Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
System Security Scanning and Discovery Chapter 14.
Security Controls – What Works
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
Chapter 7 HARDENING SERVERS.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Information Security Technological Security Implementation and Privacy Protection.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
Evolving IT Framework Standards (Compliance and IT)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Security Architecture
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Module 14: Configuring Server Security Compliance
Chapter 6 of the Executive Guide manual Technology.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Note1 (Admi1) Overview of administering security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Introduction to Information Security
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Information Security tools for records managers Frank Rankin.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Systems Security
Securing Information Systems
Chapter 17 Risks, Security and Disaster Recovery
Security Management Practices
Securing Information Systems
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
Security week 1 Introductions Class website Syllabus review
Cybersecurity Threat Assessment
Presentation transcript:

Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security

Web Security for Network and System Administrators2 Objectives In this chapter, you will: Define basic security concepts Begin to assess security risks Outline a security policy Locate information security resources

Web Security for Network and System Administrators3 Basic Security Concepts Confidentiality – only authorized individuals can access data Integrity – data changes are tracked and properly controlled Availability – systems are accessible for business needs

Web Security for Network and System Administrators4 Basic Security Concepts Physical security – protect people, equipment, and facilities Privacy – critical data is not released to the wrong people Marketplace perception – the way the company is perceived by customers, partners, and competitors

Web Security for Network and System Administrators5 Assessing Risk Check existing security policies and processes Analyze, prioritize, and categorize resources by determining: total cost of ownership, internal value, and external value. –TCO refers to the total monetary and labor costs calculated over a specific time period –Internal value refers to the monetary assessment of the importance of a particular asset to the internal working of a company –External value refers to the money or another commodity that the asset brings to the company from external sources

Web Security for Network and System Administrators6 Assessing Risk Consider business concerns through the annualized loss expectancy (ALE = SLE * ARO) –Single loss expectancy (SLE) is equal to the assets value times the exposure factor (EF) Asset value = TCO + internal value + external value EF is the percentage of asset loss that is expected from a particular threat –Annualized rate of occurrence (ARO) is the estimated frequency with which a particular threat may occur each year

Web Security for Network and System Administrators7 Assessing Risk Evaluate existing security controls to determine what controls are deployed and effective Leverage existing management and control architecture to build a persuasive business case for, or against, implementing new security controls

Web Security for Network and System Administrators8 Building a Security Policy A security policy has the following three important benefits: –Communicates a common vision for security throughout a company –Represents a single easy-to-use source of security requirements –Exists as a flexible document that should be updated at least annually to address new security threats

Web Security for Network and System Administrators9 Building a Security Policy An organizations security policy should cover the following: Foreword: Purpose, scope, responsibilities, and penalties for noncompliance Physical security: Controls to protect the people, equipment, facilities, and computer assets User ID and rights management: Only authorized individuals have access to the necessary systems and network devices

Web Security for Network and System Administrators10 Building a Security Policy An organizations security policy should cover the following: Network security: Protect the network devices and data in transit System security: Necessary defenses to protect computer systems from compromise Testing: Authorized security tools and testing Auditing: Procedures to periodically check security compliance

Web Security for Network and System Administrators11 Building a Security Policy Foreword Purpose: Why is this policy being established? Scope: What people, systems, software, information, and facilities are covered? Responsibilities: Who is responsible for the various computing roles in a company? Compliance: What are the penalties for noncompliance? Which organization is responsible for auditing compliance?

Web Security for Network and System Administrators12 Building a Security Policy Physical Security Human threats: theft, vandalism, sabotage, and terrorism Building damage: fire, water damage, and toxic leaks Natural disasters: floods, hurricanes, and tornadoes Infrastructure disruption: loss of power, loss of HVAC, and downed communication lines Equipment failure: computer system damage and network device failure

Web Security for Network and System Administrators13 Building a Security Policy User ID and Rights Management User Account Creation, Deletion, and Validation – manage user accounts Password Policies – manage password parameters Access Controls - determine who gets what access to what

Web Security for Network and System Administrators14 Building a Security Policy Network Security Specific timeframes for changing passwords on the network devices Use of secure network protocols Firewalls at specific chokepoints in a network architecture Use of authentication servers to access network devices

Web Security for Network and System Administrators15 Building a Security Policy System Security The systems section is used to outline the specific settings required to secure a particular operating system or application –For example, for Windows NT 4.0, it may be a requirement that every logical drive be installed with NTFS –For a particular UNIX flavor, shadow password files may be required to hide user IDs and passwords from general users

Web Security for Network and System Administrators16 Building a Security Policy Testing and Auditing Specify requirements for vulnerability scanners, compliance checking tools, and other security tools run within the environment Require auditing logs on specific devices, periodic self-audits performed by the system administrators, and the use of security compliance checking tools Specify corporate auditing requirements, frequencies, and organizations

Web Security for Network and System Administrators17 Security Resources Security Certifications CISSP SSCP GIAC CISA CIW Security Professional

Web Security for Network and System Administrators18 Security Resources Web Resources

Web Security for Network and System Administrators19 Summary The CIA triad categorizes aspects of information that must be protected from attacks: confidentiality, integrity, and availability. The PPP triad depicts security, privacy, and marketplace perception as three additional abstract concepts that should drive security efforts.

Web Security for Network and System Administrators20 Summary The first step in creating an effective security policy is to perform a risk assessment within the environment. A risk assessment consists of five steps: –Check for existing security policies and processes –Analyze, prioritize, and categorize resources –Consider business concerns –Evaluate existing security controls –Leverage existing management and control architecture To estimate potential financial loss from security threats, the following formula works well by accounting for the most important cost factors associated with security: ALE = SLE * ARO. A security policy has three major benefits. It: –Communicates a common vision for security throughout a company –Represents a single easy-to-use source of security requirements –Exists as a flexible document that should be updated at least annually to address new security threats

Web Security for Network and System Administrators21 Summary An effective security policy includes security requirements in the following areas: –Physical security –User ID and rights management –Systems –Network –Security tools –Auditing There are a number of security-related certifications to help security professionals quantify their knowledge on a resume. Every security professional must stay current about the latest threats through Web resources, mailing lists, and printed materials.