Information Security Management System Awareness Program

Objective:

Upon completion of this course the participant will be able to:

  • Have background of basics of Information security
  • Understand various types of Information
  • Learn about threats, vulnerabilities related to information
  • Various aspects of information security – Confidentiality, Integrity, Availability
  • Identify information asset & it’s classification
  • Risk analysis and various methods to measure risk & control the risk
  • ISMS implementation methods
  • Various methods to monitor & review ISMS
  • International standards
Description:

Information Systems are the backbone of every modern age organisation. These systems are interfaced and interconnected with multiple systems internally and externally through networking. The networking leads to the vulnerability of information systems against viruses, data thefts and hacking etc.

To protect the vital IT infrastructure, it is necessary to understand and work on the basics of Information Systems security. This is a basic level course which covers the fundamentals of information security and builds knowledge related to design and analysis of information security systems.

Outline:

DAY 1
·WHAT IS INFORMATION SECURITY?
Various types of information
Information as Asset
Information classification
· WHY INFORMATION SECURITY IS NEEDED?
Threats & vulnerabilities associated with Information
What is risk and it’s impact
Various techniques of Risk analysis
Examples of information attacks

DAY 2
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:”Times New Roman”; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;}
· HOW TO ESTABLISH SECURITY REQUIREMENTS?
Understand Various parameters to judge current & future security requirements of organization.
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:”Times New Roman”; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;}
· ASSESSING SECURITY RISKS
Understand various techniques to measure security risks and key parameters to monitor
Case study of risk analysis
.UNDERSTAND VARIOUS COMPONENTS OF INFORMATION SECURITY

DAY 3
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:”Times New Roman”; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;}
· SELECTING CONTROLS
Human resources security,
Physical & environmental security
Equipment security

DAY 4
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:”Times New Roman”; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;}
· SELECTING CONTROLS
Communications & operations management
Access control
Information security incidence management
Business continuity planning
Compliance

DAY 5
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:”Times New Roman”; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;}
· ISMS DOCUMENTATION
Security objectives, policies, procedures
· ISMS REVIEWS
Internal audits,
OPEN DISCUSSIONS, CASE STUDIES

  • Computer & IT head, Engineers
  • Project in-charge, managers
  • Administration, Human resources
  • Procurement and quality personnel