Monitoring Systems Richard Newman. Security in Depth Layered Security – Physical access control – Identification and Authentication – know who is using.

Slides:



Advertisements
Similar presentations
Access Control Methodologies
Advertisements

Access Control Chapter 3 Part 5 Pages 248 to 252.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
Information Security Policies and Standards
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Neural Technology and Fuzzy Systems in Network Security Project Progress 2 Group 2: Omar Ehtisham Anwar Aneela Laeeq
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
95-752:7-1 Operating System Features :7-2 Operating System Features Memory protection Temporary file issues Dead space issues Sandboxing Object.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
seminar on Intrusion detection system
Neural Technology and Fuzzy Systems in Network Security Project Progress Group 2: Omar Ehtisham Anwar Aneela Laeeq
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Network security policy: best practices
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Security Guidelines and Management
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
10-Conducting Security Audits. Privilege Auditing Person’s access level over an object – User should be given minimal amount of privilege necessary to.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Security Architecture
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
Operating system Security By Murtaza K. Madraswala.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Intrusion Control. CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Controlling a Computer Richard Newman. Computer Components Motherboard –CPU –RAM/daughterboards –CMOS –ROM with BIOS –I/O circuits, connectors Power Supply.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
.  Define privilege audits  Describe how usage audits can protect security  List the methodologies used for monitoring to detect security-related.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Network Security & Accounting
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Compliance Tracking Tool Activity Entry and Progress Monitoring.
Intrusion Detection System
Understand Audit Policies LESSON Security Fundamentals.
L Identify the “out-of-the-box” audit settings l Identify recommended minimum audit settings l Configure security event log settings to meet recommendations.
Security Principles.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Some Great Open Source Intrusion Detection Systems (IDSs)
Information Systems Security
Security Issues in Information Technology
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Ch.22 INTRUSION DETECTION
Design for Security Pepper.
NETWORKS Fall 2010.
Intrusion Control.
Security Methods and Practice CET4884
Chapter 2: System Structures
LAND RECORDS INFORMATION SYSTEMS DIVISION
Operating system Security
Principles of Computer Security
Evaluating a Real-time Anomaly-based IDS
12: Security The Security Problem Authentication Program Threats
INFORMATION SYSTEMS SECURITY and CONTROL
Intrusion Detection Systems
Security.
Intrusion Detection system
Operating System Concepts
Operating System Concepts
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Protection Mechanisms in Security Management
Presentation transcript:

Monitoring Systems Richard Newman

Security in Depth Layered Security – Physical access control – Identification and Authentication – know who is using system Individual authentication – for audit Detect patterns of behavior – Logical Access Control Programs, files, resources, etc. Check – use issues – Real-time monitoring IDS – Off-line monitoring Audit Forensic uses Chain of control

Computer System Monitoring - Detection – May be done at any level – Pattern matching – Statistical anomaly – Self/Non-self - Classification – Severity level – Special considerations - Response – Event logging – alert to user/admin Per event Digest – RT call/page/IM – System reconfiguration

Event Logging - System log – Start-up, shut-down of system, major processes – Opening/closing of important files, major resources - Security log – Major access control requests, logins – Access control failures - Application logs – Application specific events

Log Entry Append-only file – Prevent log entry modification or loss Log entry fields – Time and date of event – Event source (process/component) – User identity – Event type – Event details – depend on event type

Event Logging Mechanisms Process detects an event – configured to log – Creates log entry – Puts entry in buffer – Alerts logging process Logging process retrieves event from buffer – Classifies as worthy of collection or not Logging process writes events to audit log – Log selection – May fire other responses also Sysadmins review audit log – Data mining – Direct study Archiving – Signature, compression

Access Control Strategies - Islands – Isolation and mediation – Untrusted process given “sandbox” - Vaults – Access to wider (more dangerous) resources requested individually with system mediation on a case-by-case basis – Required for access to shared resources - Puzzles – Process uses secret or hidden information to access desired resources – must be impractical to find it or to guess – Cryptography, steganography, security through obscurity - Patterns – Access patterns compared with known bad patterns, blocked or audited if match (virus signatures) – Normal access patterns noted and deviations detected (anomalies)

External Requirements & Policy Treat external reqts as separate input to policy – Allows compliance tracking Treat possible legal or contractual problems as risks – Acknowledges non-compliance as risk Treat certifications as assets – More than marketing