IST346:  Information Security Policy  Monitoring and Logging.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Intrusion Detection Systems and Practices
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Lecture 11 Intrusion Detection (cont)
Network security policy: best practices
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Security Guidelines and Management
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
APA of Isfahan University of Technology In the name of God.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 14: Configuring Server Security Compliance
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Security at NCAR David Mitchell February 20th, 2007.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 2 Securing Network Server and User Workstations.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Frontline Enterprise Security
CIT 470: Advanced Network and System Administration
NetTech Solutions Protecting the Computer Lesson 10.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Role Of Network IDS in Network Perimeter Defense.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Intrusion Detection system
6. Application Software Security
Presentation transcript:

IST346:  Information Security Policy  Monitoring and Logging

Today’s Agenda  Overview of Information Security  SA Activities Surrounding Information Security  Incident Management  System Monitoring and Logging

An overview of Information Security

Security is the relationship among Assets VulnerabilitiesThreats What you’re trying to secure Your weaknesses What you’re securing from

Assets  The user’s identity – login account  Network bandwidth – denial of service, bot-nets  Storage / Disk space - warez  Data – the most important asset of them all  Reputation – one incident can ruin a reputation.

Vulnerabilities  Bad default, or weak passwords passwords.  Unused services with open ports.  Un-patched software vulnerabilities.  Transmitting data in clear text.  Open networks (modems, wired, or wireless)  Physical access to systems.  The users themselves.

Threats  Financial motives Identity theft Phishing Spam Extortion Botnets  Political motives Danish sites hacked after Mohammed cartoons.  Personal motives Just for fun. Insider revenge.

Goals of Security: Data Protection Data Integrity System Integrity System Availability Keep data safe Keep data accurate Keep systems operational Keep systems accurate “To protect and to serve your systems and data.”

Defense Types Perimeter Security  Firewall off network to prevent intrusions.  What about wireless?  What about mobile computing? Defense in Depth  Secure systems at all levels:  Network perimeter (firewall)  Intrusion detection  System hardening

Defenses Vulnerability mitigation  Use secure authentication systems.  Deploy software in secure configuration.  Patch security flaws quickly. Attack mitigation  Firewalls to prevent network attacks.  IDS to detect attacks.  Virus/spyware scanners. User Education and Awareness  Prevent Socal engineering

Social Engineering  The human element of security  Users are the weakest link  Preys on people’s inherent trust in others  Kevin Mitnick - Famous Hacker  Author of “The Art of Deception” and “No Tech Hacking”  One of his many social engineering stories 

SA Security Activities

Activity OS / Server Hardening 1. Secure the physical system. 2. Install only necessary software. 3. Keep security patches up to date. 4. Delete or disable unnecessary user accounts. 5. Use secure passwords. 6. Disable remote access except where necessary. 7. Setup least privilege access. 8. Run publicly accessible services in a jail. 9. Check logs regularly. 10. Configure firewall on each host. 11. Run security scanner to check security. 12. Document security configuration.

Slide #14 Security Activity: Log Checking  Review logs every morning.  Better yet, have a program scan them. Logwatch / swatch  Send logs to a central server for security: attacker can’t hide tracks by deleting ease of use: you can read all logs in one place

Slide #15 Activity: Security Scanning Scan host security Run bastille on host (linux). Run scw on Windows Scan network security (Linux tools –free) Scan for open ports with nmap. Scan for vulnerabilities with nessus.

Slide #16 Activity: Intrusion Detection Host-based intrusion detection Check if system files are modified. Check for config / process modifications. Tools: tripwire, osiris, samhain Network-based intrusion detection NIDS = Sniffer + traffic analysis + alert system. Check for suspicious activities: port scans, etc. Check for attack signatures: worms, etc. Tools: snort, air snort

Slide #17 Activity: Security Auditing Internal and External Audits  Internal: by a group within organization.  External: by a group external to organization. Audit areas  Check compliance with security policy.  Check physical security of building, data center.  Check that machines have up to date patches.  Scan networks to verify hosts + services.  Penetration testing.

Security Policy / Incident Reporting

Security Policies User Level Policies Users must sign before receiving resources. 1. Acceptable Use Policy 2. Monitoring and Privacy Policy 3. Remote Access Policy Business Level Policies 1. Network Connectivity Policy 2. Log Retention Policy

Slide #20 What is an Incident? Any violation of security policy:  Unauthorized access of information  Unauthorized access to machines  Embezzlement  Virus or worm attack  Denial of service attacks  spam or harassment

Slide #21 Incident Response Goals 1. Determine if a security breach occurred. 2. Contain intrusion to prevent further damage. 3. Recover systems and data. 4. Prevent future intrusions of same kind. 5. Investigate and/or prosecute intrusion. 6. Prevent public knowledge of incident.

Monitoring and Logging

Something we do to Services Service Monitoring Service Logging  Observing service activity in real-time  This is done by a computer, not a human.  Important events are passed on to a human (notification).  Keeping a historical records of service activity  This data grows over time and can become quite large.  Only referred to when needed to troubleshoot a problem or trace down a security incident.

Why Bother? Why do we Monitor? Why do we Log?  To detect / identify problems quickly.  Ideally you want to know about it before your users do.  To determine if resources are being constrained or over utilized.  Help get to the root cause of an issue or incident.  Help us predict problem and avoid them.  Provide historical data or trends for service usage.  Report on service activity. If you’re not measuring it you aren’t managing it

How Monitoring and Logging Work Server Service Log Network Activity Service Activity External Service Monitor Internal Service Monitor Event SA

Example: Simple Web Service Monitoring Linux Host: web.syr.edu Apache HTTPD access_log Network Activity Service Activity nmap web.syr.edu ps –aux | grep “httpd” Event: Service stopped Event: Port unavailable

What to Monitor, what to Log?  Monitor for a condition.  Send alert when the condition is met.  Log the condition whether it sends an alert or not. Examples: (Why would you monitor/log these?)  CPU utilization stays at 100% for X minutes.  Free disk space drops below 10%.  Port does not respond for 1500 ms  HTTP request take more than 5 sec to get response.

Better Monitoring  Normal  Normal: When a service fails you send an alert.  Proactive Monitoring  Proactive: When a service show signs it is about to fail you send an alert. (100% cpu, Long responses, etc.)  Automated Responses  Normal: When a service fails you send an alert.  Automated: When the service fails, you attempt to restart it. If the restart fails, you send an alert.  PM and AR are difficult and time-consuming to implement, but are time savers for difficult problems with no permanent fix.  A layered approach is always better.

Alerts!  Types:   TXT message  SMS Page  Automated dialer over POTS  Pick the appropriate Alert for the appropriate Event and time.  In a layered approach, you might send an , and if the problem persists send a TXT, etc…

Logging  Log files get very large  since they record all activity.  Log file rotation – service points to a different log file after a specified interval.  Lets you backup log files  Keeps the size of the files manageable.  Log files are text and they compress nicely.  How long do you keep logs?  Depends on service, depends on your policy  It’s not a decision the SA should make.  Like an insurance policy. Not very useful until the off chance that you need it... then you’re glad you have it!

Questions?