Chapter 24: Auditing Dr. Wayne Summers Department of Computer Science Columbus State University

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
1 Visualizer for Audit Graphical Business Intelligence Display & Analysis Tool.
Access Control Chapter 3 Part 5 Pages 248 to 252.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Database Management System
Access Control Intro, DAC and MAC System Security.
1 Auditing CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 3, 2004.
Views Chapter 12. What Are Views? A virtual table that comprises the fields of one or more tables in the database It is a virtual table since it does.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Triggers, security and authorization in SQL Niki Sardjono Niki Sardjono CS 157A sect 2 Prof. S. M. Lee.
seminar on Intrusion detection system
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Virtual Memory Tuning   You can improve a server’s performance by optimizing the way the paging file is used   You may want to size the paging file.
1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool.
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
IIT Indore © Neminah Hubballi
Security Architecture
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Chapter 18: Introduction to Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Chapter 2 Securing Network Server and User Workstations.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapt. 7 – Hybrid Policies Dr. Wayne Summers Department of Computer Science Columbus State University
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 23: Vulnerability Analysis Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 15: Access Control Mechanisms Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Some Great Open Source Intrusion Detection Systems (IDSs)
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Computer Security Introduction
Auditing 서강대학교 문현석.
hongseok Lee, chaeyoung lee SE lab.
Database Security and Authorization
LAND RECORDS INFORMATION SYSTEMS DIVISION
Managing the IT Function
Columbus State University
Model-View-Controller
Advanced System Security
Chapter 26: Network Security
Chapter 27: System Security
Ch. 11 – Cipher Techniques Dr. Wayne Summers
Chapter 19: Building Systems with Assurance
Chapter 17: Confinement Problem
Advanced System Security
Chapter 23: Vulnerability Analysis
Chapter 28: User Security
Chapter 22: Malicious Logic
DATABASE SECURITY For CSCL (BIM).
Chapter 29: Program Security
Advanced System Security
Security in SDR & cognitive radio
Chapter 4: Security Policies
Chapter 21: Auditing Overview What is auditing?
Advanced System Security
Presentation transcript:

Chapter 24: Auditing Dr. Wayne Summers Department of Computer Science Columbus State University

2 Anatomy of an Auditing System  Logging – recording of events / statistics to provide info about system use / performance. –Mechanism for analyzing system (security, rebuilding) –Review patterns of resource usage  Auditing – analysis of log records to present info about the system in clear / understandable manner.  Logger – creates log files (records information)  Analyzer – analyzes log files  Notifier – informs analyst of the results of the audit

3 Designing an Auditing System  Implementation Considerations –What information is logged?  Syntactic Issues –What data should be placed in log file? –How should it be expressed?  Log Sanitization –Delete confidential information before making logs available –Delete before / after information is logged?  Application and System Logging

4 A Posteriori Design  Auditing to Detect Violations of a Known Policy –State-Based Auditing: uses state-based logging to record information about the system’s state and determine if state is unauthorized –Transition-Based Auditing: uses transition-based logging to record information about an action on a system to determine if the result will place the system in an authorized state  Auditing to Detect Known Violations of a Policy – check for certain behaviours

5 Auditing Mechanisms  Secure Systems –Auditing mechanisms integrated with the system design and implementation  Nonsecure Systems –Typically an add-on system

6 Audit Browsing  Text-based  Hypertext display  Relational database browsing  Replay – presents events of interest in temporal order  Graphing  Slicing – presents minimum set of log events that affect a given object