SEC835 Database and Web application security Information Security Architecture.

Slides:



Advertisements
Similar presentations
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Controls – What Works
Information Security Policies and Standards
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Computer Security: Principles and Practice
First Practice - Information Security Management System Implementation and ISO Certification.
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Network security policy: best practices
Fraud Prevention and Risk Management
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
HIPAA COMPLIANCE WITH DELL
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 5 Tom Olzak, MBA, CISSP.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Architecture
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Engineering Essential Characteristics Security Engineering Process Overview.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
SecSDLC Chapter 2.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Security Management Goes Global
CS457 Introduction to Information Security Systems
Information Security, Theory and Practice.
Risk management.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Security Standard: “reasonable security”
Introduction to the Federal Defense Acquisition Regulation
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity Threat Assessment
Albeado - Enabling Smart Energy
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

SEC835 Database and Web application security Information Security Architecture

Terms and definitions Threat – a potential for violation of security. Threats always exist Threat agent, or attacker, or an adversary, – an entity that attacks the system Attack – a deliberate action undertaken in order to compromise the system security Countermeasure, or security controls, - anything (action, device, technique) undertaken to address security threats Risk – a probability of the attack occurrence Vulnerability – a weakness of the system that may be exploited by an attacker

Information Security assets Data Business data Security data Technology Software Hardware Network

What to protect For the company information assets to protect Confidentiality – access to the information is allowed to authorized persons only Integrity – data has not been changed maliciously in either storing, transferring or processing Availability – data is available in accordance to business requirements, and to authorized persons

Key Security Concepts

Domains of controls National Institute of Standards and Technology (NIST) recommends the following classification of controls Management Operational Technical

Category of controls Preventive Prevent the attack Detective In case of attack occurrences help to discover security holes

Management controls InfoSec policies System Security Plan Security Risks Management Secure System Development Life Cycle Legal compliance policy Auditing policy

Operational controls Planning for contingency Disaster recovery plan Incident response plan Security Education, Training and Awareness Program (SETA) Personnel Security Physical security

Technical controls Security services Identification, Authentication, Authorization, and Accountability, aka Access Control Audit Trails Cryptography Secure error handling Data validation

Technical controls Network security (out of our scope) Firewalls Intrusion Detection Systems

Secure Software Fundamental for nowadays computer system security Ensure absence of security holes in the code Apply to both security services and to business applications

Achieving secure software Requires a clear definition of “secure” Requires defined process with clear objectives and outputs Requires integration with existing practices

Assurance Axiom: It is impossible to demonstrate with absolute certainty that a moderately complex application doesn't have any vulnerabilities. Second Best: We can provide assurance that an application was designed, implemented, tested in rigorous ways (and by skilled people) Decrease the likelihood of vulnerabilities and other defects Training in secure programming provides assurance Software engineering processes designed for assurance

Traditional Application Security A network-centric approach = “penetrate and patch” based primarily on finding and fixing known security problems after they have been exploited in fielded systems It is reactive It is too late

New concept of software security The process of building secure software Designing software to be secure Verifying that software is secure Educating software developers, architects, and users about how to build security in from the start Secure practitioners proactively attempt to build software that can withstand attack

The processes of secure development cont./

The processes of secure development Secure System Development Lifecycle (SecSDLC) Security Requirements Information Security Assets inventory Threat modeling Risk analysis and evaluation Security requirements development Secure Design and Specification Secure design patterns identification Secure software architecture built Convert design solution into implementation specification Verify security solution Evaluate security solution – residual risk statement cont./

The processes of secure development Secure System Development Lifecycle cont Implementation Coding security standards and guidelines Testing Security test cases Source code review – static analysis Move to production Residual risks statement Maintenance Risk assessment and audit Ongoing support and changes cont./

The processes of secure development Project Management Secure development must be integrated into Software Development Lifecycle, and into formal project management methodology and processes That is where concepts obtain their implementers Integrated into Project Management Identify deliverables Identify roles and responsibilities Incorporate into project schedule Monitor the deliverables on a regular basis

Multi-Tiered Security Not a single security mechanism is sufficient Design security architecture as a multi- tiered defence Technical controls Operational controls Management controls, aka governance

Security Policy Governance is presented as an enterprise information security policies Examples: Physical security policy Infrastructure security policy Access control policy Business continuity policy

Security Policy (cont) Human factors Security Awareness, Training, and Education (SETA) Employment policy Acceptable use policy

SETA Goal – educate employees in order to prevent security incidents and to be capable to legally enforce employees’ liability Continuing learning Security training

Employment policy Identify security aspects related to an employee: Hiring Changing state in the company Termination

Acceptable use policy Define acceptable use of the company assets, e.g.: Internet Mobile phone, Computer Other equipment

Week 1 Lab – 1% Review the document “National Bank Acceptable Use Policy” Answer the questions printed on an enclosed sheet.