Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 6 Enterprise Security.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Information Technology Disaster Recovery Awareness Program.
Information Technology Awareness Wayne Donald IT Security Officer.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 14 Security Policies and Training.
Chapter 10: Operational Security Security+ Guide to Network Security Fundamentals Second Edition Instructor by Sukchatri PRASOMSUK.
Security Awareness: Applying Practical Security in Your World
Security+ Guide to Network Security Fundamentals
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Security+ Guide to Network Security Fundamentals, Fourth Edition
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Processing Integrity and Availability Controls
Computer Security: Principles and Practice
Computer Security Fundamentals
Factors to be taken into account when designing ICT Security Policies
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Business Crisis and Continuity Management (BCCM) Class Session
Incident Response Updated 03/20/2015
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Security Awareness Norfolk State University Policies.
Chapter 11: Policies and Procedures
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Information: Policy, Strategy and Systems Module Overview
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Note1 (Admi1) Overview of administering security.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
IT in Business Issues in Information Technology Lecture – 13.
Chapter 2 Securing Network Server and User Workstations.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Introduction to Information Security
Chapter 10: Operational Security Security+ Guide to Network Security Fundamentals Second Edition.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Policies and Procedures Security+ Guide to Network Security Fundamentals Chapter 11.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
CompTIA Security+ Study Guide (SY0-401)
Chapter 8 – Administering Security
Computer Security Fundamentals
Chapter 17 Risks, Security and Disaster Recovery
Unit 7 – Organisational Systems Security
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
CompTIA Security+ Study Guide (SY0-501)
IT INFRASTRUCTURES Business-Driven Technologies
6. Application Software Security
Presentation transcript:

Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 6 Enterprise Security

Security Awareness: Applying Practical Security in Your World, 2e 2 Objectives Explain how physical security protects an organization Tell the difference between enterprise policies and plans, and list examples of each Give examples of different types of training and education Define ethics

Security Awareness: Applying Practical Security in Your World, 2e 3 Physical Security Protects equipment and has one primary goal –To prevent unauthorized users from reaching the equipment to use, steal, or vandalize it Rack-mounted servers –Typically 1.75 inches (4.45 centimeters) tall –Can be stacked with up to 50 other servers in a closely confined area –Typically connected to a single KVM (keyboard, video, mouse) switch

Security Awareness: Applying Practical Security in Your World, 2e 4

5

6 Physical Security (continued) KVM switches –Connection ports allow analog or digital connections from Rack-mounted servers or Connections over network cables –Some have a lock that restricts access In addition to securing device itself –Also important to securing the room containing device

Security Awareness: Applying Practical Security in Your World, 2e 7 Physical Security (continued) Basic types of door locks –Preset lock –Deadbolt lock Cipher locks –Combination locks with buttons that user must push in proper sequence to open door –Keep record of when door was opened and by which code

Security Awareness: Applying Practical Security in Your World, 2e 8

9

10

Security Awareness: Applying Practical Security in Your World, 2e 11 Physical Security (continued) Other physical vulnerabilities in an office –Suspended ceilings –HVAC ducts –Exposed door hinges –Insufficient lighting –Dead-end corridors

Security Awareness: Applying Practical Security in Your World, 2e 12 Enterprise Policies Policy –Document that outlines specific requirements or rules that must be met –Characteristics Communicates a consensus of judgment Defines appropriate behavior for users Identifies what tools and procedures are needed. Provides foundation for human resource action in response to inappropriate behavior Makes the process of prosecuting violators clearer and more fair

Security Awareness: Applying Practical Security in Your World, 2e 13 Security Policy Outlines protections that should be enacted to ensure organization’s assets face minimal risks Effective security policy –Must carefully balance trust and control Three models of trust –Trust everyone all of the time –Trust no one at any time –Trust some people some of the time

Security Awareness: Applying Practical Security in Your World, 2e 14

Security Awareness: Applying Practical Security in Your World, 2e 15 Acceptable Use Policy (AUP) Defines actions users may perform while using the computing and networking equipment Typically covers all computer use –Including Internet, , Web, and password security Should provide explicit prohibitions regarding security and proprietary information Unacceptable use should also be outlined

Security Awareness: Applying Practical Security in Your World, 2e 16 Enterprise Plans A plan –A “call to action” outlining what must be done Plans that are often used –Business continuity plan –Disaster recovery plan

Security Awareness: Applying Practical Security in Your World, 2e 17 Business Continuity Plan Process of –Assessing risks –Developing management strategy to ensure that business can continue if risks materialize Addresses anything that could affect the continuity of service over the long term

Security Awareness: Applying Practical Security in Your World, 2e 18 Business Continuity Plan (continued) Business continuity management –Concerned with developing a business continuity plan (BCP) Basic steps in creating a BCP –Understand the business –Formulate continuity strategies –Develop a response –Test the plan

Security Awareness: Applying Practical Security in Your World, 2e 19 Maintaining Utilities Uninterruptible power supply (UPS) –External device located between the outlet for electrical power and a computer device If power fails, UPS can –Send message to network administrator’s computer –Notify users that they must finish their work and log off immediately –Prevent new users from logging on –Disconnect users and shut down server

Security Awareness: Applying Practical Security in Your World, 2e 20 Creating and Maintaining Backups Four basic types of enterprise backups –Full backup –Differential backup –Incremental backup –Copy backup

Security Awareness: Applying Practical Security in Your World, 2e 21 Creating and Maintaining Backups (continued) Grandfather-father-son backup system –Divides backups into three sets Daily backup (son) Weekly backup (father) Monthly backup (grandfather)

Security Awareness: Applying Practical Security in Your World, 2e 22

Security Awareness: Applying Practical Security in Your World, 2e 23

Security Awareness: Applying Practical Security in Your World, 2e 24 Disaster Recovery Plan Disaster recovery –Focused on recovering from major disasters that could cause the organization to cease operations Disaster recovery plan (DRP) –Addresses what you should do if major catastrophe occurs

Security Awareness: Applying Practical Security in Your World, 2e 25 Disaster Recovery Plan (continued) Typical outline –Unit 1: Purpose and Scope –Unit 2: Recovery Team –Unit 3: Preparing for a Disaster –Unit 4: Emergency Procedures –Unit 5: Recovery Procedures

Security Awareness: Applying Practical Security in Your World, 2e 26 Identifying Secure Recovery Hot site –Used in the event of a disaster to continue computer and network operations Cold site –Provides office space –Customer must provide and install all equipment needed to continue operations Warm site –Has all of the equipment installed –Does not have active Internet or telecommunications facilities

Security Awareness: Applying Practical Security in Your World, 2e 27 Education and Training Opportunities for security education and training –New employee is hired –Computer attack has occurred –Employee is promoted or given new responsibilities –Department is conducting an annual retreat –New user software is installed –User hardware is upgraded

Security Awareness: Applying Practical Security in Your World, 2e 28 How Learners Learn Pedagogical approach –Comes from a Greek word meaning to lead a child Andragogical approach –The art of helping an adult learn People typically learn in three ways –Visually, auditorily, and kinesthetically

Security Awareness: Applying Practical Security in Your World, 2e 29

Security Awareness: Applying Practical Security in Your World, 2e 30

Security Awareness: Applying Practical Security in Your World, 2e 31 Learning Resources Seminars and workshops –Good means of learning latest technologies and networking with other security professionals Print media –Magazines and journals are good sources for most recent material Internet –Contains a wealth of information that can be used to keep informed about new attacks and trends

Security Awareness: Applying Practical Security in Your World, 2e 32 Ethics Set of principles and behaviors that people understand and agree to be good and right Values –A person’s fundamental beliefs –Principles used to define what is good, right, and just Morals –Values attributed to system of beliefs that helps the individual define right from wrong Code of conduct –Intended to be a central guide and reference for employees in support of day-to-day decision making

Security Awareness: Applying Practical Security in Your World, 2e 33 Summary Physical security –One of the first lines of defense against attacks Policy –Document that outlines specific requirements or rules that must be met Plan –Outlines specifically what must be done

Security Awareness: Applying Practical Security in Your World, 2e 34 Summary (continued) Users need to receive training regarding –The importance of securing information –The roles that they play in security –The necessary steps they need to take to ward off attacks Ethics –The study of what people understand to be good and right