Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010
Introduction Easy to define but hard to master Covers everything that can go wrong while computers are running It mainly examines the following controls: Operators Hardware Media Who should be involved with computer operations security? Every person interact with the system internally or externally Every technology that is part of the system
How to plan? The plan should be derived by asking right questions such as: How many security events were identified? How to control access privileges? Plan should show the ROI by asking the right questions such as: What will be the losses if not implemented. How much will it cost?
Critical O. S. Controls Operation controls focus on the following aspects: Resources protection Accountability, violation processing and user access authorities Access-Privileges Hardware, storage, I/O operations and activity logs Change Management Scheduling, applying, implementing and reporting Hardware
Resource Protection Securely guard the organizations Computing resources Loss Compromise Communication Balance of the security implementation depends on: Value of information Business need for the information Benefits are: Decrease possibility of damage to data Limit disclosure and misuse of data
Resource Protection Access given to individual users At a specific time Track access log Practices to enhance accountability and authority can be via: Users understanding the importance of passwords Users understanding the privacy regulations and its importance to avoid legal issues Plans for management changes must be in place
Access Privileges Hardware access Isolation between unrelated storages Enables controlling unauthorized access I/O operations and devices Should be verified before execution of privilege program Activity logs Auditing
Change Management Managing change steps: Introduce change Change log Scheduling change Implementing change Reporting change Why following those steps? Reduce the impact of change on services
Hardware Hardware access is via operating system software. Physical security of hardware Storage Unauthorized access