Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 © 2002 Carnegie.

Slides:



Advertisements
Similar presentations
OCTAVESM Process 4 Create Threat Profiles
Advertisements

S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2014 Microsoft Corporation. All rights reserved.
PPT Slides by Dr. Craig Tyran & Kraig Pencil The editor in charge of business books for Prentice Hall, I have traveled the length and breadth of.
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
© 2001 by Carnegie Mellon University PPA-1 OCTAVE SM : Participants Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
© Carnegie Mellon University The CERT Insider Threat Center.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Overview FAA IT & ISS R&D: Security Today Security Tomorrow Marshall Potter Chief Scientist for Information Technology Federal Aviation Administration.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Version # Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 1999 by Carnegie.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Welcome to the course: Designing and Optimizing Database Solutions with Microsoft® SQL Server® 2008.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
PRESENTATION TITLE GOES HERE SNIA Emerald™ Training June 24-27, 2013 SNIA Emerald TM Training SNIA Emerald Power Efficiency Measurement Specification,
SEC835 Database and Web application security Information Security Architecture.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Cryptography and Network Security
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
Introduction To Secure Registry Operations for ccTLDs Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
TEL581. Outline “Divide and Conquer” Potential Topic Areas Teams Schedule Grading Benefits Assistance Lecture Slides Lab Assignment Homework Assignment.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Computer & Network Security
Module 14: Configuring Server Security Compliance
IT443 – Network Security Administration Week 1 – Introduction Instructor: Alfred J Bird, Ph.D., NBCT
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
I Copyright © 2007, Oracle. All rights reserved. Module i: Siebel 8.0 Essentials Training Siebel 8.0 Essentials.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
1 IBM Software Group ® PRJ270: Essentials of Rational Unified Process Module 0: About This Course.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
IS3220 Information Technology Infrastructure Security
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
CMIT100 Chapter 15 - Information.
NTC 405 Education for Service-- snaptutorial.com.
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
CYB 100 Teaching Effectively-- snaptutorial.com
NTC 405 Teaching Effectively-- snaptutorial.com
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Information Assurance & Network Security Certificate
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
G318 Mitigation Planning Workshop Region 10
Presentation transcript:

Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie Mellon University ® CERT, CERT Coordination Center and Carnegie Mellon are registered in the U.S. Patent and Trademark Office Information Security for Technical Staff Introduction

© 2002 Carnegie Mellon University Introduction - slide 2 Who We Are *FFRDC - Federally Funded Research and Development Center

© 2002 Carnegie Mellon University Introduction - slide 3 Intended Audience Network/System Administrators with about 3 years of technical experience Relatively New to the field of Information Security Prerequisite knowledge General familiarity with data networking to include: - OSI 7-Layer Model - Ethernet - TCP/IP Suite - Some knowledge/experience with Windows and Unix

© 2002 Carnegie Mellon University Introduction - slide 4 Logistics, etc. Restrooms Breaks Catering Cell Phones/Pagers, etc. Directions/local area Local Calls Course Materials Using the Lab equipment What’s Available? What’s Appropriate?

© 2002 Carnegie Mellon University Introduction - slide 5 Course Objectives Describe the components of Survivability Identify and define the components of an Information Security (IS) Model Describe the components of Risk and Asset management as applied to networked systems Identify the benefits of invoking sound security policies and methods for implementing them Describe the steps of the SkiP methodology Summarize key security concerns of the TCP/IP protocol suite Describe the benefits of cryptography when applied to IS properties of confidentiality, integrity, and availability Describe common information gathering attack methods Identify threats and attacks that can compromise IS properties Describe best practices for hardening and actively defending host and networked systems from intrusions

© 2002 Carnegie Mellon University Introduction - slide 6 Overview of Course Content Module 1 The Challenge of Survivability Module 2 Asset and Risk Management Module 3 Policy Formulation and Implementation Module 4 Security Knowledge in Practice Module 5 TCP/IP Security Module 6 Cryptography Module 7 Prelude to a Hack Module 8 Threats, Vulnerabilities, and Attacks Module 9 Host System Hardening Module 10 Securing Network Infrastructure Module 11 Deploying Firewalls Module 12 Securing Remote Access Module 13 Intrusion Detection Systems

© 2002 Carnegie Mellon University Introduction - slide 7 TUESDAY Mod – Break Mod Lunch Mod Break 1415 – Mod 6 (Lab) 1500 – Mod – Break 1615 – Mod 7 (Lab) END WEDNESDAY Mod Break Mod Lunch Mod 8 (Lab) Break Mod Break Mod Mod 9 (Lab) END THURSDAY Mod Break Mod Lunch Mod 10 (Lab) 1345 – Break 1400 – Mod Break Mod Mod 11 (Lab) END FRIDAY Mod Break Mod – Mod 12 (Lab) Lunch Mod Break 1430 – Mod Break 1545 – Mod 13 (Lab) END MONDAY Course Intro/Overview Mod Break Mod Lunch Mod Break Mod Break Scenario Exercises END Course Schedule

© 2002 Carnegie Mellon University Introduction - slide 8 R.O.E/Introductions R.O.E Learn from each other and actively participate Share your knowledge/experience Ask Questions—if you know the answer, shout it out! Get your hands dirty Try something new (OS, Tools, etc.) PLEASE critique the course—so it always gets better! Introductions Name, Position, Tech Experience, Expectations of Course