Access Control for Security Management BY: CONNOR TYGER.

Slides:



Advertisements
Similar presentations
CISSP Luncheon Series: Access Control Systems & Methodology
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Security Controls – What Works
Information Security Policies and Standards
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 Network Security.
Factors to be taken into account when designing ICT Security Policies
Stephen S. Yau CSE , Fall Security Strategies.
Payment Card Industry (PCI) Data Security Standard
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Security+ All-In-One Edition Chapter 2 – Organizational Security Brian E. Brzezicki.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Security and Privacy Strategic Global Partners, LLC.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Information Systems Security
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
In Depth Security Review Martin Rogers Computer Horizons Corp. © Copyright eB Networks All rights reserved. No part of this presentation may be reproduced,
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Access Control / Authenticity Michael Sheppard 11/10/10.
Payment Card Industry (PCI) Data Security Standard Version 3.1
Privilege Management Chapter 22.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
CPT 123 Internet Skills Class Notes Internet Security Session B.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Access Control Systems & Methodology. Access control is the collection of mechanisms that permits managers of a system to exercise a directing or restraining.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
UNIT V Security Management of Information Technology.
CS457 Introduction to Information Security Systems
Information Security, Theory and Practice.
Risk management.
Security+ All-In-One Edition Chapter 1 – General Security Concepts
IS4680 Security Auditing for Compliance
Module 8: Securing Network Traffic by Using IPSec and Certificates
Security of a Local Area Network
Lesson 16-Windows NT Security Issues
County HIPAA Review All Rights Reserved 2002.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Mohammad Alauthman Computer Security Mohammad Alauthman
Session 1 – Introduction to Information Security
Presentation transcript:

Access Control for Security Management BY: CONNOR TYGER

Access Control  In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource  People, computer programs, and even computers that process the information must all be authorized  The more sensitive or valuable the information, the stronger the control mechanisms should be  Access control is usually taken care of in three steps, which are identification, authentication, and authorization

Challenges in Access Control  Various types of users need different levels of access  Internal users, contractors, outsiders, partners, etc.  Resources have different classification levels  Such as confidential, internal use only, private, or public  Diverse identity data must be kept on different types of users  Credentials, personal data, contact information, work-related data, digital certificates, cognitive passwords  The corporate environment is continually changing

Basic Access Control Practices  Deny access to systems by undefined users or anonymous accounts  Limit and monitor the usage of administrator and other powerful accounts  Suspend or delay access capability after a specific number of unsuccessful logon attempts  Remove obsolete user accounts as soon as the user leaves the company  Suspend inactive accounts after 30 to 60 days  Enforce strict access criteria  Disable unneeded system features, services, and ports

Basic Access Control Practices  Enforce the need-to-know and least-privilege practices  The need-to-know practice is based on the concept that individuals should be given access only to the information that they absolutely require in order to do their job  The least-privilege practice says that if nothing has been specifically configured for an individual or group they belong to, the user should not be able to access that resource  Replace default password settings  Ensure that logon IDs have nothing to do with job function  Enforce password rotation and requirements such as length, contents, storage, and transmission

Three Factors in Authentication 1. The least expensive, but least secure method is using something a person knows  Passwords or a PIN 2. An expensive, but secure option is using something a person has, such as an access card 3. The most expensive, but most secure method is using the people themselves, with biometrics  The strongest authentication, referred to as two factor authentication, includes two of these three methods

Access Control Policies and Procedures  A security policy is a high-level plan that states management’s intent, pertaining to how security should be practiced within an organization.  Includes what actions are acceptable, and what level of risk the company is willing to accept  Derived from the laws, regulations, and business objectives that shape and restrict the company  Provides direction for each employee and department regarding security implementation  Also includes repercussions for not complying to the policy  Procedures, guidelines, and standards provide the details that support and enforce the security policy

Personnel Controls  Indicate how employees are expected to interact with security mechanisms  Change of Status controls indicate what security actions should be taken when an employee is hired, terminated, suspended, moved into another department, or promoted  Separation of duties should be enforced so that no one individual can carry out a critical task alone that could prove to be detrimental to the company  Rotation of duties ensures that people know how to fulfill the obligations of more than one position.  Another benefit of this is that if an individual attempts to commit fraud within his position, detection is more likely to happen if there is another employee who knows what tasks should be performed in that position, and how to perform them

Supervisory Structure  Management must construct a supervisory structure which enforces management members to be responsible for employees, and to take a vested interest in their activities  If an employee is caught hacking into a server that holds customer credit card information, both the employee and their supervisor must face consequences  Management members must also have security-awareness trainings  This helps users and employees understand how to properly access resources, why access controls are in place, and the ramifications for not using them properly

Examples of Physical Controls  Fences  Locks  Badge system  Guards  Biometrics  Proper lighting  Motion detectors  Alarms  Backups

Examples of Technical Controls  Encryption  Antivirus software  Firewalls  Routers  Protocols to preserve confidentiality and integrity of data  Protocols to enforce specific paths for communication to take place

Access Control Administration  Centralized Access Control is making one entity, either a department or individual, responsible for overseeing access to all corporate resources  This type of administration provides a consistent and uniform method of controlling users access rights  Decentralized Access Control gives control to the people closer to the resources  It is often the functional manager who assigns access control rights to employees  Changes can happen faster through this type of administration  There is a possibility for certain controls to overlap, which may cause actions to not be properly restricted

Testing of Access Controls  All security controls, mechanisms, and procedures should be tested on a periodic basis  This helps to ensure that they properly support the security policy, goals, and objectives set for them  There is a variety of tests that can be performed  A drill to test reactions to a physical attack or disruption of the network  A penetration test of the firewalls and perimeter network to uncover vulnerabilities  Evaluating employee knowledge  A review of the procedures and standards to make sure they still align with business or technology changes that have been implemented

Example of an Access Control System 

Works Cited  "Fundamentals of Information Systems Security/Access Control Systems." Wikibooks. N.p., 25 Jan Web. 06 Apr  "Information Security." Wikipedia. Wikimedia Foundation, n.d. Web. 06 Apr