Unit 5 Assignment 1 Help.

Slides:



Advertisements
Similar presentations
OCTAVESM Process 4 Create Threat Profiles
Advertisements

Secure Systems Research Group - FAU Process Standards (and Process Improvement)
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Security Controls – What Works
Toolbox Mirror -Overview Effective Distributed Learning.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Security Posture Assessment (SPA) Headquarters: Ofisgate Sdn Bhd ( A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, Kuala Lumpur,
Documenting Network Design
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Storage Security and Management: Security Framework
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
David Rodriguez FINAL PROJECT: WEB SERVER SECURITY.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
IT Security and Innovation. IT Security Regulatory compliance and ISO27001 –Public Service Network Code of Connection (PSN CoCo) –Payment Card Industry.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Note1 (Admi1) Overview of administering security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
Juan Ortega 12/15/09 NTS355. Microsoft Security Advisory (977544) Vulnerability in SMB Could Allow Denial of Service Flaw on SMBv2 supposedly opened two.
1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment.
Security fundamentals Topic 10 Securing the network perimeter.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Introduction to Networks BTEC Nat Bus - Principles of Networking 1.
Business Continuity Planning 101
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Articulate the major security risks and legal compliance issues for a Fire and Rescue Service. Identify and justify technical controls for securing remote.
Security fundamentals
Unit 36: Internet Server Management
CompTIA Security+ Study Guide (SY0-401)
Unit 09 Computer Networks
An Overview on Risk Management
Cybersecurity - What’s Next? June 2017
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
LAND RECORDS INFORMATION SYSTEMS DIVISION
CompTIA Security+ Study Guide (SY0-401)
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
سيستم مديريت امنيت اطلاعات
IS4680 Security Auditing for Compliance
Information Security Risk Management
IS4680 Security Auditing for Compliance
Understand Risks to IT Security
Units with – James tedder
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
DATA LOSS PREVENTION Mr. Collins Oduor.
IS Risk Management Framework Overview
IS4680 Security Auditing for Compliance
LO2 Describe IT security solutions
Unit 5: Security LO1: P1, P2 + M1.
Awareness and Auditor training kit
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Unit 5 Assignment 1 Help

LO1 Covering P1 + P2 Cover as much as possible LO1 Assess risks to IT security. IT security risks: Risks: Unauthorised use of a system; unauthorised removal or copying of data or code from a system; damage to or destruction of physical system assets and environment; damage to or destruction of data or code inside or outside the system; naturally occurring risks. Organisational security: Business continuance; backup/restoration of data; audits; testing procedures e.g. data, network, systems, operational impact of security breaches, WANs, intranets, wireless access systems.

Proposing a method to assess and treat IT security risks. (M1) Establish a risk management framework Outline how you would identify risks, who’s responsible, the impact to the business and how likely it is to occur. Baseline criteria, Scale of risk, Acceptable risk(Risk appetite) Identify risks Create a list of business assets such as files, media, portable devices as well as content such as Intellectual Property. Analyse risks Identify threats and vulnerabilities to each asset Evaluate risks Order security risks from high to low Select risk treatment options Define exactly who is going to implement each control, in which timeframe, with which budget, etc. Research: ISO 27001 risk assessments (ISO = International Organization for Standardization)

LO2 Covering P3 + 4 Cover as much as possible LO2 Describe IT security solutions. IT security solution evaluation: Network Security infrastructure: evaluation of NAT, DMZ, FWs. Network performance: RAID, Main/Standby, Dual LAN, web server balancing. Data security: explain asset management, image differential/incremental backups, SAN servers. Data centre: replica data centres, virtualisation, secure transport protocol, secure MPLS routing and remote access methods/procedures for third-party access. Security vulnerability: logs, traces, honeypots, data mining algorithms, vulnerability testing.