Chapter 7 Secure-Use Practices: Defensive Best Practices Presented by: Derrick Lowe Ken Dean Quintin King Caroline Hawes.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Ethics, Privacy and Information Security
Security and Personnel
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Computer Security Workshops Security Introduction, Central Principles and Concepts.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security Controls – What Works
Information Security Policies and Standards
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security: Principles and Practice
Computer Security Fundamentals
Stephen S. Yau CSE , Fall Security Strategies.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Session 3 – Information Security Policies
Network security policy: best practices
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Introduction to Network Defense
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Defining Security Issues
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
Information Security What is Information Security?
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Scott Charney Cybercrime and Risk Management PwC.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 8 Auditing in an E-commerce Environment
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
MIS323 – Business Telecommunications Chapter 10 Security.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Health & Safety Management “and a few other things for your consideration”
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Security Standard: “reasonable security”
Compliance with hardening standards
Data Compromises: A Tax Practitioners “Nightmare”
Chapter 3: IRS and FTC Data Security Rules
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
CompTIA Security+ Study Guide (SY0-401)
Introduction to the PACS Security
Anatomy of a Common Cyber Attack
Presentation transcript:

Chapter 7 Secure-Use Practices: Defensive Best Practices Presented by: Derrick Lowe Ken Dean Quintin King Caroline Hawes

Introduction This chapter focuses on what companies must do to protect themselves from internal risks. Before hackers and the internet there were: –Disgruntled workers –Careless administrators –Hostile managers

Introduction cont’ Current technology amplifies security threats, can be blamed on organizational practices Effective countermeasures –Secure-use practices –User training

Secure Use Practices: Policies

Major Risk Factors Most likely sources of cyber threats continue to come from within. Unknown and unseen hackers and thieves are not the most common threat. It is difficult to accept the reality that a majority of cyber security incidents are traced to company insiders.

Examples An unwitting employee may spread infected or be tricked into revealing information through a popular hacker technique – social engineering. Spoofing-disguising true identity of the sender Administrators may be unable or unwilling to apply software patches to fix known vulnerabilities.

Limits On The Extent To Which Risk Factors Can Be Controlled A complete set of updated, well-documented policies and training in security procedures can be time-consuming. They are not without risks –Selectively enforced policies can be worse than having none at all –If employees send threatening messages to each other and company fail to notify law enforcement, they can be held liable for negligence

Enforcement Of Secure-Use Practices Must Be Consistent With AUP A clearly written Acceptable Use Policy and documentation of confirmation from employees that they read, understood, and agreed to its terms in addition to the Secure-Use practice can help a company avoid costly lawsuits.

Key Secure – Use Procedures and Practices

Security Focus in Organizational Planning Process Information security for organizations may not always follow a standard pattern: –Develop a business plan Defines goals, objectives, strategy and priorities. –Restructure budgets and organizations Information security planning may require a different approach: –External events, current threats, technical consideration or trends may require change to be necessary.

Security as a Business Function Changes in behavior and attitude are necessary to have security as a priority –Top management must implement, enforce and commit…DLM model again How to achieve equal status –Centralize authority that is visible and powerful –Coordinate with other forms of risk management: physical security, insurance, and legal functions Marketing

Integrating Security and Business Plans Ensures that most strategic information receive the most protection. –Also promotes security as being fundamental to the success of the business. Failure to do this will lead to: –A security plan out of sync with the business plan –Security policies not being taken seriously

Developing Information Security Standards Formal policies and standard documents should be developed for other security functions such as: –Firewall configuration - Archival storage –Remote access procedures - Roles and permissions –Wireless handheld devices - Password maintenance Maintaining formal policies and standard documents allows for consistency and currency with changes in technology as well the as business environment.

Documentation and Training Normally documentation and training budgets are set a very low level. This tendency starves the education budget and will tend to subvert the entire program. When training is implemented correctly and employees know their stake in a secure workplace they are able to recognize and react in a communal fashion, which is usually the most effective method.

Incident Response Policy and Incident Response Teams Preparation before an incident occurs is necessary for development and readiness –Design policy and teams –Educate everyone of their roles –Conduct test to validate plan’s effectiveness An incident response policy is the key to readiness. –Needs to be clear and simple for ease of use during the stressful event –Provides guidance on what to do when an attack occurs –Defines the scope of the powers, authority, and discretion that the team has in responding to an attack. –Focuses management attention on security and response issues.

Example: Incident Response Process From infocus/1467

Developing a Notification Plan Who do you notify: –Law enforcement –Regulatory authorities –Clearinghouse organizations, such as CERT –Business partners –Bugtraq The choice is up to the victimized firm. –In 2002, CSI/FBI Computer Crime and Security Survey reported that only 60% of known intrusions were reported to anyone not directly involved and 34% to law enforcement. These numbers occur because some firms may not want to expose any breaches in their networks to the public, the risk of liability, and delays and costs in formal investigations.

Secure-Use Procedures: Technology

Shut Down Unnecessary Services Network Administrators should review all active ports. –Ports: interfaces, or entry/exit points, to a network –Common Ports 80-http 23-Telnet 43-SSL 110-POP3

Set up and Maintain Permissions Securely Permissions are privileges granted to each user that control what data and applications that user has access to. –Controlled by system admin –Can be from read-only to full admin privileges –Limitations can help distinguish honest and dishonest employees: security by ignorance Roles, or access-level categories, are an effective way to manage permissions where users are assigned specific access levels to the server

Conduct Background Checks A thorough background investigation of everyone being considered for a system administrator job should be conducted rigorously prior to employment –Rotating responsibilities among a team makes it difficult to hide dishonesty

Enforce Strong Passwords Rules for strong passwords: No default passwords Minimum 10 characters with symbols and #s Change at least every 4 months Any others?

Review Partner Contracts Network of business partners become an extension of the business’s own network. –Ask for 3 rd party certification of info security practices –Build in provisions into contracts that provides protection

Audit and Update One area of liability that is often ignored is the use of unlicensed software. –Software vendors are entitled to conduct audits to ensure license compliance. –The best way to protect your company is to periodically survey all computers for illegal applications proactively. –Failure to address known vulnerabilities in commercial software become vulnerabilities for hackers to exploit

Physical Security Ways to keep information physically secure –Use encryption on all offline storage of sensitive data –Make sure all the network devices in the field are in physically secure place –Dispose of old computers with extreme care.

Auditing …. Acts as a legal deterrent and demonstrates diligence Similar to financial audits – certify with outside agency Beyond technology: include documentation, training and personnel …includes Testing Test response of defensive technology and designated response team Backup sites should be included

Other Secure Principles and Practices

Insurance Now available to cover liability from virus transmission and confidential info release, business interruption, loss of income from DoS attack cts/esurance.htmlhttp:// cts/esurance.html Staying Current Need I say more?

Reinforcing Secure-Use Procedures Warning vs Welcome message –Welcome message must be after warning –Court ruling found incorrect order implies authorization Rewards are as important as reprimands Rewarding Secure Behavior

Worst Practices

Dangerous Practices forwarding auto reply/responders allow system to send prepared message automatically to each it receives –Spammers are guaranteed responses HTML IM

Dangerous Sharing Practices P2P Network - 2nd most effective way (mail 1st) for malware distribution Software downloads - spy ware, Trojan horses Unauthorized users-PCs and PDAs shared with others unfamiliar with AUP Public networks and wireless networks - open PC to anyone monitoring

Summary Secure-Use Practices help control risks and dangers through the use of policies and technology The effectiveness of security practices depends on the relationship to the business culture and diligence of staff The key is to balance security and capability