CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 3 Tom Olzak, MBA, CISSP.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 2 Tom Olzak, MBA, CISSP.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Separate Domains of IT Infrastructure
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
Barracuda Backup Service Data Backup and Disaster Recovery.
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Stephen S. Yau CSE , Fall Security Strategies.
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
Walter Pitrof Technology Solution Professional Microsoft Switzerland Backup, Restore und Disaster Recovery mit Data Protection Manager 2012 Philipp Witschi.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Secured Hosting Services Frank Adams / Tom Carter.
10-Conducting Security Audits. Privilege Auditing Person’s access level over an object – User should be given minimal amount of privilege necessary to.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 4 Tom Olzak, MBA, CISSP.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 5 Tom Olzak, MBA, CISSP.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
David N. Wozei Systems Administrator, IT Auditor.
Wayne Hogan National Storage Manager Sun Microsystems of Canada, Inc.
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
Chapter 6 of the Executive Guide manual Technology.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Chapter 10 Conducting Security Audits. Objectives Define privilege audits Describe how usage audits can protect security List the methodologies used for.
MIS 5214 Security Architecture Greg Senko Security Architecture - Week 6 - Application Architecture.
Wireless Intrusion Prevention System
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Security in Cloud Computing Zac Douglass Chris Kahn.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CS/IS 196 Final Exam Review Final Exam: Wednesday, December 16.
Luminex Virtual Tape Storage System Brian Sullivan Director of Computer Operations Broward County Public Schools 1.
Computer Security: Principles and Practice
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Role Of Network IDS in Network Perimeter Defense.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
CMGT 430 OUTLET Teaching Effectively/ FOR MORE CLASSES VISIT
Slide Template for Module 4 Data Storage, Backup, and Security
CMGT 430 UOP Course Tutorial
Server Upgrade HA/DR Integration
Working at a Small-to-Medium Business or ISP – Chapter 8
CMGT 430Possible Is Everything/tutorialrank.com
CMGT 430 Competitive Success/snaptutorial.com
CMGT 430Education for Service/tutorialrank.com
CMGT 430 Education for Service/snaptutorial.com
CMGT 430 Teaching Effectively-- snaptutorial.com.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Business Contingency Planning
SpiraTest/Plan/Team Deployment Considerations
Identity & Access Management
Security in Cloud Computing
SQL Server on Amazon Web Services
SQL Server on Amazon Web Services
Presentation transcript:

CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 3 Tom Olzak, MBA, CISSP

Access Control  Mandatory Access Control (MAC) – Administrators tag data and users. An access control solution restricts access according to tags.  Discretionary Access Control (DAC) – Users set and manage security on the information they create, or administrators set access control user-by-user.  Role-based Access Control (RBAC) – The business creates roles based on business processes, separation of duties, least privilege, and need-to-know. Roles are assigned rights and permissions. Users are assigned to roles.

MAC

RBAC

Standards of Best Practice  COBIT (Control Objectives for Information and Related Technology)   ISO/IEC 27002:2005 (Information Technology – Code of Practice for Information Security Management   ITIL (Information Technology Infrastructure Library)   NIST CSRC – (National Institute of Standards and Technology, Computer Security Resource Center) 

Firewalls  Block everything, and then open only the port/IP address pairs absolutely required to conduct business  Maintain up-to-date firewall operating systems  Use internally and at the perimeter  Network and host

IPS/IDS  IPS (Intrusion Prevention System)  Detects anomalous packets and network behavior  Alerts or blocks traffic based on administrator defined rules  Placed in line with traffic  IDS (Intrusion Detection System)  Detects anomalous packets and network behavior  Alerts based on administrator defined rules  Placed out-of-band  Tuning Required

IPS/IDS Example

Business Continuity Planning  Purpose: Enable quick response to business continuity events so critical business process downtime does not exceed maximum tolerable downtime (MTD)  Business continuity event: Any condition, or set of conditions, that interrupts one or more business processes.  Disaster recovery: Restoring business processes following a catastrophic business continuity event.  Plan for worst case scenarios

Backups  Necessary for disaster recovery  Three types:  Full – Everything backed up  Incremental – Backs up everything that changed since the last backup of any kind  Differential – Backs up everything that changed since the last full backup  Off-site storage necessary  Media types  Tape  Disk  Cloud  Co-location

Aggregate Risk

And again…  Be sure to read ALL assigned reading. Your success in this class depends on it.