Download presentation
Presentation is loading. Please wait.
Published byNicole Fletcher Modified over 11 years ago
1
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010
2
Introduction Easy to define but hard to master Covers everything that can go wrong while computers are running It mainly examines the following controls: Operators Hardware Media Who should be involved with computer operations security? Every person interact with the system internally or externally Every technology that is part of the system
3
How to plan? The plan should be derived by asking right questions such as: How many security events were identified? How to control access privileges? Plan should show the ROI by asking the right questions such as: What will be the losses if not implemented. How much will it cost?
4
Critical O. S. Controls Operation controls focus on the following aspects: Resources protection Accountability, violation processing and user access authorities Access-Privileges Hardware, storage, I/O operations and activity logs Change Management Scheduling, applying, implementing and reporting Hardware
5
Resource Protection Securely guard the organizations Computing resources Loss Compromise Communication Balance of the security implementation depends on: Value of information Business need for the information Benefits are: Decrease possibility of damage to data Limit disclosure and misuse of data
6
Resource Protection Access given to individual users At a specific time Track access log Practices to enhance accountability and authority can be via: Users understanding the importance of passwords Users understanding the privacy regulations and its importance to avoid legal issues Plans for management changes must be in place
7
Access Privileges Hardware access Isolation between unrelated storages Enables controlling unauthorized access I/O operations and devices Should be verified before execution of privilege program Activity logs Auditing
8
Change Management Managing change steps: Introduce change Change log Scheduling change Implementing change Reporting change Why following those steps? Reduce the impact of change on services
9
Hardware Hardware access is via operating system software. Physical security of hardware Storage Unauthorized access
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.