Information Systems Security Operations Security Domain #9.

Slides:



Advertisements
Similar presentations
© Peter Readings Data Leakage Pete Readings CISSP.
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
Ch.5 It Security, Crime, Compliance, and Continuity
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security Controls – What Works
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Network Security Testing Techniques Presented By:- Sachin Vador.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Auditing for Security Management By Cyril Onwubiko Network Security Analyst at COLT Telecom Invited Guest Lecture delivered at London Metropolitan University,
SEC835 Database and Web application security Information Security Architecture.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Information Systems Security Computer System Life Cycle Security.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
ITSC Writing an Operational Security Plan E. Jane Powanda FISSEA 2005 Conference March 22,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Operations Security CISSP Guide to Security Essentials Chapter 7.
Information Systems Security Operational Control for Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Engineering Essential Characteristics Security Engineering Process Overview.
Note1 (Admi1) Overview of administering security.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chapter 2 Securing Network Server and User Workstations.
Module 11: Designing Security for Network Perimeters.
Chap1: Is there a Security Problem in Computing?.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Welcome to the ICT Department Unit 3_5 Security Policies.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Cybersecurity: Risk Management
Information Systems Security
Blackboard Security System
Risk management.
INFORMATION SYSTEMS SECURITY AND CONTROL.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Operations Security.
Introduction to the Federal Defense Acquisition Regulation
IS4680 Security Auditing for Compliance
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Presentation transcript:

Information Systems Security Operations Security Domain #9

Operations Security Objectives  Operations Responsibility & Personnel  Configuration Management  Media Access Protection  System Recovery  Facsimile Security  Vulnerability and Penetration Testing  Attack Types

Computer Operations  Fixing Hardware and software issues  Media Libraries  Controlling Remote Access  Contingency Planning  Incident Handling  Licensing Issues  Input Controls  Backup and Recovery

Threats to Operations  Disclosure  Destruction  Loss of system and network capabilities  Corruption and Modification  Theft  Espionage  Hackers/Crackers  Malicious Code

Issues  Backup Maintenance  Change workstation/location –Used to improve security  Need to Know Required  Least Privilege Principle Enforced  Due Care  Due Diligence –U.S. Federal Sentencing Guidelines of 1991  Up to 290M for non-performance

Security Control Types  Directive control –Used to guide the security implementation  Preventive control –Can deter or mitigate undesirable actions  Detective control –Verifies whether a control has been successful  Corrective control –Used to reverse the effects of an unwanted activity

Examples  Directive – policies, standards, laws  Preventive – firewalls, authentication, access controls, antivirus software  Detective – audit trails, logs, CCTV, CRC  Corrective – incident handling, fire extingiuishers

Vulnerability Testing  Things to agree upon –Goals of the assessment –Written agreement from management –Explaining testing ramifications –Understand results are just a ‘snapshot’

Steps in Testing  Reconnaissance –Obtain info either passively or actively  Sniffing, eavesdropping, ARIN, Whois, etc.  Scanning –ID systems that are running and active services  Ping sweeps and port scans  Gaining Access –Exploiting vulnerabilities to gain access  Buffer overflow, brute force

More Steps  Maintaining Access –Uploading software to ensure reentry  Trojan Horse, backdoor  Covering Tracks –Hide one’s malicious activities  Delete system and application logs

Honeypots  Usually placed in DMZ –Should not be connected to internal network  Sacrificial lamb system  Goal is that hackers will attack this system instead of production system  Leaves many ports open and services running to be more ‘enticing’

Sensitive Media Handling  Marking  Handling  Storing  Destruction  Declassification

Continuity of Operations  Fault Tolerance –Software –Hardware  Data Protection –RAID 0, 1, 5, 10  Redundant Communications –Phone, Broadband, Wireless, Satellite  Redundant Power Supplies

Auditing  Auditing Basics –Logs, monitors, and triggers  Accountability, Compliance  Audit trails  Sampling and clipping levels  External auditors

Monitoring Tools  Warning banners  Keystroke monitoring  Traffic analysis  CCTV

More Terms  Ethical Hacking  War dialing  Radiation monitoring  Dumpster diving  Social engineering

Physical Security  Facility Location and construction  Electrical Issues  Perimeter Protection  Physical Intrusion Detection  Fire Prevention

Threats  Physical Damage  Theft of Assets  Interruption of Service  Disclosure of Proprietary Information  Natural Disaster  Vandalism  Terrorism

Administration Controls  Facility construction  Site management  Personnel controls  Emergency procedures  Awareness training

Technical Controls  Access controls  Alarms  CCTV/Monitors  HVAC  Power Supplies  Fire detection and suppression