




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、國(guó)際信息平安技術(shù)規(guī)范開展 ISO/IEC JTC 1/SC 27/WG 4江明灶 Meng-Chow Kang, CISSP, CISAConvener, Security Controls & Services Working Group (WG 4), ISO/IEC JTC 1 SC 27 (Security Techniques)Chief Security AdvisorMicrosoft Great China RegionWG1 ISMS StandardsChair Ted HumphreysVice-Chair Angelika PlateWG4 Security Contr
2、ols & ServicesChair Meng-Chow KangWG2Security TechniquesChair Prof. K NaemuraWG3Security EvaluationChair Mats OhlinWG5Privacy Technology, ID management and BiometricsChair Kai RannenbergISO/IEC JTC 1 SC 27Chair Walter FumyVice Chair Marijike de SoeteSecretary Krystyna Passia27000Fundamental & Vocabu
3、lary27004ISMS Measurement27005ISMS Risk Management27006Accreditation Requirements27001ISMS Requirements27003ISMS Implementation GuidanceInformation Security Management Systems (ISMS)27002Code of PracticeISMSFamilyRisk manage; Prevent occurrence; Reduce impact of occurrencePrepare to respond; elimina
4、te or reduce impactSC27 WG4 Roadmap FrameworkInvestigate to establish facts about breaches; identify who done it and what went wrongUnknown and emerging security issuesKnown security issuesSecurity breaches and compromisesNetwork Security (27033)TTP Services SecurityICT Readiness for Business Contin
5、uity (27031)SC27 WG4 RoadmapApplication Security (27034)Forensic InvestigationCybersecurity (27032)Includes ISO/IEC 24762, Vulnerability Mgmt, IDS, & Incident Response related standardsAnti-Spyware, Anti-SPAM, Anti-Phishing, Cybersecurity-event coordination & information sharingISO 18028 revision; W
6、D for new Part 1, 2 & 3; New Study Period on Home Network Security1st WD available for commentsFuture NPNew Study Period proposed; Includes outsourcing and off-shoring security6Gaps between Readiness & ResponseIT Security, BCP, and DRP Planning & ExecutionProtectDetectReact/ResponseIT Security Plann
7、ingActivateBCPActivate DCRPPlanPrepare & TestPlanPrepare & TestBusiness Continuity PlanningDisaster Contingency & Recovery PlanningDisasterEventsIT SystemsFailuresICT Readiness for Business ContinuityWhat is ICT Readiness?Prepare organization ICT technology (infrastructure, operation, applications),
8、 process, and people against unforeseeable focusing events that could change the risk environmentLeverage and streamline resources among traditional business continuity, disaster recovery, emergency response, and IT security incident response and managementWhy ICT Readiness focus on Business Continu
9、ity?ICT systems are prevalent in organizationsICT systems are necessary to support incident, business continuity, disaster, and emergency response and management needsBusiness continuity is incomplete without considering ICT systems readinessResponding to security incident, disasters, and emergency
10、situations are about business continuityImplications of ICT ReadinessOperational StatusTimeIncidentCurrent IHM, BCM and DRP focus on shortening period of disruption and reducing the impact of an incident by risk mitigation and recovery planning.T=0T=iT=kT=lT=j100%x%y%z%Early detection and response c
11、apabilities to prevent sudden and drastic failure, enable gradual deterioration of operational status and further shorten recovery time. Before implementation of IHM, BCM, and/or DRPAfter implementation of IHM, BCM, and/or DRPAfter implementation of ICT Readiness for BCICT Readiness for Business Con
12、tinuityRe-proposed as single-part standard (Nov 07)Structure (DRAFT, Document SC27N6274)IntroductionScopeNormative ReferencesTerms and DefinitionsOverview (of ICT Readiness for Business Continuity)ApproachBased on PDCA cyclical modelExtend BCP approach (using RA, and BIA)Introduce Failure Scenario A
13、ssessment (with FMEA)Focus on Triggering EventsManagement of IRBC ProgramP2P File SharingInstant MessagingBloggingWeb 2.0 Cybersecurity IssuesSplogs, SPAM,Search Engine PoisoningSpywareTrojansVirus/WormsSPAMExploit URLsPhishingTrojansVoIP/VideoPrivacy &Information BreachGlobal Threat LandscapePreval
14、ence of Malicious Software by CategoryWhat is CybersecurityDefinition of Cybersecurity overlaps Internet/network securityNature Cybersecurity issuesOccurs on the Internet (Cyberspace)Global nature, multiple countries, different policy and regulations, different focusMultiple entities, simple client
15、system to complex infrastructureWeakest link and lowest common denominator prevailHighly creative landscape always changingCybersecurityCybersecurity concerns the protection of assets belonging to both organizations and users in the cyber environment. The cyber environment in this context is defined
16、 as the public on-line environment (generally the Internet) as distinct from “enterprise cyberspace (closed internal networks specific to individual organizations or groups of organizations).Guidelines for Cybersecurity“Best practice guidance in achieving and maintaining security in the cyber enviro
17、nment for audiences as defined below.Address the requirement for a high level of co-operation, information-sharing and joint action in tackling the technical issues involved in cybersecurity. This needs to be achieved both between individuals and organizations at a national level and internationally
18、.The primary audiences for the standard are:Cyberspace service providers such as Internet Service Providers (ISPs), web service providers, outsourcing and data back-up service providers, on-line payment bureaux, on-line commerce operators, entertainment service providers and others.Enterprises inclu
19、ding not only commercial organizations but also non-profit bodies and other organizations in fields such as healthcare and education.Governments.End users, while highly important, are not seen as a key target audience as they are not in general direct users of international standards.The standard wi
20、ll not offer technical solutions to individual cybersecurity issues, which are already being developed by other bodies as described below.14Network SecurityRevision of ISO/IEC 18028Re-focus, re-scoping, and new partsPart 1 Guidelines (Overview, Concepts, Principles)Part 2 Guidelines for Design and I
21、mplementationPart 3 Reference Networking Scenarios: Risks, Design, Techniques, and Control IssuesPart 4 Security communications between networks using security gatewaysPart 5 Securing remote accessPart 6 Security communications between networks using Virtual private networkPart 7 to-be-named “techno
22、logy topicSoftware Vulnerability Disclosures OS versus application vulnerabilitiesApplication vulnerabilities continued to grow relative to operating system vulnerabilities as a percentage of all disclosures during 2006Supports the observation that security vulnerability researchers may be focusing
23、more on applications than in the pastGuidelines for Application SecurityReduce security problems at the application layersEliminate common weaknesses at code and process levelsStrengthen security of code base improve application security and reliabilityMulti-parts standards, includingCode Security C
24、ertificationProcess Security CertificationCode SecurityTesting and certification per major release of applicationProcess SecuritySecurity Development LifecycleAssure security of code from design to operation, including minor releases, patch development & releaseFocus on Web-based applications (major
25、 problem areas)Guidelines for Application SecuritySpecify an application security life cycle, incorporating the security activities and controls for use as part of an application life cycle, covering applications developed through internal development, external acquisition, outsourcing/offshoring1, or a hybrid of these approaches.Provide guidance to business and IT managers, developers, auditors, and end-users to ensure that the desired level of security is attained in business applications in line with the requirements of the organizations Information Security Management Syste
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 垃圾焚燒發(fā)電行業(yè)報(bào)告
- 三農(nóng)村水資源管理方案手冊(cè)
- 三農(nóng)市場(chǎng)推廣策略與技巧指南
- 生態(tài)旅游度假區(qū)開發(fā)項(xiàng)目可行性研究報(bào)告
- 框架、技術(shù)與最佳實(shí)踐指南
- 餐飲連鎖店運(yùn)營(yíng)管理及拓展策略
- 施工安全管理考核細(xì)則
- 發(fā)改委立項(xiàng)可行性分析報(bào)告
- 農(nóng)業(yè)技術(shù)推廣創(chuàng)新模式指南
- 低空經(jīng)濟(jì)合作
- 《ISO 55013-2024 資產(chǎn)管理-數(shù)據(jù)資產(chǎn)管理指南》專業(yè)解讀和應(yīng)用指導(dǎo)材料(雷澤佳編制-2024C0)【第1部分:1-130】
- 軟件資格考試嵌入式系統(tǒng)設(shè)計(jì)師(基礎(chǔ)知識(shí)、應(yīng)用技術(shù))合卷(中級(jí))試卷與參考答案(2024年)
- 2024年下半年杭州黃湖鎮(zhèn)招考編外工作人員易考易錯(cuò)模擬試題(共500題)試卷后附參考答案
- 浙江省第五屆初中生科學(xué)競(jìng)賽初賽試題卷
- 雷鋒精神在2024:新時(shí)代下的學(xué)習(xí)
- 竣工驗(yàn)收流程培訓(xùn)課件
- 2024年上海中考化學(xué)終極押題密卷三含答案
- DB14∕T 1334-2017 波形鋼腹板預(yù)應(yīng)力混凝土組合結(jié)構(gòu)橋梁懸臂施工與驗(yàn)收規(guī)范
- ECharts數(shù)據(jù)可視化課件 第4章 雷達(dá)圖、旭日?qǐng)D和關(guān)系圖
- 幸福女人課件教學(xué)課件
- 天翼云從業(yè)者考試復(fù)習(xí)題及答案
評(píng)論
0/150
提交評(píng)論