Enterprise Security Management Franklin Tinsley COSC 481.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Managing Hardware and Software Assets
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies Scalability.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
Guide to Network Defense and Countermeasures Second Edition
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Chapter 19: Network Management Business Data Communications, 4e.
Data - Information - Knowledge
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
A Case Study for the Value of GSA protocol implementation The Canadian Experience.
VENDORS, CONSULTANTS AND USERS
5205 – IT Service Delivery and Support
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
C ALL C ENTER O PTIMIZATION P ROJECT J.P. Cap + Vitality, Inc. | J.P. Cap |
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
1 DATABASE TECHNOLOGIES BUS Abdou Illia, Fall 2007 (Week 3, Tuesday 9/4/2007)
BUSINESS DRIVEN TECHNOLOGY
Understanding Data Warehousing
Lessons Learned in Smart Grid Cyber Security
COEN 252 Computer Forensics
Nurjana Technologies Company Presentation. Nurjana Technologies (NT) is a small business enterprise founded in 2012 and operating in Aerospace and Defence.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
BUSINESS B1 Information Security.
APC InfraStruxure TM Central Smart Plug-In for HP Operations Manager Manage Power, Cooling, Security, Environment, Rack Access and Physical Layer Infrastructure.
Protect critical information with a smart information-based-risk management strategy. Prepared by: Firas Mohamed Taher.
The Smart Grid Enabling Energy Efficiency and Demand Response Clark W
Business Analysis and Essential Competencies
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Honeypot and Intrusion Detection System
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Enterprise Solutions Chapter 12 – Mobility and Its Need in an Enterprise.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security Vulnerabilities in A Virtual Environment
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Smart cloud orchestrator - the first implementation in the world at Wroclaw University of Technology for supporting design processes in education at universities.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Role Of Network IDS in Network Perimeter Defense.
CSC 351 FUNDAMENTALS OF DATABASE SYSTEMS. LECTURE 1: INTRODUCTION TO DATABASES.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Basic Concepts of Software Architecture. What is Software Architecture? Definition: – A software system’s architecture is the set of principal design.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Monitoring Windows Server 2012
Chapter 19: Network Management
Types of Information system
HUAWEI eSight Secure Center Feature Introduction
Transforming IT Management
IT INFRASTRUCTURES Business-Driven Technologies
Presentation transcript:

Enterprise Security Management Franklin Tinsley COSC 481

Overview Introduction Examples of PSP’s Point Solution Products What is ESM What ESM Does Purpose Desired Properties of ESM Conclusion

Introduction Given the important role of information technology in today’s enterprise, information security is a key component in modern planning and management. However as enterprises continue to grow larger security continues to become more challenging. To meet this challenge, security vendors began providing point solution products for known security problems.

Examples of PSP’s Firewalls control access to company network IDS monitor possible intrusions Sniffers analyze packets transmitted in and out of networks Antivirus Software mitigate risk of virus attacks

Point Solution Products Usually come from different vendors and run on different operating systems. This results in large complex environments, because of the different pieces of hardware, operating systems and application software. Each product performs the functions that is was designed to do. However as a whole the products are not usually compatible and often do not talk to each other.

What is ESM ? Enterprise Security Management involves creating enterprise wide security solutions and managing security information from an enterprise perspective. This occurs by creating a solution that determines the best way to design and configure the products to complement and enhance the security solution

What ESM Does ESM centralizes network information in one local place and has the ability to collect, process and report in real time the various types of security devices or applications deployed on a network ESM takes into account the business function of the network and the mission criticality of the information residing in the network device.

ESM Cont ESM must be flexible enough to provide efficiency in information transfer, filtration and transmission minimizing network congestion. While allowing peer to peer communication and continuous growth for future network expansion.

Purpose The purpose of ESM is to help reduce the amount of data that is forwarded to the analysts by only forwarding important events, reducing the number of false positives, leaving more time to deal with actual attacks. Allowing for more insightful decisions during the decision making process.

Holistic Approach Holistic Approach- Taking into account the nature of the business, the security information captured, and its relationship to the organization’s security policy. Ensuring that the solution chosen is relevant to the enterprise and serves the correct security need.

Event Correlation Event Correlation- Takes information from diverse sources and find relationships that are not immediately obvious. This results in improved incident response with relevant solutions to problems.

Centralized Management Centralized Management- ESM should allow for an enterprise view of security in the organization from a central location. Allowing for remote deployment of policies to multiple devices along with communication between the control point and remote devices.

Portability The ESM should be platform independent. This will ensure that deployment is not a costly process when the organization has to modify its business to a new environment when ESM is deployed

Conclusion As a result of the level of complexity that goes with capturing, classifying analyzing and correlating different types of data from a number of sources enterprise security management will remain a demanding task. However management will be able to make better decisions regarding the business and security based on the information gathered.

References sei/features/2005/1/feature htmhttp:// sei/features/2005/1/feature htm als/practicals/gsec/2750.phphttp:// als/practicals/gsec/2750.php Matunda Nyanchama, PhD, CISSP & Paul Sop, CISSP, CISA. “Enterprise Security Management: Managing Complexity” hitepapers_form.htmlhttp:// hitepapers_form.html