories that represent real and T information and systems. Table 2-1 lists and briefly present dangers to an organization’s describes these 12 categories, which Sare discussed in the following sections. Compromises to Intellectual Property The owner of intellectual property has the right to control proprietary ideas as well as their tangible or virtual representations. Information 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security Threat Description/Example Compromises to intellectual property Software piracy or other copyright infringement Deviations in quality of service from service providers Fluctuations in power, data, and other services Espionage or trespass Unauthorized access and/or data collection Forces of nature Fire, flood, earthquake, lightning, etc. Human error or failure Accidents, employee mistakes, failure to follow policy Information extortion Blackmail threat of information disclosure Sabotage or vandalism Software attacks Technical hardware failures or errors Technical software failures or errors Technological obsolescence Theft Table 2-1 V I C K E R S , 57 Damage to or destruction of systems or information Malware: viruses, worms, macros, denial-of-services, or script injections Hardware equipment failure Bugs, code problems, loopholes, back doors Antiquated or outdated technologies Illegal confiscation of equipment or information Threats to information security16 Copyright © 2014 Cengage Learning®. T about an organization’s intellectual E property can be of great interest to its competitors and can be accidentally or deliberately disseminated to those outside the organization. A R Deviations in Quality of Service by Service Providers Sometimes, a product or service is not delivered as expected. The organization’s information system depends on the successful D operation of many interdependent support systems, including power grids, telecommunications networks, parts suppliers, service R vendors, and even the janitorial staff and garbage haulers. The threat of irregularities from A power utilities is common. When they occur they can lead to several types of power fluctuations: ● A voltage-level spike (a momentary increase) 1 ● A surge (a prolonged increase) 1 ● A momentary low voltage or sag ● A more prolonged drop in voltage, called a brownout ● ● 9 1 A complete loss of power for a moment, called a fault T A more lengthy loss, known as a blackout S Espionage or Trespass This category encompasses a broad array of electronic and human activities that can breach the confidentiality of information. When an unauthorized 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 58 Chapter 2 individual gains access to information that an organization is trying to protect, that access is categorized as a deliberate act of espionage or trespass. Forces of Nature Forces of nature (known as “force majeure”) or acts of God pose some of the most dangerous threats imaginable because they can occur with very little warning. These include fire, flood, earthquake, and lightning, as well as volcanic eruption and insect infestation. Human Error or Failure When people use information systems, mistakes sometimes happen. Inexperience, improper training, the making of incorrect assumptions, and other circumstances can cause these problems. People also fail to follow policy, whether through ignorance or intentionally. Such failures can also threaten an organization’s information assets. V I Information Extortion Information C extortion occurs when an attacker or formerly trusted insider steals information from a computer system and then demands compensation for its K return or for an agreement to not disclose the information. This practice is common in credit card number theft. E R Sabotage or Vandalism Individuals or groups may attempt to sabotage the operations of a computer system or business, S or they may perform acts of vandalism, either to destroy an asset or damage the organization’s , image. These threats range from petty vandalism by employees to Web page defacement by outside persons or groups. T E or software, or malware—to attack a vulnerable syssoftware—often called malicious code tem. Some of the more common types of malicious code are viruses, worms, Trojan horses, A logic bombs, and back doors. R Technical Hardware Failures D or Errors Technical hardware failures or errors occur when a manufacturer distributes equipment containing a known or unknown flaw. These R defects can cause the system to perform outside of expected parameters, resulting in unreliable service or lack of availability. A Software Attacks Deliberate software attacks occur when an individual or group designs Technical Software Failures 1or Errors Technical software failures or errors occur when a developer distributes software with known or unknown hidden faults. These faults 1 conditions. may range from bugs to untested failure 9 1 Technological Obsolescence When the infrastructure becomes antiquated or outdated, it leads to unreliable and untrustworthy systems that may be difficult to maintain without T extensive investment of resources. S Theft Theft is the illegal taking of another’s property, whether physical, electronic, or intellectual. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 59 The preceding list of threats may be manifested as attacks against the assets of the organization. An attack is an act or event that exploits a vulnerability. A vulnerability is an identified weakness of a controlled information asset and is the result of absent or inadequate controls. An attack is accomplished by a threat agent—the specific instance of a threat—that damages or steals an organization’s information or physical assets. An exploit is a technique or mechanism used to compromise an information asset. A technical attack may use an exploit to compromise a controlled system, whereas a nontechnical attack may result from natural events or less sophisticated approaches. Here are some types of technical attacks: ● Back door—A feature left behind by system designers or maintenance staff or installed by malicious code to allow quick access at a later time, bypassing access controls V ● Brute force—The application of computing and network resources to try every possiI ble combination of values in order to compromise a control, read encrypted data, or C crack a password ● ● Buffer overflow—An application error that occurs when more data is sent to a K buffer than it can handle, often performed intentionally to force a system E to interpret data as system commands or to overwhelm a system’s ability to R process input Denial-of-service (DoS) and S distributed denial-of-service (DDoS)—The transmission of a large number of connection or information requests to a target, thereby blocking , other, legitimate traffic; called a DDoS when multiple systems are organized into a simultaneous attack ● Dictionary—An attempt to T narrow the field of possible password values by selecting specific accounts as targets and/or using a list of common values E (the dictionary) with which to guess, rather than simply trying random combinations A ● DNS cache poisoning—The Rreplacement of legitimate information in a DNS server with a Web site or other Internet location the attacker wants the user to view; also D known as a “redirect attack” ● ● R or attack, resulting in a waste of time and resources Hoax—False report of a threat A of large quantities of e-mail to the target in an effort to Mail bombing—The routing overwhelm the system ● Malicious code—The execution of viruses, worms, Trojan horses, and active Web 1 scripts with the intent to destroy, steal, or deny access to information assets ● Man-in-the-middle—The commandeering of a network connection session so that an attacker can read and perhaps 9 modify the data transferred in that connection; one approach to this end is also known as a “TCP hijacking attack” ● Password crack—An attempt to reverse-calculate or guess a password; includes T attacks, and man-in-the-middle attacks dictionary attacks, brute force 1 1 ● S engineering attack in which the attacker uses an e-mail Phishing—A specialized social or forged Web site to attempt to extract personal information from a user 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 60 Chapter 2 ● Sniffer—A program or device that can monitor and intercept data traveling over a network; a legal tool when used by the network owners to regulate traffic, an illegal tool when used as part of an attack ● Social engineering—The use of social skills to convince people to reveal access credentials or other valuable information ● Spam—Unsolicited commercial e-mail, the electronic equivalent of junk mail; often used as a denial of service effort, an element of a compromise that introduces a malware attack, or an effort to waste organizational resources ● Spear phishing—A targeted social engineering attack in which the attacker crafts an individualized letter or e-mail to attempt to extract personal information from an unsuspecting user ● Spoofing—A technique used to gain unauthorized access to computers, whereby the I intruder sends network-level messages to a computer with an IP address indicating that the message is coming from aCtrusted host ● Timing—An attack that enables an attacker to extract secrets maintained in a security K system by observing the time it takes the system to respond to various queries V E The last step in “knowing the enemy” is to find some method of prioritizing the risk posed by each category of threat and its R related methods of attack. This can be done by adopting threat levels from an existing study S of threats or by creating your own categorization of threats for your environment, based on scenario analyses. , The next task in the analysis phase is to assess the relative risk for each of the information assets via a process called risk assessment or risk analysis, both of which are components of risk management. Risk management T is the part of the SecSDLC analysis phase that identifies vulnerabilities in an organization’s information system and takes carefully reasoned steps to assure the confidentiality, integrity,Eand availability of all components in the organization’s information system. Risk management A is covered in detail in Chapter 9. Risk assessment assigns a comparative R risk rating or score to each specific information asset. While this number does not mean anything in absolute terms, it is useful in gauging the relaD information asset and allows you to make comparative risk introduced by each vulnerable tive ratings later in the risk control R process. Risk assessment is covered in detail in Chapter 8. Design in the SecSDLC The A SecSDLC design phase consists of two distinct phases: the logical design and the physical design. In the logical design phase, team members create and develop the blueprint for security, and they examine and implement key policies that influence later decisions. At this stage, 1 critical contingency plans for incident response are developed. Next, a feasibility analysis determines whether the project should continue in-house or 1 should be outsourced. 9 In the physical design phase, team members evaluate the technology needed to support the 1 solutions, and agree on a final design. The security security blueprint, generate alternative blueprint may be revisited to keep T it synchronized with the changes needed when the physical design is completed. Criteria for determining the definition of successful solutions are S also prepared during this phase, as are designs for physically securing the technological solutions. At the end of this phase, a feasibility study should determine the readiness of the organization for the proposed project, and then the champion and users should be presented 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 61 with the design. At that point, the interested parties have a chance to approve (or not approve) the project before implementation begins. During the logical and physical design phases, a security manager may seek to use established security models to guide the design process. Security models provide frameworks for ensuring that all areas of security are addressed; organizations can adapt or adopt a framework to meet their own InfoSec needs. A number of InfoSec frameworks have been published; several are discussed in detail in Chapters 5 and 6 and in the appendix. One of the design elements (or, in some projects, redesign elements) of the InfoSec program is the organization’s InfoSec policy. The meaning of the term “security policy” differs depending on the context in which it is used. Governmental agencies, for example, discuss security policy in terms of national security and interaction with foreign states. In another context, a security policy can beVpart of a credit card agency’s method of processing credit card numbers. In general, a security policy consists of a set of rules that protects an organiI zation’s assets. An information security policy provides rules for the protection of the inforCAs stated in Chapter 1, the task of the InfoSec program is mation assets of an organization. to protect the confidentiality, integrity, and availability of information and information sysK tems, whether in transit, storage, or processing. This task is accomplished by the application of policy, education and trainingEprograms, and technology. Management must define three types of security policies, as specified R in the National Institute of Standards and Technology’s (NIST’s) “Special Publication 800-100”: general or enterprise InfoSec policy (EISP), issueS and systems-specific security policies (SysSPs). Each of specific security policies (ISSPs), these is covered in detail in Chapter , 4. Another integral part of the InfoSec program is the SETA program, discussed in detail in Chapter 5. Part of the CISO’s responsibilities, the SETA program is a control measure designed to reduce accidentalTsecurity breaches by employees. As mentioned earlier, employee errors represent one of Ethe top threats to information assets; for this reason, it is well worth expending resources to develop programs to combat this problem. SETA proA grams are designed to supplement the general InfoSec education and training programs that R dictates that the SDLC include user training during the are already in place. Good practice implementation phase. Employee training should be managed to ensure that all employees D are trained properly. R The design phase continues with the formulation of the controls and safeguards used to proA threats. The terms control and safeguard are often used tect information from attacks by interchangeably. There are three categories of controls: managerial controls, operational controls, and technical controls. 1 Managerial controls cover security processes that are designed by the strategic planners and 1 executed by the security administration of the organization. They set the direction and scope of the security process and provide 9 detailed instructions for its conduct. Managerial controls address the design and implementation of the security planning process and security pro1 gram management. They also address risk management and security controls reviews (discussed in detail in Chapters 8 and T 9). Management controls further describe the necessity and scope of legal compliance and the maintenance of the entire security life cycle. S Operational controls deal with the operational functionality of security in the organization. They cover detailed/tactical management functions and lower-level planning, such as disaster recovery and incident response planning (IRP). In addition, these controls address personnel 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 62 Chapter 2 security, physical security, and the protection of production inputs and outputs. Operational controls also provide structure to the development of education, training, and awareness programs for users, administrators, and management. Finally, they address hardware and software systems maintenance and the integrity of data. Technical controls address technical approaches used to implement security in the organization. Operational controls address specific operational issues, such as control development and integration into business functions, while technical controls must be selected, acquired (made or bought), and integrated into the organization’s IT structure. Technical controls include logical access controls, such as those used for identification, authentication, authorization, and accountability. Another element of the design phase is the creation of essential preparedness documents. Managers in the IT and InfoSec communities engage in strategic planning to assure the conV tinuous availability of the organization’s information systems. In addition, managers of the organization must be ready to respond when an attack occurs. The various plans for hanI dling attacks, disasters, or other types of incidents include business continuity plans, disaster C response plans (IR plans). These are often known recovery plans (DRPs), and incident collectively as contingency plans. K In large, complex organizations, each of these named plans may represent separate but related planning functions, differing in scope, applicability, E the security administrator (or systems administrator) and design. In a small organization, may have one simple plan, whichRconsists of a straightforward set of media backup and recovery strategies and a few service agreements from the company’s service providers. The S sad reality is that many organizations have a level of response planning that is woefully deficient. , Incident response, disaster recovery, and BCP are all components of CP. CP is the overall planning conducted by the organization to prepare for, react to, and recover from events T that threaten the security of information assets in the organization, and to provide for the E subsequent restoration to normal business operations. Organizations need to develop DRPs, IR plans, and business continuity plans as subsets of the overall CP. IRP is the planning proA cess associated with the identification, classification, response, and recovery from an incident. DRP is the planning process R associated with the preparation for and recovery from a disaster, whether natural or human-made. BCP is the planning process associated with D ensuring that critical business functions continue if a catastrophic incident or disaster occurs. R These critical building blocks of response planning are presented in Chapter 3. A The design phase next addresses physical security, which requires the design, implementation, and maintenance of countermeasures to protect the physical resources of an organization. Physical resources include people, hardware, and the supporting system elements and 1 resources associated with the management of information in all its states—transmission, storage, and processing. Many technology-based controls can be circumvented if an attacker 1 gains physical access to the devices being controlled. For example, when employees fail to 9 secure a server console, the operating system running on that computer becomes vulnerable to attack. Some computer systems 1are constructed in such a way that it is easy to steal the hard drive and the information it contains. As a result, physical security should receive as T much attention as logical security in the security development life cycle. For further discussions on the dimension of physicalS security, consult one of the many fine text, trade, or reference books on the subject. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 63 Implementation in the SecSDLC The SecSDLC implementation phase is similar to the corresponding phase of the traditional SDLC. Security solutions are acquired (made or bought), tested, implemented, and retested. Personnel issues are evaluated and specific training and education programs are conducted. Finally, the entire tested package is presented to upper management for final approval. The InfoSec systems software or application systems selection process is not appreciably different from that for general IT needs. Vendors should be provided with detailed specifications, and they should in turn provide detailed information about products and costs. As in IT system implementation, it is essential to establish clear specifications and rigorous test plans to assure a high-quality implementation. Perhaps the most important element of the implementation phase is the management of the V is a process that underlies all phases of the SecSDLC. The project plan. Project management execution of the project plan proceeds in three steps: I 1. Planning the project C 2. Supervising the tasks and action K steps within the project plan 3. Wrapping up the project plan E The project plan can be developed R in any number of ways. Each organization must determine its own project management methodology for IT and InfoSec projects. Whenever posS the organizational practices of project management. For sible, InfoSec projects should follow organizations that have not established clearly defined project management practices, the , following pages supply general guidelines on recommended practices. Project management and its relationship to InfoSec were described in detail in Chapter 1. T of technical and nontechnical requirements. For this reason, InfoSec is a field with a vast array the project team should include individuals who are experienced in one or more requirements of E both the technical and nontechnical areas. Many of the same skills needed to manage and impleA ment security are needed to design it. Members of the development team fill the following roles: R ● Champion—A senior executive who promotes the project and ensures its support, both D at the highest levels of the organization financially and administratively, ● Team leader—A project manager (perhaps a departmental line manager or staff unit R manager) who understands project management, personnel management, and InfoSec A technical requirements ● Security policy developers—Individuals who understand the organizational culture, existing policies, and requirements for developing and implementing successful policies 1 ● Risk assessment specialists—Individuals who understand financial risk assessment 1 techniques, the value of organizational assets, and the security methods to be used ● Security professionals—Dedicated, trained, and well-educated specialists in all aspects 1 and nontechnical standpoints of InfoSec from both technical ● 9 T Systems administrators—Individuals with the primary responsibility for administering the systems that house the information used by the organization S ● End users—The individuals whom the new system will most directly affect; ideally, a disparate group of users from various departments and levels, and with varying 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 64 Chapter 2 degrees of technical knowledge, to assist the team in applying realistic controls in ways that do not disrupt the essential business activities they seek to safeguard Just as each potential employee and each potential employer looks for the best fit during the hiring process, so each organization should thoroughly examine its options when staffing the InfoSec function. When implementing InfoSec in an organization, many human resource issues must be addressed. First, the entire organization must decide how to position and name the security function within the organization. Second, the InfoSec community of interest must plan for the proper staffing (or adjustments to the staffing plan) for the InfoSec function. Third, the IT community of interest must understand how InfoSec affects every role in the IT function and adjust job descriptions and documented practices accordingly. Finally, the general management community of interest must work with the InfoSec professionals to integrate solid InfoSec concepts into the personnel management practices V of the organization as a whole. It takes a wide range of professionals I to support a diverse InfoSec program. Because a good security plan is initiated from the top down, senior management is the key component and C vital force driving the successful implementation of an InfoSec program. To develop and execute specific security policies and procedures, K additional administrative support is required. Finally, technical expertise is necessary to implement the details of the security operation. E R Chief information officer (CIO)—Senior technology officer responsible for aligning the S strategic efforts of the organization and integrating them into action plans for the information systems or data-processing division of the organization , Here are more precise descriptions of the various roles involved in InfoSec: ● ● ● Chief security officer (CSO)—This job title may be used in lieu of “CISO”; however, when it is used to refer to a role that is superior to the CISO, this is the individual responsiT and information resources within the organization ble for the protection of all physical E (CISO)—The individual responsible for the assessChief information security officer ment, management, and implementation of information-protection activities in the A organization R ● Security managers—The individuals accountable for ensuring the day-to-day operation D of the InfoSec program, accomplishing the objectives identified by the CISO and resolving issues identified by R technicians ● Security technicians—Technically A qualified individuals who are tasked with configuring firewalls and intrusion detection systems (commonly referred to as IDSs), implementing security software, diagnosing and troubleshooting problems, and coordinating with systems and network administrators to1ensure that security technology is properly implemented ● Data owners—Individuals who 1 control (and are therefore responsible for) the security and use of a particular set of information. Data owners may rely on custodians for the practical aspects of protecting9their information, specifying which users are authorized to access it, but they are ultimately responsible for it 1 ● Data custodians—Individuals who work directly with data owners and are responsible T for the storage, maintenance, and protection of the information ● Data users—Systems users who work with the information to perform their daily jobs supporting the mission of the organization, everyone in the organization being responsible for the security of data (and thus playing an InfoSec role) S 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. Planning for Security 65 All these roles are presented in greater depth in Chapter 11. Many organizations seek employees or contractors who have professional certifications so that they can more easily identify these individuals’ proficiency. A thorough discussion of InfoSec industry certification approaches and programs is also provided in Chapter 11. Maintenance in the SecSDLC The maintenance and change phase, though last, is perhaps the most important, given the flexibility and persistence of many of the threats facing the modern organization. Today’s InfoSec systems need constant monitoring, testing, modifying, updating, and repairing. Traditional applications systems that are developed within the framework of the SDLC are not designed to anticipate a vicious attack that requires some degree of application reconstruction as a normal course of operation. In security, the battle for stable, reliable Vsystems is a defensive one. As new threats emerge and old threats evolve, the InfoSec profile of an organization requires constant adaptation to prevent I sensitive data. threats from successfully penetrating C Once the InfoSec program is implemented, it must be operated, properly managed, and kept up-to-date by means of established K procedures. If the program is not adjusting adequately to the changes in the internal or external environment, it may be necessary to begin the cycle E R S INTERNAL MONITORING , EXTERNAL MONITORING Fingerprinting Architectural Review Boards T E Internal Environment A Monitoring R D Information Security ProgramR Planning AInformation Security Footprinting IT Change Control READINESS AND REVIEW Public Internet Sources External Environment Monitoring IDS Vendors CERT Organizations Projects IRP-DRP-BCP Readiness and Review PLANNING AND RISK1 ASSESSMENT 1 IT Projects Rehearsals and War Games 9 1 T S Operational Risk Assessments Remediation VULNERABILITY ASSESSMENT AND REMEDIATION Vulnerability DB Policy Review Risk, Threat, and Attack DB Internet Vulnerability Assessment Intranet Vulnerability Assessment Platform Security Validation Wireless Vulnerability Assessment Modem Vulnerability Assessment Figure 2-10 Maintenance model Copyright © 2014 Cengage Learning®. 9781305147263, Management of Information Security, Fourth Edition, Whitman/Mattord - © Cengage Learning. All rights reserved. No distribution allowed without express authorization. 2 66 Chapter 2 again. The CISO determines whether the InfoSec group can adapt adequately and maintain the InfoSec profile of the organization, or whether the macroscopic process of the SecSDLC must start anew to redevelop a fundamentally different InfoSec profile. It is less expensive and more effective when an InfoSec program is able to deal with change. Even when an InfoSec program is adapting and growing, those processes of maintenance and change mirror the overall process of the SecSDLC, differing only in scope. As deficiencies are found and vulnerabilities pinpointed, projects to maintain, extend, or enhance the program follow the SecSDLC steps. Therefore, for maintenance, the steps include investigation, analysis, design, and implementation. Whereas a systems management model is designed to manage and operate systems, a maintenance model is intended to complement a systems management model and focus those ongoing maintenance efforts that are neededVto keep systems useable and secure. Figure 2-10 presents one recommended approach for dealing with InfoSec. The model consists of five subject areas I or domains, as described in the following sections. C K awareness of new and emerging threats, threat agents, shown in Figure 2-10 is to provide early vulnerabilities, and attacks, thereby E enabling the creation of an effective and timely defense. R objective of internal monitoring is to maintain an Internal Monitoring The primary informed awareness of the state of S all the organization’s networks, information systems, and InfoSec defenses. This status must be communicated and documented, especially the status of , the parts of information systems that are connected to the external network. External Monitoring The objective of external monitoring within the maintenance model Planning and Risk AssessmentT The primary objective of planning and risk assessment is to keep a wary eye on the entire InfoSec program. This is achieved in part by identifying and planning ongoing InfoSec activitiesEthat further reduce risk. Also, the risk assessment group identifies and documents risks introduced by both IT projects and InfoSec projects. FurtherA more, it identifies and documents risks that may be latent in the present environment. R D Vulnerability Assessment and Remediation The primary objective of vulnerability assessment and remediation is the R identification of specific, documented vulnerabilities and their timely remediation. This is accomplished by: A ● ● ● Using documented vulnerability assessment procedures to safely collect intelligence about networks (internal and public-facing), platforms (servers, desktops, and process control), dial-in modems, and1wireless network systems 1 Documenting background information and providing tested remediation procedures for the reported vulnerabilities 9 Tracking, communicating, and reporting to management the itemized facts about the dis1 covered vulne...
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: DATA SECURITY

1

Data Security
Institutional Affiliation
Student Name
Date

DATA SECURITY

2
Roles of the CISO and the CIO

A chief information security officer is the manager responsible for or overseeing an
organization's data and information security. Traditionally the role got narrowly defined along
these lines. However, nowadays, these officers take more expansive roles within an organization.
Understanding the role of a chief information security officer requires learning and familiarizing
with the daily responsibilities that fall under this umbrella while noting that a job is precisely
similar to another (Hooper et al., 2016). Chief information security is responsible for all security
operations within an organization. Security operations include immediate threats and risks, realtime analysis, and mitigation strategies in case of an incident.
Another significant responsibility of this officer is cyber intelligence and managing cyber
risks. The chief information security officer stays ahead of emerging security threats and helps
executives remain aware of security issues that might arise from the various business process.
Additionally, this officer is responsible for fraud and data loss prevention. The chief information
security officer ensures that business users do not steal or misuse information and data resources.
Further, the officer is in charge of access and identity management, which ensures that only
authorized individuals access restricted systems and data (Hooper et al., 2016). Finally, another
important responsibility of the chief information security officer is the organization’s security
architecture, including acquiring, implementing, and planning out security software and
hardware.
A chief information officer is a title assigned to an individual within an organization in
charge of computer systems and information technology strategies vital to supporting the
company's unique goals and objectives. Traditionally, the chief information officer got majorly
focused on more technical projects within the organization (Hooper et al., 2016). However, chief

DATA SECURITY

3

information officers are getting more critical to an organization today. They can get viewed as
significant contributors to company goals as the analysis, transmittal, and storage of information
and data gets more critical across organizations.
Chief information officers in large companies can assign overseeing daily information
technology operations to a deputy and further depend on a specialist team to manage specific
information technology areas. Among the significant responsibilities of chief information, officer
includes collaborating, innovating, and balancing the information technology budget while
motivating information technology staff with the organization. However, the roles and
responsibilities of chief information officers continue to evolve rapidly and vary between
organizations as they strive to...

Related Tags