Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Emergency Action Plans
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
The three essential ingredient for creating a fire are HEAT, AIR AND FUEL Fire triangle.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
General Security Principles and Practices Chapter 3.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Information Security Principles and Practices
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Factors to be taken into account when designing ICT Security Policies
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Chapter 7: Assuring Safety and Security in Healthcare Institutions
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Network security policy: best practices
The Impact of Physical Security on Network Security
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
General Security Principles and Practices. Security Principles Common Security Principles Security Policies Security Administration Physical Security.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Appendix C: Designing an Operations Framework to Manage Security.
Fire Hazards (this is not an introduction to urban warfare)
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chapter 2 Securing Network Server and User Workstations.
Physical (Environmental) Security
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Database Administration
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
P RINCIPLES OF N ETWORKING S ECURITY C HAPTERS 3 & 4 Matt Lavoie NST
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Physical security By Ola Abd el-latif Abbass Hassan.
Reference: Diversified Health Occupations. Required by many health care facilities To be worn when lifting or moving Effectiveness is controversial, reminds.
The NIST Special Publications for Security Management By: Waylon Coulter.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Engineering Environment Awareness
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Information Systems Security
CS457 Introduction to Information Security Systems
Information Security Policy
CompTIA Security+ Study Guide (SY0-401)
Risk management.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Managing the IT Function
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Chapter 3

 Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues

 Protection = Prevention + (Detection + Response).  Prevention techniques are static barriers to the intruders.  Detection and Response technologies are dynamic and an ongoing process.

 Systems, technologies and network constantly change with time, thus we have to monitor the systems regularly.  Monitoring the security infrastructure in the organization is an essential part of any organization’s security program.

 An organization’s security framework is very important in implementing the security.  Security framework includes ◦ Policies ◦ Procedures ◦ Standards ◦ Guidelines

 Policies are high-level, broad statements of what the organization wants to accomplish.  Policies are formulated by management when laying out organization's position on some issue.

 Standards are mandatory elements regarding the implementation of a policy.  They are accepted specifications providing specific details on how a policy is to be enforced.  Standards can be set by the organization or by an external agency.

 Guidelines are recommendations relating to a policy.  Guidelines are optional.

 Procedures are the steps-by-step instructions on how to implement policies in the organization.  Procedures describe exactly how employees are expected to act in a given situation.

 The policies, procedures, standards and guidelines are dynamic.  They must be revises periodically.  The operational security lifecycle has 4 phases ◦ Plan (adjust) ◦ Implement ◦ Monitor ◦ Evaluate

 Planning - In this stage, all the policies, procedures, standards and guidelines for your organization’s security are developed and designed.  Implement - In this stage you implement and enforce the policies, procedures, standards and guidelines. All the employees affected by these new policies, procedures, standards and guidelines will come to know about these changes.

 Monitoring - In this stage, all the policies, procedures, standards, guidelines, hardware and software are monitored to check the effectiveness of organization’s security.  Evaluate – In this stage, all the policies, procedures, standards and guidelines are again re-evaluated to ensure that the security is adequate.

PlanImplementMonitorEvaluate

 The basic idea of a security perimeter is to provide a “complete” security to the corporate network.  Access by external entities to the corporate network (Internal) is controlled and monitored via the security perimeter.

Internet Telephone Company

 The purpose of access controls is to restrict access to only those who are authorized to have it.  Common forms of physical access controls are the use of security guard and the lock (including many new variations of the combination locks)

 Physical security consist of all the mechanisms used to ensure that physical access to the computers and the networks is restricted to only authorized users.  Physical security adds an extra layer of security and protects the sensitive data.

 Physical barriers provide the outmost security.  These barriers are highly visible to the public.

 Biometrics is a more sophisticated access control approach.  Examples – fingerprint readers, retinal & iris scan, voice samples.  Biometric solutions are very expensive to implement.

 Social engineering is the process of convincing an authorized individual to provide confidential information or access to an unauthorized individual.  Social engineering exploits the weakest point in the security perimeter – humans.  The ultimate goal of social engineering is to gradually obtain the pieces of information.

 The best way to stop social engineering is through training all the employees and instructing not to give out any piece of information.  Data Aggregation - Small and seemingly “unimportant” information may be combined with other pieces of information to potentially divulge sensitive information.

 Environmental issues deals with the general operating conditions, within which an organization operates.  Environmental issues include items like heating, ventilation, air conditioning, electrical power and the “natural forces”.  Environmental factors are used to maintain the comfort of an office environment.

 In case of electric power outage, UPS can be critical.  If natural disasters are common, having a complete backup plan is must.  In some cases, a separate off-site location can also me used.

 Fire is one of the most common reasons for the loss of data in an organization.  Common ways of fighting the fire are: ◦ Water bases fire suppression systems ◦ Chemical based fire suppression systems ◦ Handheld fire suppression systems ◦ Fire detection systems

 Very commonly used systems.  Can have adverse effects of computer and electrical systems.

 Clean Agent Fire Suppression Systems. ◦ Uses CO 2 ◦ Safe for general usage  Halon Bases Fire Suppression System ◦ Not used anymore ◦ Very dangerous on human health

Class of FireType of FireExample of Combustible Material Examples of Suppression Methods A Common Combustibles Wood, Paper, ClothWater and dry chemicals B Combustible LiquidsPetroleum ProductsCO 2 or dry chemicals C ElectricalElectrical Wiring and equipments CO 2 or dry chemicals D Flammable MetalsMagnesium, TitaniumCopper metal or sodium chloride

 Fire detection devices are of several types ◦ Smoke Activated ◦ Temperature Activated ◦ Flame Activated

 Wireless environment provides portability.  Wireless networks are prone to security threats, if not properly secured.