Presentation is loading. Please wait.

Presentation is loading. Please wait.

Monitoring Systems Richard Newman. Security in Depth Layered Security – Physical access control – Identification and Authentication – know who is using.

Similar presentations


Presentation on theme: "Monitoring Systems Richard Newman. Security in Depth Layered Security – Physical access control – Identification and Authentication – know who is using."— Presentation transcript:

1 Monitoring Systems Richard Newman

2 Security in Depth Layered Security – Physical access control – Identification and Authentication – know who is using system Individual authentication – for audit Detect patterns of behavior – Logical Access Control Programs, files, resources, etc. Check – use issues – Real-time monitoring IDS – Off-line monitoring Audit Forensic uses Chain of control

3 Computer System Monitoring - Detection – May be done at any level – Pattern matching – Statistical anomaly – Self/Non-self - Classification – Severity level – Special considerations - Response – Event logging – Email alert to user/admin Per event Digest – RT call/page/IM – System reconfiguration

4 Event Logging - System log – Start-up, shut-down of system, major processes – Opening/closing of important files, major resources - Security log – Major access control requests, logins – Access control failures - Application logs – Application specific events

5 Log Entry Append-only file – Prevent log entry modification or loss Log entry fields – Time and date of event – Event source (process/component) – User identity – Event type – Event details – depend on event type

6 Event Logging Mechanisms Process detects an event – configured to log – Creates log entry – Puts entry in buffer – Alerts logging process Logging process retrieves event from buffer – Classifies as worthy of collection or not Logging process writes events to audit log – Log selection – May fire other responses also Sysadmins review audit log – Data mining – Direct study Archiving – Signature, compression

7 Access Control Strategies - Islands – Isolation and mediation – Untrusted process given “sandbox” - Vaults – Access to wider (more dangerous) resources requested individually with system mediation on a case-by-case basis – Required for access to shared resources - Puzzles – Process uses secret or hidden information to access desired resources – must be impractical to find it or to guess – Cryptography, steganography, security through obscurity - Patterns – Access patterns compared with known bad patterns, blocked or audited if match (virus signatures) – Normal access patterns noted and deviations detected (anomalies)

8 External Requirements & Policy Treat external reqts as separate input to policy – Allows compliance tracking Treat possible legal or contractual problems as risks – Acknowledges non-compliance as risk Treat certifications as assets – More than marketing


Download ppt "Monitoring Systems Richard Newman. Security in Depth Layered Security – Physical access control – Identification and Authentication – know who is using."

Similar presentations


Ads by Google