1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Security Controls – What Works
Information Security Policies and Standards
Forensic and Investigative Accounting
1 An Overview of Computer Security computer security.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Incident Response Updated 03/20/2015
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
Information Security Technological Security Implementation and Privacy Protection.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Security considerations for mobile devices in GoRTT
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Copyright 2001 Marchany, SANS Institute1 Auditing Networks, Perimeters and Systems Appendices/Supplemental Material The SANS Institute.
Chap1: Is there a Security Problem in Computing?.
Cybercrime What is it, what does it cost, & how is it regulated?
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Chapter 4: Laws, Regulations, and Compliance
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Information Security and Privacy in HRIS
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Securing Information Systems
Introduction to Computer Forensics
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
INFORMATION SYSTEMS SECURITY and CONTROL
Introduction to Digital Forensics
Presentation transcript:

1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be kept inside

2 Security Models l Lattice Based Models l Non-Interference Models l Access Rights Propagation Models l Multilevel Data Models l Integrity Models l Miscellaneous Models –Ntree –group authorization

3 Application of Security Models l Academic l Corporate l Federal

4 Developing Policy with Security Models l Internetworking may violate policies –General Connectivity –Mobile Code l Incorporate General Models to Policy

5 Tools For Risk Analysis l Host Security Audits »mis-configurations »insider threats »Access Controls l Software Audits »Code Audits l Network diagnostics and diagramming »tcpdump, snoop, scotty, snmp, etc. l Using “underground tools” to determine the vulnerability of your site l Uses multiple strategies for site protection

6 Solutions Resulting from Risk Analysis l Account Management –Passwords –Automated account creation/deletion procedures l Education –Security Mailing Lists –References l Encryption –Authentication –Data Encryption

7 Enforcement of Policy l Modularize technology solution and make the policy document technology-neutral l Design technology so that it supports the policy. (Not the other way around.) l Enlist the support of management and legal bodies for the policy l Have the policy focus on intent rather than details

8 Amending Policy l Create an annual review panel l Consider the policy as a “Living Document” l Educate at all levels

9 Policy Breach l Lock/Suspend Accounts l Delete Accounts l Reprimand user l Formally reprimand user l Remove the user l Pursue the action legally

10 Dealing with Law Enforcement l Follow the guidelines for recording evidence l Assess Damage and Remove Vulnerabilities –“Cleanup and Containment” l Notify superiors of your intent to cooperate with Law Enforcement or other parties involved in incidents

11 Pursuing and Prosecuting l Pursue Incident if »systems and assets are protected »backups exist »concentrated and frequent attack »incur financial damage »intruder can be contained and controlled »good monitors exist l Don’t Pursue incident if »No sufficient evidence »Site is not well protected »The willingness to prosecute doesn’t exist »Site is vulnerable to lawsuits »Resources unknown

12 Policy for Gathering Evidence l Document all details regarding an incident l Vary monitoring techniques and times l Establish post-incident operating procedures for –system administrators –operators –users –decide how to handle compromised system(s) l Record details via logs –system events –time stamped actions taken by the attacker and yourself –phone conversations - date,time, person, subject

13 Maryland State Statutes l Article 27. Crimes and Punishments –Section 146 Unauthorized access to computers prohibited

14 Federal Statutes l Federal State Statutes that apply –Title 15 Commerce and Trade –Title 17 Copyright –Title 18 Crimes and Criminal Procedures l Ch 5 Arson l Ch 31 Embezzlement and Theft l Ch 37 Espionage and Censorship l Ch 47 Fraud and False Statements l Ch 63 Mail Fraud l Ch 65 Malicious Mischief l Ch 101 Records and Reports l Ch 105 Sabotage l Ch 113 Stolen Property

15 Federal Statutes l Ch 119 Wire and Electronic Communications Interception and Interception of Oral Communications l Ch 206 Pen Registers and Trap and Trace Devices

16 Federal Statutes –Title 42 The Public Health and Welfare »Ch 21A Privacy Protection –Title 47 Telegraphs, Telephones, and Radiotelegraphs »Ch 5 Wire or Radio Communications –Public Law Communications Assistance for Law Enforcement Act »Title I Interception of Digital and Other Communications »Title II Amendments to Title 18 United States Code »Title III Amendments to the Communications Act of 1934

17 Coordinating with other Bodies l State - Federal Contacts l Academia l Network Service Providers

18 Legal/Policy References l Spafford text Appendix l RFC 1244