Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη...

53
Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου

Transcript of Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη...

Page 1: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

Information Security Management, Standards and

best practices

Σ. Κοκολάκης

Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου

Page 2: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

2

Standards & Standardization Process

• De facto – de jure standards• Standardization bodies

– ISO (International Organization for Standardization) National bodies – Technical Committees

– ΕΛΟΤ (Ελληνικός Οργανισμός Τυποποίησης) – CEN, ANSI, NIST, BSI

• Processes– Certification– Accreditation

Page 3: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

3

Why?• Threat of legal liability

– Organizations and software vendors are being held to a higher degree of accountability for security, if not in the courtroom, by their customers

• Business partners and stakeholders demanding security – Organizations are challenged to prove they are

managing security to a level that will satisfy their business partners and stakeholders.

• Proliferation of standards, regulations and legislation – Organizations face complex requirements to

comply with a myriad of regulations.

Page 4: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

4

Comprehensive IS Management – Principles Based

• OECD Guidelines for the Security of Information Systems and Networks (2002): 9 pervasive principles for information security

• NIST (National Institute of Standards and Technology)– SP 800-14 Generally Accepted Principles and Practices for

Securing IT Systems, 1996 – SP 800-18, Guide for Developing Security Plans for Federal

Information Systems,1998 (revised 2006)– SP 800-30 Risk Management Guide for IT Systems, 2002

• IFAC International Guidelines on Information Technology Management—Managing Information Technology Planning for Business Impact: International Federation of Accountants, New York, 1999.

Page 5: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

5

Comprehensive IS Management - Controls Based

• BS 7799 – Parts 1, 2 & 3 Code of Practice for Information Security Management (British Standards Institute)

• ISO 27001: Information Technology – Information Security Management Systems - Requirements

• ISO 27002: Information Technology – Code of Practice for Information Security Management (former ISO 17799)

• ISO 27003: Information Technology – Information management system implementation guidance

• ISO 27004: Information technology - Information security management - Measurement

• ISO 27005: Information Technology– Information security risk management

• IT Baseline Protection Manual - BSI (Bundesamt für Sicherheit in der Informationstechnik)

• NIST – 800-53 - Recommended Security Controls for Federal Information Systems – Several specific standards (e.g. Secure Web Services, PDA security,

Implementing HIPAA, Contingency planning, etc.)

Page 6: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

6

Other categories• Capability Maturity Model

– ISO 21827 System Security Engineering - Capability Maturity Model (SSE-CMM)

• Product Security Models – ISO 15408 Common Criteria – TCSEC, ITSEC

• Business Continuity Management– ISO24762: Information Technology – Guidelines for information

and communication technology disaster recovery services– ISO27031: Information Technology – Security Techniques –

Guidelines for ICT readiness for Business Continuity– BS25999: Business Continuity Management– ISO18044 – Information technology – Information security incident

management• Governance Guides

– ISO38500: Corporate guidance of IT• COBIT – Control Objectives for Information and Related

Technologies (ISACA)– IT Governance Implementation Guide (ISACA)

Page 7: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

7

OECD Guidelines -1-“towards a culture of security”1. Awareness

– Participants should be aware of the need for security of information systems and networks and what they can do to enhance security.

2. Responsibility– All participants are responsible for the security of

information systems and networks.

3. Response– Participants should act in a timely and co-operative manner

to prevent, detect and respond to security incidents.

4. Ethics– Participants should respect the legitimate interests of

others.

5. Democracy– The security of information systems and networks should

be compatible with essential values of a democratic society.

Page 8: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

8

OECD Guidelines -2-

6. Risk assessment– Participants should conduct risk assessments.

7. Security design and implementation– Participants should incorporate security as an essential

element of information systems and networks.

8. Security management– Participants should adopt a comprehensive approach to

security management.

9. Reassessment– Participants should review and reassess the security of

information systems and networks, and make appropriate modifications to security policies, practices, measures and procedures.

Page 9: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

9

Information Security Standards

• TCSEC (Orange Book)

• ITSEC

• Common Criteria

Page 10: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

10

Standards’ history -1-• 1983: Trusted Computer System Evaluation

Criteria (TCSEC) developed in the United States.

• 1991: Information Technology Security Evaluation Criteria (ITSEC) version 1.2 published by the European Commission (joint development by France, Germany, the Netherlands, and the UK).

• 1993: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC) version 3.0, published as a combination of the ITSEC and TCSEC approaches.

Page 11: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

11

Standards’ history -2-

• 1990: the International Organization for Standardization (ISO) starts to develop an international standard evaluation criteria for general use.

• June 1993: the sponsoring organisations of the CTCPEC, FC, TCSEC and ITSEC began a joint activity to align their separate criteria into a single set of IT security criteria that could be widely used. This activity was named the CC Project.

Page 12: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

12

Common Criteria -1-• Meant to be used as the basis for evaluation of

security properties of IT products and systems.• Permits comparability between the results of

independent security evaluations.• Guide for the development of products or systems

with IT security functions and for the procurement of commercial products and systems with such functions.

• Addresses protection of information from unauthorised disclosure,modification, or loss of use (confidentiality, integrity, availability).

• It is applicable to IT security measures implemented in hardware, firmware or software.

Page 13: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

13

Common Criteria -2-

• Does not contain security evaluation criteria pertaining to administrative security measures not related directly to the IT security measures.

• De facto standard in the US since 1998.• Accepted as ISO 15408• Includes

– CC documents– CC Evaluation Methodology (CEM)– CC National Scheme

• 7 Evaluation Assurance Levels – [EAL1 to EAL7]

• 11 Functionality Requirements Classes• 10 Assurance Requirements Classes

Page 14: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

14

Evaluation Context

Page 15: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

15

Common Criteria Target Group• Consumers

They can use the results of evaluations to help decide whether an evaluated product or system fulfils their security needs. They can also use the evaluation results to compare different products or systems.

• DevelopersCC can support developers in preparing for and assisting in the evaluation of their products or systems and in identifying security requirements to be satisfied by each of their products or systems.

• EvaluatorsThe CC contains criteria to be used by evaluators when forming judgments about the conformance of TOEs to their security requirements.

• OthersAuditors, Security Officers

Page 16: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

16

Common Criteria: Basic concepts

• Protection Profile (PP)– An implementation-independent set of security

requirements for a category of TOEs that meet specific consumer needs.

• Target of Evaluation (TOE)– An IT product or system and its associated administrator

and user guidance documentation that is the subject of an evaluation.

• Security Target (ST)– A set of security requirements and specifications

to be used as the basis for evaluation of an identified TOE.

Page 17: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

17

TOE Development Method

• Protection Profile (PP)

• Target of Evaluation (TOE)

• Security Target (ST)

Page 18: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

18

ISO 27002 (former 17799)

• First edition: 2000. Current edition: 2005• Prepared by the British Standards Institution

(as BS 7799) and was adopted by Joint Technical Committee ISO/IEC JTC 1, Information Technology, in parallel with its approval by national bodies of ISO and IEC.

• “Information technology — Code of practice for information security management”

Page 19: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

19

ISO 27002 as a code of practice

• May be regarded as a starting point for developing organization specific guidance.

• Not all of the guidance and controls in this code of practice may be applicable.

• Furthermore, additional controls not included in this document may be required.

Page 20: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

20

ISO 27002

• Gives recommendations for information security management for use by those who are responsible for initiating, implementing or maintaining security in their organization.

• It is intended to provide a common basis for developing organizational security standards and effective security management practice and to provide confidence in inter-organizational dealings.

• Recommendations from this standard should be selected and used in accordance with applicable laws and regulations.

Page 21: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

21

ISO 27002: Information Security Policy

• Information security policy document

• Review and evaluation

Page 22: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

22

ISO 27002: Organizational Security

• “Information security is a business responsibility shared by all members of the management team.”

• Information security infrastructure– management framework: management fora with

management leadership should be established to approve the information security policy, assign security roles and co-ordinate the implementation of security across the organization

– multi-disciplinary approach to information security: involving the co-operation and collaboration of managers, users, administrators, application designers, auditors and security staff, and specialist skills in areas such as insurance and ``

Page 23: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

23

ISO 27002: Asset classification and control

• Asset accountability – Accountability should remain with the

owner of the asset. Responsibility for implementing controls may be delegated.

• Information classification– Information should be classified to

indicate the need, priorities and degree of protection, depending on varying degrees of sensitivity and criticality.

Page 24: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

24

ISO 27002: Personnel security

• Security in job definition and resourcing• User training

– Users should be trained in security procedures and the correct use of information processing facilities to minimize possible security risks.

• Responding to security incidents and malfunctions– Weaknesses, malfunctions – Learning from incidents– Disciplinary process

Page 25: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

25

ISO 27002: Physical and environmental security

• Secure areas– Security perimeter, entry controls– Protection provided should be

commensurate with the identified risks.

• Equipment security– Safety

Page 26: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

26

ISO 27002: Communications and operations management

• Operational procedures and responsibilities– Incident management procedures– Segregation of duties– Separation of development and operational facilities

• System planning and acceptance– Capacity planning, performance requirements, system

acceptance• Protection against malicious software• Back ups, logging• Network management• Media handling

– tapes, disks, cassettes• Information exchange between organizations

– Policy on Email– Electronic commerce security

Page 27: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

27

ISO 27002: Access control

• Access control policy• User access management

– Access rights, passwords

• User responsibilities• Network access control

– Network segregation

• Operating system access control• Application access control• Monitoring system access and use• Mobile computing and teleworking

Page 28: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

28

ISO 27002: Systems development and maintenance

• Security requirements of systems– “built-in” security

• Security in application systems– Message authentication, hash

algorithms, cryptography

• Cryptographic controls– To protect the confidentiality, authenticity

or integrity of information (encryption, digital signatures, key management)

Page 29: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

29

ISO 27002: Business continuity management -1-• “To counteract interruptions to business

activities and to protect critical business processes from the effects of major failures or disasters.”

• A business continuity management process should be implemented to reduce the disruption caused by disasters and security failures (which may be the result of, for example, natural disasters, accidents, equipment failures, and deliberate actions) to an acceptable level through a combination of preventative and recovery controls.

Page 30: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

30

ISO 27002: Business continuity management -2-

• The consequences of disasters, security failures and loss of service should be analyzed. Contingency plans should be developed and implemented to ensure that business processes can be restored within the required time-scales. Such plans should be maintained and practiced to become an integral part of all other management processes.

• Business continuity management should include controls to identify and reduce risks, limit the consequences of damaging incidents, and ensure the timely resumption of essential operations.

Page 31: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

31

ISO 27002: Compliance

• Compliance with legal requirements– Data protection and privacy of personal

information– Intellectual property rights (IPR)– Regulation of cryptographic controls

• Compliance with security policy

Page 32: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

32

ISO/IEC 27001: 2005

• Specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System (ISMS) within the context of the organization’s overall business risks.

• May serve as a suitable basis for ISMS certification.

Page 33: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

33

ISO/IEC 27001: 2005

• Contains requirements for the implementation of security controls customized to the needs of individual organizations or parts of them.

• Contains requirements in a structure of:– 11 control clauses that include– 39 control objectives – 133 controls

Page 34: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

34

The PDCA model of ISO/IEC 27001

Page 35: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

35

PLAN: Establish the ISMS

Page 36: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

36

Define the scope of ISMS (a.)

Definition of the boundaries of the ISMS in terms of the characteristics:

• the business, • the organization, • its location, • assets, • technology, • justified details of any exclusions from the

scope.

Page 37: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

37

Define an ISMS policy (b.)

Definition of an ISMS policy that:

1. includes a framework for setting objectives and establishes an overall sense of direction and principles for action with regard to information security;

2. takes into account business and legal or regulatory requirements, and contractual security obligations;

3. aligns with the organization’s strategic risk management context in which the establishment and maintenance of the ISMS will take place;

4. establishes criteria against which risk will be evaluated, and

5. has been approved by management.

Page 38: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

38

Risk assessment (c.-d.-e.)

Risk assessment is the process of combining risk identification, risk analysis and risk evaluation.

ISO/IEC 13335-1: 2004

The results of the risk assessment will help to guide and determine the appropriate management action and priorities for managing information security risks, and for implementing controls selected to protect against these risks.

ISO/IEC 27002: 2005

Page 39: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

39

Risk assessment (c.-d.-e.)

The three stages are risk assessment execution:

• Identify a risk assessment methodology that is suited to the ISMS, and the identified business information security, legal and regulatory requirements.

• Develop criteria for accepting risks and identify the acceptable levels of risk.

• Identify the risks (assets, threats, vulnerabilities, impacts)

• Analyze and evaluate the risks (estimation of level of risks and evaluation whether they are acceptable or require treatment).

Page 40: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

40

Risk Assessment activities

Risk assessment consists of the following activities:

• Risk analysis which comprises: – Risk identification – Risk estimation

• Risk evaluation

Page 41: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

41

Prepare Statement of Applicability (j.)

The Statement of Applicability shall include the following:

• the control objectives and controls selected and the reasons for their selection

• the control objectives and controls currently implemented, and

• the exclusion of any control objectives and controls in Annex A and the justification for their exclusion.

Page 42: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

42

DO: Implement and Operate the ISMS (1)

• Formulate a risk treatment plan, that shall contain:– The method selected for treating the risk– What controls are in place– What additional controls are proposed– Time frame for controls’ implementation– Identified acceptable level of risk (and residual

risk)

• Implement the risk treatment plan in order to achieve the identified control objectives.

Page 43: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

43

DO: Implement and Operate the ISMS (2)

• Implement controls selected to meet the control objectives.

• Define how to measure the effectiveness of the selected controls.

• Implement training and awareness programs.• Manage operation of the ISMS.• Manage resources for the ISMS.• Implement procedures and other controls

capable of enabling prompt detection of security events and response to security incidents.

Page 44: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

44

CHECK: Monitor and review (1)Execute monitoring and reviewing procedures and other

controls to:• promptly detect errors • promptly identify attempted and successful security

breaches and incidents• enable management to determine whether the security

activities delegated to people or implemented by information technology are performing as expected,

• help detect security events by the use of indicators, and• determine whether the actions taken to resolve a breach

of security were effective.

Page 45: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

45

CHECK: Monitor and review (2)

• Undertake regular reviews of the effectiveness of the ISMS.• Measure the effectiveness of controls to verify that security

requirements have been met.• Review risk assessments at planned intervals and review

the residual risks and the identified acceptable levels of risks, taking into account potential changes.

• Conduct internal ISMS audits at planned intervals.

• Update security plans to take into account the findings of monitoring and reviewing activities.

• Record actions and events that could have an impact on the effectiveness or performance of the ISMS.

Page 46: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

46

ACT: Maintain and Improve the ISMS

The organization shall regularly:

• Implement the identified improvements in the ISMS.

• Take appropriate corrective and preventive actions

• Apply the lessons learnt from the security experiences of other organizations and those of the organization itself.

• Communicate the actions and improvements to all interested parties

• Ensure that the improvements achieve their intended objectives.

Page 47: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

47

Required documentation (1)

• Documented statements of the ISMS policy and objectives

• The scope of the ISMS • Procedures and controls in support of the

ISMS• A description of the risk assessment

methodology• The risk assessment report • The risk treatment plan

Page 48: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

48

Required documentation (2)

• Documented procedures needed by the organization to ensure the effective planning, operation and control of its information security processes and describe how to measure the effectiveness of controls

• Records required by the ISO/IEC 27001:2005, and

• The Statement of Applicability (SOA).

Page 49: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

49

Annex A - Control objectives and controls

1. Security Policy 2. Organizing Information Security3. Asset Management 4. Human Resources Security5. Physical and Environmental Security6. Communications and Operations Management7. Access Control8. Information Systems Acquisition, Development and

Maintenance9. Information Security Incident Management10.Business Continuity Management11.Compliance

Page 50: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

50

Annex A - Control objectives and controls: Examples (1)

A5: Security Policy

Objective: To provide management direction and support for information security in accordance with business requirements and relevant laws and regulations

A5.1: Information security policy document

Control: An information security policy document shall be approved by management, and published and communicated to all employees and relevant external parties.

Page 51: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

51

Annex A - Control objectives and controls: Examples (2)

A.11 Access control

A.11.2 User access management

Objective: To ensure authorized user access and to prevent unauthorized access to information systems

A11.2 User responsibilities

• Objective: To prevent unauthorized user access, and compromise or theft of information and information processing facilities

A11.2.3: User password management

Control: The allocation of passwords shall be controlled through a formal management process

A11.2.1: Password use

Control: Users shall be required to follow good security practices in the selection and use of passwords

Page 52: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

52

Trends

• More regulatory and legislative oversight.• Executive and board oversight of information security.• ISO27001/ISO27002 have become the de facto

standard for information security program.• ISO27000 series

– ISO27000: Glossary– ISO27003: Implementation of ISMS– ISO27004: Measurement and metrics– ISO27005: Risk management– ISO27006: Accreditation guidelines– ISO27k …to be continued…

Page 53: Information Security Management, Standards and best practices Σ. Κοκολάκης Με τη συνεισφορά των Μ. Καρύδα και Α. Τσώχου.

53

References • Γκρίτζαλης Σ., Διασφάλιση και Αξιολόγηση Ασφάλειας

Συστημάτων και Προϊόντων (Κεφ.9), στο Κάτσικας Σ., Γκρίτζαλης Δ. και Γκρίτζαλης Σ. (επιμέλεια) Ασφάλεια Πληροφοριακών Συστημάτων, Εκδόσεις Νέων Τεχνολογιών, Αθήνα 2004, σελ. 267-315.

• Καρύδα Μ., Πολιτικές Ασφάλειας Πληροφοριακών Συστημάτων, στο Κάτσικας Σ., Γκρίτζαλης Δ. και Γκρίτζαλης Σ. (επιμέλεια) Ασφάλεια Πληροφοριακών Συστημάτων, Εκδόσεις Νέων Τεχνολογιών, Αθήνα 2004, σελ. 377-406.