Engineering Essential Characteristics Security Engineering Process Overview.

Slides:



Advertisements
Similar presentations
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Advertisements

Information Technology – Guidelines for the Management of IT Security
Cloud computing security related works in ITU-T SG17
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Software Engineering CSE470: Process 15 Software Engineering Phases Definition: What? Development: How? Maintenance: Managing change Umbrella Activities:
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Information Security Policies and Standards
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Network Security Testing Techniques Presented By:- Sachin Vador.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Gurpreet Dhillon Virginia Commonwealth University
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Integrated Capability Maturity Model (CMMI)
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Dillon: CSE470: SE, Process1 Software Engineering Phases l Definition: What? l Development: How? l Maintenance: Managing change l Umbrella Activities:
HIPAA COMPLIANCE WITH DELL
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operations Security Domain #9.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Enterprise Cybersecurity Strategy
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Security Management Goes Global
Risk management.
Cybersecurity - What’s Next? June 2017
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Introduction to the Federal Defense Acquisition Regulation
Chapter 19: Building Systems with Assurance
AMI Security Roadmap April 13, 2007.
IS Risk Management Framework Overview
IT Management Services Infrastructure Services
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Engineering Essential Characteristics Security Engineering Process Overview

Model Architecture Security Engineering Base Practices – Represent best practices – Iterative, and not ordered by lifecycle phase Project and Organizational Base Practices – Adapted from Systems Engineering CMM – Reference materials for interpreting generic practices Capability Levels (Generic Practices) – Management, measurement and institutionalization aspects – Assess and improve organization’s process capability – Rank ordered according to maturity

Capability Levels Represent the maturity of the security engineering organization

An alternative view of risk: – Security Engineering Process organic to system – Define Security Policy based upon system architecture and environment Security Engineering Base Practice Implementations (2) Assurance Configuration Management Security Documentation Feedback Requirements Definition Security Policy Rationalization of System & Security Requirements Development Implementation Security Test & Evaluation Assess Residual Risk Operations & Maintenance Support Elements of System Development Lifecycle

An alternative view of risk (2): – Security requirements integral to Requirements Definition – Security requirements designed to address three principal types of vulnerabilities:  Inherent (e.g., remote login service—no authentication)  Strength-of-mechanism (e.g., password construction)  Defective engineering (e.g., buffer overflow condition) – Security requirements documents primarily address inherent and strength-of-mechanism vulnerabilities Security Engineering Base Practice Implementations (3) Inherent Strength-of- Mechanism Defective Engineering

Internet ??? A Problem of Trust.. Who Are You Doing Business With? Identity of transacting parties Integrity of messages Non-repudiation Global system interoperability Predictable and transparent trust environment Parties are reluctant to do business electronically unless they can be assured of:

Security Policy Review Organizational Security Review Asset Classification Control Review Personnel Security Review Physical and Environmental Security Review -Information security policy review -Information Security Infrastructure review -Security of third party access review -Outsourcing review -Accountability for assets review -Information classification review -Security in job definition and resourcing review -Responding to security incidents and -User training review malfunctions review malfunctions review-Secure areas review -General controls review Systems Development and Maintenance Review -Security Requirements of systems review -Security in application systems review -Cryptographic controls review -Security of systems files review -Security in development and support process review Annual Review Communications and Operation Management Review Access Control Review -Operational procedures and responsibilities review System planning and acceptance review -Protection against malicious software review -Housekeeping review -Network management review -Media handling and security review -Exchanges of information and software review -Business requirements for access control review -User access management review -User responsibilities review Network access control review -Operating system access control review -Application access control review -Monitoring system access control review -Mobil computing and telecommuting access review Business Continuity Management Review -Aspects of business continuity management review Compliance Review -Compliance with legal requirement review -Reviews of security policy and technical compliance review -System audit considerations review

Profile Scan Enumerate Exploit Report -Open Source -Edgar Search -Network Numeration -Organizational Query -Domain Query -Network Query -POC Query -DNS Interrogation -Network Mapping -Network Reconnaissance -Live System Identification -Port Scanning -System identification -Services identification -War dialing -System Enumeration -Identity Network Resources -Identity Network Share -Identity Banners -Identity Applications -Identify System Vulnerabilities -Exploit System Vulnerabilities -Validate system Vulnerabilities -Zero day exploiting -Document system Vulnerabilities -Document Executive summaries -Document Technical Summaries -Document Business Concerns -Document Recommendations -Provide Industry Standard -Security Practices -Document Data Retrieved Present -Executive Level -Technical Level Quarterly Testing