100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Resumen

Summary ISACA: Auditing Cyber Security: Evaluating Risk and Auditing Controls

Puntuación
-
Vendido
-
Páginas
15
Subido en
03-01-2024
Escrito en
2023/2024

INTRODUCTION Cyber security is receiving increased attention from the boards of many organizations today in large part due to the bad publicity generated from recent large data breaches. Senior members of management and corporate boards have lost their positions, and organizations have had to spend valuable resources in post-breach cleanup and to make their clients and customers “whole.” Infrastructure spending has increased as organizations attempt to prevent the breaches from occurring, and security technology investments in incident detection and response mechanisms are climbing to limit the damage and liability should the event occur. These activities to enhance the infrastructure and defense mechanisms are welcomed investments to those charged with protecting from and responding to the attacks, but they represent only one necessary component of any cyber security program. The fundamental questions that need to be asked are those such as: • Where is the best place to invest the next security dollar? • Is the right amount being invested? • Are there areas of risk that are not being addressed? • Is the current infrastructure sufficient? • Are the dollars invested that we have today being used wisely? • How are competitors approaching this and what are they spending on information asset protection? The answers to these questions are best answered by: 1) evaluating the current and emerging risk to the organization, and 2) auditing the security controls that are current or planned to be in place to protect the information assets. Without executing formal processes to determine the risk, identify controls to mitigate the risk and subsequently audit the controls, company assurance that information assets are being adequately protected would be subject to chance. Without formal processes, there is the risk that inappropriate tools would be purchased without understanding where the tool fits into the architecture. Did this tool replace another tool? Will this tool improve the cyber security capabilities sufficiently beyond the current tool set to warrant the additional cost? Based upon the risk that the organization currently has, could the money have been spent better somewhere else? Are the current tools implemented and being attended to, or were they purchased and are now shelfware? This white paper will provide some guidance on evaluating the risk and auditing the cyber security controls for an organization. These concepts apply to organizations large and small, even though the investment dollars and approaches will be focused differently and of a different scale. CYBER SECURITY CONTROL SPECIFICATION Each organization should design controls specific to the risk posture of the organization and ensure that processes and people are in place to continuously manage the controls. Control issues typically are not due to the failure of the technology, but more often are the result of individuals not executing the process or using a process that is poorly defined. Administrative, technical and operational controls can be sourced from many places, such as COBIT® 5 for Information Security1 as a baseline. One of the primary goals of any cyber security program should be to limit the attractiveness for the attacker. Hacking has moved well beyond the script kiddie threat stage, and the more time it takes an attacker to penetrate a system, the less desirable that target becomes. If an attacker wants to break into a car at a shopping mall during the holidays, it would be easier to jiggle all the car door handles to find the one whose owner did not lock it vs. breaking into the first car the attacker sees with a crowbar, potentially setting off the alarms. Control investments are made across the organization through technical, administrative and operational investments in people, process, technology and growing a security-oriented culture. These investments may include: • Awareness investment • Policy investment • Intrusion detection systems • Event logging • Incident response • Vulnerability scanning • Information asset classification • Forward intelligence • Architecture and technology hardening • Systems hardening 1 ISACA, COBIT 5 for Information Security, USA, 2012, Auditing Cyber Security: Evaluating Risk and Auditing Controls © 2017 ISACA. All rights reserved. 3 The attractiveness decreases as investments are made in cyber security controls in the preceding list (see figure 1). Leveraging Different Cyber Security Control Frameworks There are many approaches available for specifying cyber security control environments, such as National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations.2 The purpose of SP 800-53 is to provide guidelines for selecting and specifying security controls for information systems supporting executive agencies of the federal government. The NIST model, in contrast to the COBIT® 5 model, is very prescriptive in nature and may be overwhelming to many organizations. SP 800-53 contains very detailed definitions and may be best used to complement and help develop the organizationspecific detailed activities to perform the COBIT 5 practices, which, in turn, as indicated in the previous section, support the overarching cyber security process.

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Grado

Información del documento

Subido en
3 de enero de 2024
Número de páginas
15
Escrito en
2023/2024
Tipo
Resumen

Temas

Vista previa del contenido

Auditing
Cyber Security:
Evaluating Risk and Auditing Controls




ABSTRACT
Cyber security has become a prevalent issue today facing most organizations, one that is recognized
by companies to be an enterprisewide issue requiring thoughtful attention. Investments in controls are
necessary to protect organizations from increasingly sophisticated and widely available attack methods.
Intentional attacks, breaches and incidents can have damaging consequences. This white paper highlights
the need for these controls implemented as part of an overall framework and strategy, and focuses on the
subsequent assurance that is needed through management review, risk assessments and audits of the
cyber security controls.

, Auditing Cyber Security: Evaluating Risk and Auditing Controls 2




INTRODUCTION This white paper will provide some guidance on evaluating
the risk and auditing the cyber security controls for an
Cyber security is receiving increased attention from the boards organization. These concepts apply to organizations large and
of many organizations today in large part due to the bad small, even though the investment dollars and approaches will
publicity generated from recent large data breaches. Senior be focused differently and of a different scale.
members of management and corporate boards have lost
their positions, and organizations have had to spend valuable
resources in post-breach cleanup and to make their clients and
customers “whole.” Infrastructure spending has increased as
CYBER SECURITY
organizations attempt to prevent the breaches from occurring,
and security technology investments in incident detection and
CONTROL SPECIFICATION
Each organization should design controls specific to the risk
response mechanisms are climbing to limit the damage and
posture of the organization and ensure that processes and
liability should the event occur.
people are in place to continuously manage the controls.
These activities to enhance the infrastructure and Control issues typically are not due to the failure of the
defense mechanisms are welcomed investments to technology, but more often are the result of individuals not
those charged with protecting from and responding executing the process or using a process that is poorly
to the attacks, but they represent only one necessary defined. Administrative, technical and operational controls
component of any cyber security program. The fundamental can be sourced from many places, such as COBIT® 5 for
questions that need to be asked are those such as: Information Security1 as a baseline.

• Where is the best place to invest the next security dollar? One of the primary goals of any cyber security program
should be to limit the attractiveness for the attacker.
• Is the right amount being invested?
Hacking has moved well beyond the script kiddie
• Are there areas of risk that are not being addressed? threat stage, and the more time it takes an attacker
to penetrate a system, the less desirable that target
• Is the current infrastructure sufficient?
becomes. If an attacker wants to break into a car at a
• Are the dollars invested that we have today being used shopping mall during the holidays, it would be easier to jiggle
wisely? all the car door handles to find the one whose owner did not
• How are competitors approaching this and what are they lock it vs. breaking into the first car the attacker sees with a
spending on information asset protection? crowbar, potentially setting off the alarms. Control investments
are made across the organization through technical,
The answers to these questions are best answered by: administrative and operational investments in people, process,
1) evaluating the current and emerging risk to the organization, technology and growing a security-oriented culture. These
and 2) auditing the security controls that are current or investments may include:
planned to be in place to protect the information assets.
• Awareness investment
Without executing formal processes to determine the risk,
identify controls to mitigate the risk and subsequently audit the • Policy investment
controls, company assurance that information assets are being
• Intrusion detection systems
adequately protected would be subject to chance. Without
formal processes, there is the risk that inappropriate tools • Event logging
would be purchased without understanding where the tool fits • Incident response
into the architecture. Did this tool replace another tool? Will this
tool improve the cyber security capabilities sufficiently beyond • Vulnerability scanning
the current tool set to warrant the additional cost? Based upon • Information asset classification
the risk that the organization currently has, could the money
have been spent better somewhere else? Are the current tools • Forward intelligence
implemented and being attended to, or were they purchased • Architecture and technology hardening
and are now shelfware?
• Systems hardening


1 ISACA, COBIT 5 for Information Security, USA, 2012, www.isaca.org/COBIT/Pages/info-sec.aspx



© 2017 ISACA. All rights reserved.
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
THEEXCELLENCELIBRARY Harvard University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
18
Miembro desde
2 año
Número de seguidores
6
Documentos
2641
Última venta
5 días hace
THE EXCELLENCE LIBRARY

The Excellence Library Where Academic Success Begins. Welcome to The Excellence Library — your trusted marketplace for past and upcoming exam papers with verified answers, spanning all academic fields. Whether you're a med student, a future lawyer, a high schooler prepping for finals, or a researcher looking for model dissertations — we've got you covered. What We Offer Accurate & Complete Exam Papers From Medicine, Nursing, Law (Bar Exams), High School subjects, and more. Model Dissertations & Novels Top-tier academic references and full-text materials to guide your writing and study. Affordable & Fair Pricing Quality resources at a price that respects students' budgets. Why Choose Us? Thoroughly Reviewed Answers – Every paper includes clear, correct solutions. Massive Library – Thousands of documents, constantly updated. Academic Excellence, Delivered – We help you prepare smarter, not harder. Fast Delivery – Get what you need, when you need it. Our Goal To empower students and professionals by offering reliable, affordable academic materials — helping you succeed one paper at a time.

Lee mas Leer menos
2.5

2 reseñas

5
0
4
0
3
1
2
1
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes