UW Information Systems Security Policy Stephen Rondeau Institute

  • Slides: 15
Download presentation
UW Information Systems Security Policy Stephen Rondeau Institute of Technology Computing Labs Administrator 18

UW Information Systems Security Policy Stephen Rondeau Institute of Technology Computing Labs Administrator 18 Nov 2005

Agenda • • • Components Sampling of Laws Complying with the Law Consideration of

Agenda • • • Components Sampling of Laws Complying with the Law Consideration of Ethics Consequences References

Components • Computing Device – takes some input – processes it input Computing Device

Components • Computing Device – takes some input – processes it input Computing Device • OS, services, applications – provides some output • Network – connects device • Data • ? Hub output

Computing Devices: Reality In Human K/M/touch, etc. Data Scanner/GPS Out Human A/V In/Out Data

Computing Devices: Reality In Human K/M/touch, etc. Data Scanner/GPS Out Human A/V In/Out Data Storage Device, PC Card, Network, Printer, Etc.

Computing Devices: Connections • removable media – floppy, CD/DVD, flash, microdrive • PC Card

Computing Devices: Connections • removable media – floppy, CD/DVD, flash, microdrive • PC Card • wired – serial/parallel, USB, Firewire, IDE, SCSI, twisted pair • wireless – radio (802. 11, cellular, Bluetooth) – Infrared (IR) – Ultrasound

Lab Network Environment C H/S C C AP H/S Server C Time. Share C

Lab Network Environment C H/S C C AP H/S Server C Time. Share C C Internet C R R UW Net

Data Issues • Sensitivity: public or confidential – confidential • minimal, more sensitive, most

Data Issues • Sensitivity: public or confidential – confidential • minimal, more sensitive, most sensitive • owned by someone • specific statements for access, distribution, storage, disposal and penalties for disclosure • Criticality: how important to function

Key Security Concepts • Must protect: – Services/Use • Functionality: perform function or use

Key Security Concepts • Must protect: – Services/Use • Functionality: perform function or use device • Availability: device or data is ready for use on demand at operational speed and capacity – Data • Confidentiality: prevent disclosure to unauthorized people • Integrity: unaltered, intact

Sampling of Laws • International, federal, state, UW – statutes and regulations • Federal

Sampling of Laws • International, federal, state, UW – statutes and regulations • Federal – privacy, wiretapping, fraud, disclosure, surveillance, counterterrorism – grant-related policy • WA State – privacy, malicious mischief, public records, spam, disclosure • UW Administrative Code – student and general conduct, records access

Complying with the Laws • • Comply: take action to conform Law => Policies

Complying with the Laws • • Comply: take action to conform Law => Policies + Standards + Guidelines Policies state what needs to be done Standards define how to implement the policy (via procedures) • Guidelines are strongly-recommended practices to assist in adhering to standards

Roles and Responsibilities • System owners and operators • comply with laws, policies, guidelines

Roles and Responsibilities • System owners and operators • comply with laws, policies, guidelines • maintain confidentiality of sensitive data • grant access based on “least privilege” and “separation of duties” principles • report security incidents and perform incident response • Data Custodians • Users

Policies • May monitor user accounts, files and access • Understand nature of data

Policies • May monitor user accounts, files and access • Understand nature of data on systems, and manage it appropriately • Provide logical and physical access control and logging commensurate with sensitivity and criticality of computing devices, networks and data • Document procedures for issuing, altering and revoking access privileges • Implement minimum computer and network measures and practices

Consideration of Ethics • Ethics are the principles of conduct that are harmonious with

Consideration of Ethics • Ethics are the principles of conduct that are harmonious with society – arguably higher than policy – notable examples • whistleblowing • preventing conflicts of interest • protecting life • Use of university resources; data sensitivity

Consequences • • • Worm/Virus authoring and release Trojans Unauthorized wireless access Keylogging Botnets

Consequences • • • Worm/Virus authoring and release Trojans Unauthorized wireless access Keylogging Botnets

References • UW Information Systems Security – http: //www. washington. edu/admin/rules/APS/02. 01 TO C.

References • UW Information Systems Security – http: //www. washington. edu/admin/rules/APS/02. 01 TO C. html • UW Minimum Computing Security Standards – http: //www. washington. edu/computing/security/pass/M in. Comp. Sec. html • UW Electronic Information Privacy Policy – http: //www. washington. edu/computing/rules/privacypol icy. html • SANS Institute Policy Templates – http: //www. sans. org/resources/policies/