The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Security Controls – What Works
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lecture 11 Reliability and Security in IT infrastructure.
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Stephen S. Yau CSE , Fall Security Strategies.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Introduction to Network Defense
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Appendix C: Designing an Operations Framework to Manage Security.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Note1 (Admi1) Overview of administering security.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Module 11: Designing Security for Network Perimeters.
Chap1: Is there a Security Problem in Computing?.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Team 1 – Incident Response
Working at a Small-to-Medium Business or ISP – Chapter 8
LAND RECORDS INFORMATION SYSTEMS DIVISION
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
I have many checklists: how do I get started with cyber security?
Security Measures Module 7 Section 1.
County HIPAA Review All Rights Reserved 2002.
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps

1. System Administrator Training Security must be in place from the cradle to the grave for every system Server consolidation can open up secure systems to potential vulnerabilities System Administrator shortcuts sometimes compromise good security _____________________________________________ Department of Defense requires a two week training certification and background check on all system administrators

2. End User Training Security training should be required before initial access and reoccurring thereafter Users can defeat millions of dollars of security just be giving away their password Most users are just trying to be helpful Management needs a favor _____________________________________________ Department of Defense requires security training pertinent to the users system before a password is issued and annually thereafter

3. Defense in Depth Use multiple security measures to secure your system There is no one product that implements good information security Firewalls, Intrusion Detection Systems, Anti- Virus Software, Access Control Lists, Data Backups, Software Patches _______________________________________ Department of Defense requires software patches and compliancy verification

4. Offsite Systems Examples: Laptops, PDAs, Wireless Devices These systems may be compromised offsite and then be brought inside the network By nature people do not report lost equipment immediately _______________________________________ The Department of Defense regulates the use of wireless and infrared technologies

5. Vulnerability Assessments Scan systems from the inside and outside to test security and patch security issues Consider an outside company to do the assessment to obtain a unbiased assessment _____________________________________________ Department of Defense require annual vulnerability assessments and provides software for security officers to conduct assessments on a more frequent basis

6. Stringent Policies User policies must be easy to understand Concise Clear User policies should provide consequences for not following the policies All personnel should be subject to the policies _____________________________________________ Military personnel may be court-martialed for not following regulations and policies, DoD civilians risk losing their jobs

7. Incident Response Plans Users should know how to react when their system acts abnormal System Administrators should know what procedures to take during an incident Organizations should have a disaster recovery plan and test it periodically _____________________________________________ The Department of Defense has layers of computer emergency response teams in place to handle information security incidents

8. System Documentation and Standardization System security should be documented Consider a formal acceptance of the security of all systems Standardization of security configurations is the key to security _______________________________________ Department of Defense requires a formal Certification and Accreditation of all information systems

9. Prevention\Detection Prevention is ideal, but detection is a must You cannot prevent all attacks Those attacks that you cannot prevent, must be detected in time to defend against them Plans are based on threats, value of the information, and the costs of securing the data _____________________________________________ Firewalls and Intrusion Detection Systems are located at all entry points to the DoD network

10. Passwords or Certificates User IDs and passwords are still the most common authentication mechanism All passwords can be broken given enough time and resources, complex passwords or lengthy passphases are the key to good security (PKI) Certificate authentication allows encryption, non-repudiation, and digital signatures _____________________________________________ The DoD is implementing a enterprise wide PKI system

Questions