Search Header Logo
IS Policy ppt

IS Policy ppt

Assessment

Presentation

Computers

Professional Development

Practice Problem

Hard

Created by

Shriram Zamre

Used 2+ times

FREE Resource

27 Slides • 21 Questions

1

Information Security Policy

2

Introduction

ØCyber security vs Information Security

ØWhich model of information security are we moving towards?

ØBasic tenets

ØWho is it applicable to?

ØWho is the owner of the document and who can give exceptions?

3

Multiple Choice

What is the difference between Cyber security and Information security?

1

Cyber security focuses on protecting computer systems and networks from unauthorized access and attacks, while information security encompasses the protection of all types of information, whether it is stored electronically or on paper.

2

Cyber security and information security are two terms that are used interchangeably and refer to the same concept of safeguarding digital assets.

3

Cyber security is concerned with securing information from external threats, such as hackers and malware, whereas information security focuses on protecting data from internal threats, such as unauthorized access by employees.

4

Cyber security deals with the protection of data in transit over the internet, while information security involves safeguarding data at rest, regardless of the medium in which it is stored.

4

Multiple Choice

Which of the following is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data

1

Castle-and-moat Architecture

2

Zero Trust Architecture

3

Null Point Architecture

4

Least Privilege Architecture

5

Multiple Choice

The basic tenets of Cyber Security/Information security of any Organization comprises of

1

Confidentiality, Information Security & Authenticity

2

Confidentiality, Integrity & Availability

3

Confidentiality & Information Security

4

Confidentiality, Integrity & Authenticity of Information

6

Multiple Choice

What does 'integrity of data' mean in CIA Triad?

1

Accuracy and completeness of the data

2

Data should be viewable at all times

3

Data should be access by only the right people

4

All of the above

7

Multiple Choice

_____ means that data or information in Organization's systems is maintained so that it is not modified or deleted by unauthorized parties.

1

Integrity

2

Confidentiality

3

Authenticity

4

Information Security

8

Multiple Choice

Information Security policy of the Bank is applicable to

1

Serving Employees

2

Third Party Employees

3

Retired Employees

4

All of the above

9

Multiple Choice

Which of the following is the owner of IS Policy Document of the Bank?

1

CGM-IC DIT, CO

2

Chief Information Security Officer

3

ED In charge of DIT

4

IT Sub Committee of the Bank

10

Objectives of IS Policy

ØMeet the Confidentiality, Integrity and Availability(CIA)  of the Bank’s information assets as per the levels of requirements.

ØSecure information systems and services against cyber risks through appropriate security controls and vulnerability management programs

ØComply with legal and contractual requirements.

Øcreate adequate information security awareness among all employees

11

Information assets

ØApplications and IT Infrastructure, viz., data centres, wide area networks, local area networks, internet leased lines, security infrastructure, and end points that are hosted/managed/governed and are used/owned/provided by the Bank

ØAll data/information received, accessed, processed, stored, retrieved or communicated electronically in all formats including but not limited to documents, textual, numeric, audio, images and videos

12

Multiple Choice

Who is the Third line of Defence as per Security strategy of IS policy?

1

DIT Operations Team

2

RMD /CISO

3

DIT, CO/Department Risk Officers

4

Inspection Department

13

Multiple Choice

As per IS Policy of the Bank which of the following is not the essence of second line of defence associated with IT risks

1

Monitor

2

Assess

3

Facilitate

4

Examine

14

Information security strategy

Line of Defence

Principle Strategy

Who

First

Management Control

DIT operations teams

Business Department Operations Team

Second

Monitor, Assess, Facilitate, Mitigate

RMD/ RBI CISO

DIT CO/ Department Risk officers

Third

Review, Examine, Audit, Assure

Inspection department

15

Organisational and reporting structure

ØIT Sub Committee of the Board - primary driver for the advancements of IT systems in the Bank

ØAudit and Risk Management Sub-committee of the Board (ARMS) - deliberates on the various risks being faced by Bank, mainly pointed out by audit conducted by Inspection Department and provides necessary guidance in risk mitigation

ØRisk Monitoring Committee (RMC) - Deputy Governor in charge of Risk Monitoring Department

16

Organisational and reporting structure

ØInformation Security Steering Committee (ISSC): For Protected Systems - chairmanship of Executive Director of Risk Monitoring Department.

ØRegional Office Security Group (RSG)/ Central Office Department Security Group (CODSG)  -  smooth implementation of the IS policy across ROs and CODs respectively

17

Access control

nAccess to information and information systems shall be granted on a need-to have basis only

nMaintain logs and review to detect unauthorized access

nUser access provisioning - formal user registration and deregistration procedure

18

Access control

nReview of user access rights – at least quarterly

nManagement of generic user accounts - Appropriate procedure shall be implemented for using generic user accounts to implement the operational or functional requirements in a safe and accountable manner

19

Access control

nManagement of secret authentication information of users - passwords, user ids, pins, OTPs shall be generated, stored, transmitted and used in safe and appropriate manner, use best practices

nContent management and security - content-checking mechanism needed – eg ekp

nSecure log-on procedures - VPN shall be established for remote access, prudent practices by employees for passwords, user ids, secret keys and other access tokens

20

Multiple Choice

Unauthorized disclosure of such information could adversely impact the reputation of the organisation and country? Which classified information asset is in question?

1

Secret

2

Confidential

3

Internal

4

Public

21

Multiple Choice

Sensitive information of the Bank’s employees, systems and activities which the Bank is obliged to protect under laws and regulations. Unauthorized disclosure of such information could lead to misuse by malicious actors consequently impacting the business operations or IT systems and the reputation of the organisation. Which classified information asset is in question?

1

Secret

2

Confidential

3

Internal

4

Public

22

Information security assets

ØAssets: Information assets; Physical Assets and Technology Infrastructure

ØInformation assets include Business documents, applications, infrastructure components, services and systems

ØClassification: Based on criticality and sensitivity

ØInformation Classification: Secret, Confidential, Internal and Public

23

media

24

media

25

media

26

media

27

media

28

Multiple Choice

The minimum level of encryption mandated for wireless communication between bank’s network and wireless client is

1

Wi-Fi Protected Access 3

2

Wi-Fi Protected Access 2

3

Wi-Fi Protected Access

4

Wired Equivalent Privacy

29

Multiple Choice

As per IS policy of the Bank, storage of sensitive official information is permitted in the following:

1

Google Drive

2

icloud

3

Onedrive

4

None of the above

30

Multiple Choice

Which of the following procedures not useful for preventing brute force attack of hacking passwords?

1

Set a Lengthy Password

2

Set a High Complexity Password

3

Set a Limit for Login Failures

4

None of these

31

Multiple Choice

Usage of same passwords by many users of an organization like Feb@2023, Jan@2023 etc., may give scope to a hacker by using single common password against multiple accounts for gaining access. This cyber-attack is known as

1

Brute Force Attack

2

Password Sprinkling

3

Password Spraying

4

Credential spraying

32

Multiple Choice

Who shall be responsible for ensuring that only the software authorized by DIT, CO are installed on bank’s systems?

1

Bank’s employee and non-employee users

2

DIT cell of an RO

3

System administrators

4

DIT, CO

33

Multiple Choice

Consider the four statements

i) Bank reserves the right to monitor and analyse the browsing behavior of the employees.

ii)Users shall be responsible for aspects impacting availability and integrity like mailbox housekeeping, personal usage, and official usage etiquette as per guidelines.

iii)Email communication may be used only for non-official purposes with necessary approvals.

iv)Private communication services shall not be used for transmitting any official message, information, or data.

Which of the following statements are correct?

1

I, ii, iii

2

I, ii, iv

3

I, ii, iii, iv

4

i, IV only

34

Multiple Choice

What should be done in case of Loss of Laptop and other moveable information assets and systems including but not limited to mobile devices (owned by the Bank)?

1

No need to report since asset not a PC and not connected to LAN network

2

Report to the bank

3

File FIR

4

Report to bank and File FIR

35

Multiple Choice

Who has the duty to report suspected, actual or near miss information security incidents to appropriate authorities?

1

Bank’s Security Operations Centres

2

All employees of the Bank, third party suppliers/vendors

3

DIT Cell of RO

4

System Administrators

36

Multiple Choice

As per IS policy, any violation of information security policies and procedures by employees will be dealt in accordance with?

1

Reserve Bank of India (Staff) Regulations, 1948 and any other extant rules and procedures as made effective by the Bank

2

Information Technology Act, 2000

3

Indian Penal Code (IPC)

4

None of the above

37

Operations Security

nUse of open-source software - may be considered without compromising on the information security aspects in consultation with DIT, CO

nSoftware installation by end-user  - 10.13 - Bank’s employee and non-employee users shall be responsible for ensuring that only the software authorized by DIT, CO are installed on their systems

38

Operations security

nVulnerability management - periodic threat analysis and reports by CISO office

nAnti-virus – put to use only after installation, keep it updated

nBusiness Continuity – RTO and RPO

39

Operations security

nRTO: Recovery Time Objective - duration of time in which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity.

nRPO is Recovery Point Objective - often defined as the maximum targeted period in which data might be lost from a disaster. How frequently you take backups

40

Operations security

nSystem Administrator - application and network administration roles, wherever required, with the specific documented approval of HOD/RD, after considering the risks and role-conflict involved

41

Cryptography

nCryptographic controls – using digital signatures, SSL certificates, authentication tokens, dual factor authentication, document and system encryption

nSecure key management - key generation, distribution, revocation and storage

nPhysical security of the endpoint computing equipment - 12.11 - Loss of Laptop and other moveable information assets and systems including but not limited to mobile devices (owned by the Bank) should be reported immediately to the Bank, File FIR

42

Network and communication security

n13.12- Utilise the network and system facilities for official purpose only.

n13.13- Connectivity of desktops, laptops etc. to unauthorised/private networks is not permitted.

n13.18- Only the officially provided internet services shall be used on the internal devices

43

Network and communication policy

n13.19- Storage of sensitive official information in private/free cloud facilities is not permitted.

n13.22- Posting of content on social media platforms on behalf of the Bank is permitted only after proper approvals.

n13.28- All official electronic communication with internal and external parties will be done through official channels.

44

Network and communication policy

n13.29- Email communication should be used only for official purposes.

n13.30- Encrypt the sensitive emails and its attachments before sending it.

n13.31- Email system shall not to be used for the creation or distribution of any offensive messages.

n13.38- Access Bank’s information systems from internet only using the laptops/devices issued officially to them by the Bank.

45

Information security incident management

n16.04- Report suspected, actual or near miss information security incidents to appropriate authorities.

46

Compliance

n17.04-All staff and external vendors/contractors should comply with the Bank’s IS Policy.

n17.16- Any violation of IS policies will be dealt as per RBI (Staff) Regulations, 1948 and any other extant procedures of the Bank.

47

Santhosh V

"Use your password like your toothbrush. Dont give it to anyone. Keep changing it regularly" 

48

Poll

Did you like the session?

Yes

No

Information Security Policy

Show answer

Auto Play

Slide 1 / 48

SLIDE