Security Management Practices General overview of good security management processes. Introduces topics used in several other sections.

Slides:



Advertisements
Similar presentations
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Advertisements

Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Security Controls – What Works
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Lecture 8: Risk Management Controlling Risk
Risk Management.
Stephen S. Yau CSE , Fall Security Strategies.
CPSC 6126 Computer Security Information Assurance.
Session 3 – Information Security Policies
Network security policy: best practices
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
G53SEC Computer Security Introduction to G53SEC 1.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
An Overview of Risk Management
Information Systems Security Computer System Life Cycle Security.
Conostix S.A. Sensible defence.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Computer Security: Principles and Practice
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
12015/10/20 Muhammad Salman University of Indonesia.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Threat Modeling and Risk Management John R Durrett January 2003 Primarily from Building Secure Linux Servers ( ) and Secrets and Lies ( )
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Alaa Mubaied Risk Management Alaa Mubaied
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Introduction to Information Security
Chap1: Is there a Security Problem in Computing?.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
CSCE 548 Secure Software Development Security Operations.
SecSDLC Chapter 2.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Module 2: Designing Network Security
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
Chapter 1: Security Governance Through Principles and Policies
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part II.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Information Security Management Goes Global
Information Systems Security
CS457 Introduction to Information Security Systems
Information Security, Theory and Practice.
Security Management Practices
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity Threat Assessment
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Security Management Practices General overview of good security management processes. Introduces topics used in several other sections

Overview  Basic Security Concepts  Policies, Standards, Guidelines, & Procedures  Roles played in security management  Security Awareness  Risk Management  Data & Information Classification

Concepts  C.I.A. - Confidentiality, Integrity, & Availability  Identification, Authentication, Accountability, Authorization, Privacy  Objective of Security Controls: reduce likelihood & impact of threats

Systems Security Lifecycle 1.Initiation 2.Development/Acquisition 3.Implementation 4.Operation/maintenance 5.Disposal

3 Primary Tenants of InfoSec Confidentiality Integrity Availability

Personnel Concepts  Identification  Authentication  Accountability  Authorization  Privacy

System Concepts  Assume external systems are insecure  Examine the trade-offs (nothing is free)  Use Layered Security (greater work factor)  Minimize the system elements that are “trusted”  Isolate public accessed systems  Authenticate both users & processes  Use Unique Identities to ensure accountability  Implement least privilege

TOA: Trade-off Analysis  Define the objective (in writing)  Identify alternatives (courses of action)  Compare alternatives  Realize that there are no perfectly secure systems in opperation

Security Controls  Objective: reduce vulnerabilities & minimize the effect of an attack Attack likelihood Attack cost Attack countermeasures  Deterrent controls  Corrective Controls  Detective Controls

Simple Threat Matrix likelihood of an attack impact 0,0 A B C

Information Classification  Why classify data & information  Concepts  Classification Terms Governmental Private Sector  Criteria  Roles used in the classification process

Roles…  Owner Who gets the blame level of classification, review of protection, delegation to custodian,  Custodian Actual day-to-day, backups, verify backups, restoration, policy maintenance  User Operating procedures, user account management, detecting unauthorized/Illicit activity Termination

Implementation 1.Policy: 1.senior management (demonstration of commitment 2.general organizational 3.Policy: Functional 2.Implementation 1.Standards -- Baselines 2.Guidelines 3.Procedures

Risk management  Risk can never be totally eliminated  Primary purpose 1.Identification of risks 2.Cost / benefit analysis  Benefits 1.Creates clear cost-to-value 2.Helps analysis process 3.Helps design and creation

Terms  Asset  Threat  Vulnerability  Safeguard  Exposure Factor (EF)  Single Loss Expectancy (SLE)  Annualized Rate of Occurrence (ARO)  Annualized Loss Expectancy (ALE)

Attacks  Criminal Fraud-prolific on the Internet Destructive, Intellectual Property Identity Theft, Brand Theft  Privacy: less and less available people do not own their own data Surveillance, Databases, Traffic Analysis Echelon, Carnivore  Publicity & Denial of Service  Legal

Brief Risk Analysis Overview  Quantitative vs Qualitative  Steps Potential losses Potential threats  Asset valuation  Safeguard selection  Remedies

Risk Analysis “The identification and evaluation of the most likely permutation of assets, known and anticipated vulnerabilities, and known and anticipated types of attackers.”

Assets  What are you trying to Protect  Why is it being protected  Risk for other systems on network  Data Tampering vs. Stealing Liability

Attackers  Categorize by Objective, Access, Resources, Expertise, and Risk  Hackers: Galileo, Marie Curie  Lone Criminals, Insiders, Espionage, Press, Organized Crime, Terrorists

Motives Business competitors  Same motives as “real-life” criminals  Financial motives Credit cards The Cuckcoo’s Egg  Political motives  Personal / psychological motives

Motives  Honeypot “to learn tools tactics and motives of blackhat community” Honeypot  Script Kiddies Canned Exploits of Perl or Shell scripts Still major threat  Knowing motives helps predict attack  Degrees of motivation Automated tools Hardened systems vs Easy Kills

Steps in an Attack 1.Identify Target & collect Information 2.Find vulnerability in target 3.Gain appropriate access to target 4.Perform the attack 5.Complete attack, remove evidence, ensure future access

After you get root 1.Remove traces of root compromise 2.Gather information about system 3.Make sure you can get back in 4.Disable or patch vulnerability

Vulnerability Landscape  Physical World Laptops  Virtual World  Trust Model  System Life cycled

Vulnerabilities  Only potential until someone figures out how to exploit  Need to identify and address Those applicable & which must mitigated now Are likely to apply & must be planned against Seem unlikely and/or are easy to mitagate

Attack Trees (Bruce Schneier)  Visual Representation of attacks against any given target  Attack goal is root  Attack subgoals are leaf nodes For each leaf determine subgoals necessary to achieve And cost to achieve penetration using different types of attackers

Attack Tree Example Steal Customer Data Obtain Backup Media Burfglarize Office (Cost $10,000) Intercept Bribe Admin at ISP ($5,000) Hack remote users home system ($1,000) Hack SMTP Gateway ($2000) Hack into Server

Defenses  Three general means of mitigating attack risk Reducing asset value to attacker Mitigating specific vulnerabilities  Software patches  Defensive Coding Neutralizing or preventing attacks  Access control mechanisms  Distinguish between trusted & untrusted users

Security  Security is a process not a Product  Weakest link in the process  Examples of Threat Modeling in Secrets & Lies chapter 19

Security Awareness  People are often the weakest link  Benefits: Awareness of need to protect the system Skill & knowledge improvement More in-depth knowledge  Be careful of over training Constant barrage == ignored Too much knowledge of how the system works

References  Cohen, Fred “A Preliminary Classification Scheme for Information Security Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on that Model.” Sandia National Laboratories, Sept 1998 ( effect.html) effect.html  Bauer, Michael E. “Building Secure Servers with Linux.” O’Reilly, 2003