Web Security for Network and System Administrators1 Chapter 2 Security Processes.

Slides:



Advertisements
Similar presentations
MONITORING OF SUBGRANTEES
Advertisements

IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Understanding & Managing Risk
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Computer Security: Principles and Practice
Controls for Information Security
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Network security policy: best practices
Patch Management Strategy
Introduction to Network Defense
Incident Response Updated 03/20/2015
Project Human Resource Management
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
CIP 43 ReliabilityFirst Audit Observations ReliabilityFirst CIP Webinar Thursday, September 30, 2010 Tony Purgar, Sr. Consultant - Compliance.
Chapter 3 Internal Controls.
Basics of OHSAS Occupational Health & Safety Management System
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
How To Build a Testing Project 1 Onyx Gabriel Rodriguez.
Software Project Management
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
QA Methodology By Rajib Roy Independent Consultant Qcon.
Note1 (Admi1) Overview of administering security.
Security Development Life Cycle Baking Security into Development September 2010.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Section Topics Determine appropriate follow-up activity by the internal audit activity Identify appropriate method to monitor engagement outcomes Conduct.
LIVE TALK - Security Speed Pitch di Luigi Tamburini, Product Management Team Leader Auditorium Gruppo 24 ORE Milano – 11 febbraio 2016.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Managed IT Services JND Consulting Group LLC
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Certified Software Tester How To Build a Testing Project, Part 1.
Risk management.
Software Project Configuration Management
Post Survey Protocol Kenny williamson keith Harbuck keith & holmes llc
I have many checklists: how do I get started with cyber security?
IS4680 Security Auditing for Compliance
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Web Security for Network and System Administrators1 Chapter 2 Security Processes

Web Security for Network and System Administrators2 Objectives In this chapter, you will: Review the basic components of a security education program Use security advisories to understand and correct software vulnerabilities Understand the need for security issue management Assess security risks Respond to security incidents

Web Security for Network and System Administrators3 Security Education An education plan answers four central questions for members of an organization: –Who can assist in fighting malicious computer activity? –Where are security policies located? –What are my responsibilities in relation to the security policies? –What security controls must I use?

Web Security for Network and System Administrators4 Security Education

Web Security for Network and System Administrators5 Security Advisory Software bugs can create vulnerabilities that can be exploited by abusers The software vulnerability lifecycle consists of four phases

Web Security for Network and System Administrators6 Security Advisory Steps to address a vulnerability: 1.Receive the advisory 2.Assess the advisory and determine applicability 3.Determine deadlines for fixes 4.Assign work and track progress 5.Periodically check systems for compliance

Web Security for Network and System Administrators7 Security Issue Management

Web Security for Network and System Administrators8 Security Issue Management Issues must be rated with objective criteria in order to determine deadlines for compliance or correction: –Low – Low risk security exposure problem or exposure on low value systems –Medium – Medium risk security exposure problem or exposure on medium value systems –High – High risk security exposure problem or exposure on high value systems

Web Security for Network and System Administrators9 Security Issue Management There are three general outcomes to the issue management process: –Fix the problem –Mitigate the exposure (e.g., install a firewall in front of a system with a lingering exposure) –Accept the risk of the exposure

Web Security for Network and System Administrators10 Security Risk Management

Web Security for Network and System Administrators11 Security Risk Management Risks should be: –Evaluated using qualitative and/or quantitative methods –Approved by the appropriate management chain –Reviewed regularly

Web Security for Network and System Administrators12 Security Incident Management Incident management is the overall system in place to respond to computer attacks. It consists of three major phases: –Preparation –Reaction –Assessment

Web Security for Network and System Administrators13 Security Incident Management To prepare: –Learn applicable laws –Build a computer incidence response team (CIRT) –Develop communication plan –Develop a response plan –Conduct training –Post no trespassing signs –Detect malicious activity

Web Security for Network and System Administrators14 Security Incident Management To respond in a timely and efficient manner: –Stay calm –Start a detailed log –Conduct thorough interviews –Coordinate communications –Determine the extent of the intrusion –Protect evidence –Contain the problem –Determine the root of the problem –Restore business operations

Web Security for Network and System Administrators15 Summary Education is an effective tool in mobilizing the organization to both understand the importance of security and to incorporate it into daily responsibilities. Vulnerability management process involves: receiving advisories, applying the necessary patches, and periodically assessing the environment to ensure fixes are installed. Security issue management is vital in ensuring that security exposures are addressed.

Web Security for Network and System Administrators16 Summary Security risk management provides the on-going methodology to compare the cost of security measures against the possible financial loss caused by malicious activity. The security incident management process must be meticulous and effective, and it must protect both the environment and evidence collected.