Information Security 101: What your business needs to know
Alistair Ross
The Essentials of Information Security
In this presentation we are going to cover the essentials of how to protect your intellectual property, primarily when it relates to information that your business depends upon. From a technical perspective, only a smaller part of this presentation deals with the tools to protect your business; although the bias of this guide will be towards Linux tooling, the principals relate to any computer system and operating system. Desktops/Workstations, Mac, Windows or Linux; securing every part of your workplace ICT is incredibly important. Almost all businesses rely on ICT as the bloodline to all segments of its operations.
Format and intended audience
This guide is in presentation format, so that you may present it to workplace colleagues who would like training or to grow knowledge in security principles, methods and tooling.
The intended audience is for ICT professionals in businesses, but is still appropriate to anyone interested in IS (Information Security).
If you would like to see the slide outline, scroll to below the presentation.
Let Alistair present it for you!
If you are interested in the having the author providing your business an engaging presentation, training, consultation or support on any of the topics covered in this presentation, or with business information systems in general (sp. Linux and Open Source) then please get in touch. Alistair has years of presentation skills and is a senior technical leader, having worked for reputable business like Amazon and GE as well as medium sized companies worldwide.
Slide Deck
This slideshow could not be started. Try refreshing the page or viewing it in another browser.
Information Security 101
What your business needs to know
A guide to the why’s, the how’s and the what’s of protecting your business against information security risks.
Who would be interested in exploiting my ICT systems?
What sort of attacks can be made?
How can I protect against each type of attack?
Tooling
Planning for the worst
Further Reading.
Why is Information Security Important?
The harm it can cause your business:
Loss of intellectual property.
Loss of reputation, market share and brand.
Extortion & Ransom (including loss of direct bank funds).
Risk Profiling
Firstly, let’s discuss the the risk profile in your business.
From your business owner’s perspective:
Your information is everything, it is the lifeblood of modern business.
The interest profile in your infrastructure:
The value of ‘free’ compute power to attackers.
Things you should know 1/4:
Definition of Information Security, the CIA triad:
Confidentiality: Protection of your information from unauthorised access.
Integrity: Information is as it should be, not modified in an unauthorised (or even mistaken) way.
Availability: Ensuring the information you have is always available.
Things you should know 2/4:
The three main elements to security are:
People
Process
Technology
Things you should know 3/4:
Your organisation should have an IS policy.
Although, remember that if you make it onerous on your staff, they will work around it at every opportunity. Security is all about effective compromise.
Simply having a firewall is not the answer: Defence in depth is needed.
It is a matter ofwhen, not if you get exploited.
Things you should know 4/4:
Trust. Your business is built on it, yet:
Your staffandvendors can be hostile!
They may not be aware of an attempt upon them.
They can install software, open docs & go to sites that do ‘bad things’.
The may intentionally do bad.
Just because it’s in the Cloud does not mean it is secure. It is only as good as the people that put it in the cloud, and the company operating the cloud service.
Who would be interested in exploiting my ICT systems?
Targeted Attackers
Staff/Disgruntled ex-staff
Hired hitters
Opportunists
Non Targeted Attackers
Script Kiddies
Bots/Spambots.
What sort of attacks can be made?
Social Engineering:
Phishing
People based data exit (intentional and non-intentional). – Data leaving out of the door (and into the cloud).
Ransom/Blackmail.
In person, by post, personal e-mail and telephone.
HR and IT ops: Onboarding, offboarding and hiring.
Getting non IT staff to report any suspected security risk or breach.
Get your executive board to provide guidance on data classification; use a RASCI matrix which takes into account the value of each level of asset, ordered by criticality to the business operation and reputation.
Inventory all the things (Software, Hardware, IP addresses, People )
What is authorised vs what is not authorised.
For developers: Code review, Use tooling.
Policies and Training your staff (cont…)
IT Staff must routinely schedule security audits (daily, weekly. Monthly may be too late!). Consider:
HR and IT ops: Onboarding, offboarding and hiring.
Getting non IT staff to report any suspected security risk or breach.
Get your executive board to provide guidance on data classification; use a RASCI matrix which takes into account the value of each level of asset, ordered by criticality to the business operation and reputation.
Inventory all the things (Software, Hardware, IP addresses, People )
What is authorised vs what is not authorised.
For developers: Code review, Use tooling.
IT Staff must routinely schedule security audits (daily, weekly. Monthly may be too late!). Consider: