Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.

Similar presentations


Presentation on theme: "Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010."— Presentation transcript:

1 Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010

2 Introduction Easy to define but hard to master Covers everything that can go wrong while computers are running It mainly examines the following controls: Operators Hardware Media Who should be involved with computer operations security? Every person interact with the system internally or externally Every technology that is part of the system

3 How to plan? The plan should be derived by asking right questions such as: How many security events were identified? How to control access privileges? Plan should show the ROI by asking the right questions such as: What will be the losses if not implemented. How much will it cost?

4 Critical O. S. Controls Operation controls focus on the following aspects: Resources protection Accountability, violation processing and user access authorities Access-Privileges Hardware, storage, I/O operations and activity logs Change Management Scheduling, applying, implementing and reporting Hardware

5 Resource Protection Securely guard the organizations Computing resources Loss Compromise Communication Balance of the security implementation depends on: Value of information Business need for the information Benefits are: Decrease possibility of damage to data Limit disclosure and misuse of data

6 Resource Protection Access given to individual users At a specific time Track access log Practices to enhance accountability and authority can be via: Users understanding the importance of passwords Users understanding the privacy regulations and its importance to avoid legal issues Plans for management changes must be in place

7 Access Privileges Hardware access Isolation between unrelated storages Enables controlling unauthorized access I/O operations and devices Should be verified before execution of privilege program Activity logs Auditing

8 Change Management Managing change steps: Introduce change Change log Scheduling change Implementing change Reporting change Why following those steps? Reduce the impact of change on services

9 Hardware Hardware access is via operating system software. Physical security of hardware Storage Unauthorized access


Download ppt "Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010."

Similar presentations


Ads by Google