Nazim Kasumzade Public Treasury Agency Baku, Azerbaijan 02 October 2013.

Slides:



Advertisements
Similar presentations
© Caveon, 2006 Under Lock and Key: Conducting a Physical Security Audit John Fremer, Ph.D – President, Caveon Jamie Mulkey, Ed.D. – Sr. Director Caveon.
Advertisements

h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as.
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
4 Information Security.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Lecture 1: Overview modified from slides of Lawrie Brown.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security Controls – What Works
Riverside Community School District
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
A User-centric, Anonymous and Interoperable pan-European eID Pavel Sekanina September 13th, 2006.
Network security policy: best practices
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Data Security GCSE ICT.
SEC835 Database and Web application security Information Security Architecture.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
D2-02_09 Construction of Next-generation Security Infrastructure to Cope with Next Types of Cyber Attacks Takehiro Sueta Kyushu Electric Power Co., Inc.
INTERNAL AUDIT IN UKRAINE State Financial Inspection of Ukraine
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Joseph Kummer Terri Berry Brad White.  1. Specific instances of employee hacking and the consequences which resulted therefrom.  2. How employees utilize.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Security Architecture
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
7 Information Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security.
Introduction to Information Security
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
INTERNET SAFETY.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Ministry of Finance of the Republic of Azerbaijan State Treasury Agency Public Finance Management Information System.
Access Control for Security Management BY: CONNOR TYGER.
Computer Security Sample security policy Dr Alexei Vernitski.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Legal framework of the statistical system RK Law on State statistics: the basic provisions of the Law are in line with ЕС recommendations (Model Law on.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
THE CENTRAL SECURITY PLATFORM GUARDIAN360 IS PART OF THE INTERMAX GROUP.
Welcome to the ICT Department Unit 3_5 Security Policies.
UNIT V Security Management of Information Technology.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Mirjana Boshnjak Skopje, 20 to 22 September 2017
Fundamentals of Information Systems
Answer the questions to reveal the blocks and guess the picture.
CHAPTER 4 Information Security.
Move this to online module slides 11-56
Lesson 1: Introduction to HIPAA
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Nazim Kasumzade Public Treasury Agency Baku, Azerbaijan 02 October 2013

Content: Internal risks External risks Formal procedures and software solutions to control IT administrators Findings, conclusions and suggested solutions

Overall, principles of storage and access to confidential information, principles of IT systems building are similar in private and public sector. It is a common belief, that large private companies spend more and, accordingly, have a much better protected system. This presentation studies some general approaches applied both in Treasury and in private sector.

The most probable risks associated with daily operations in Treasury include : Access to confidential information without due authorization, particularly, by IT people and IT administrators Possible deliberate damage caused by IT administrators Negligence of system administrators Overall, we can distinguish the following classes: Users Entrepreneurs Peepers Spies Avengers

Access to confidential information In absence of formal procedures and regulations on access to confidential information, system administrators will either have a direct and unlimited access, or can obtain it by applying usually minimum efforts. One should understand that it is impossible to ban access of system administrators to confidential information, but, if one applies the correct approach, it is possible to regulate and control their access to such information. System administrators can do it just for fun (behavioral problem), but it can also be a deliberate action, which can entail serious consequences.

Resentful system administrators Employees of other units in an organization usually have a rather vague idea about ways and possibilities in terms of access to information and system as such the IT people have. In reality, system administrators have all passwords to access the root file system on servers, passwords to database, network passwords, and enjoy unlimited powers to launch any command. What if one of these employees feels resentful at the management of the company?

Negligence of system administrators IT risks will also include negligence of system administrators, which can lead to undesirable consequences. Even if it is an unintentional risk, it can also lead to rather deplorable results. What if a system administrator accessed the server as super-user and forgot to sign out while leaving it?

Examples: Edward Snowden – IT specialist Terry Childs – network administrator from San Francisco Jason Cornish – IT specialist Sergei Aleinikov – IT specialist Roger Duronio – system administrator

External risks Different forms of attacks are used both to gain access to confidential information and to cause damage : attacks can be different : External hacking of the network Introduction of a trojan program Blocking servers from external access Changing the internal code of the used software

Formal Procedures and Software Solutions to Control IT Administrators used in Azerbaijan Treasury Our Treasury uses the principle of double control (two button rule) for authorization as root user, which requires introduction of a password by two employees. The same principle applies in case of the need to introduce some changes in software – any such change must be confirmed by two people in charge. We use Spectorsoft solutions to monitor activities of administrators and all other users of the system. Server rooms are equipped with cameras and sensors, which will send alarms if anybody penetrates the room Authorities of a system administrator are duplicated by external consulting service The network is managed by the Ministry, which excludes any possibility for system administrators to introduce any change

Findings, conclusions and suggested solutions Regular IT system audit Strict criteria for selection of IT personnel Internal rules for regulation of IT access