Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Systems Security Operations Security Domain #9.

Similar presentations


Presentation on theme: "Information Systems Security Operations Security Domain #9."— Presentation transcript:

1 Information Systems Security Operations Security Domain #9

2 Operations Security Objectives  Operations Responsibility & Personnel  Configuration Management  Media Access Protection  System Recovery  Facsimile Security  Vulnerability and Penetration Testing  Attack Types

3 Computer Operations  Fixing Hardware and software issues  Media Libraries  Controlling Remote Access  Contingency Planning  Incident Handling  Licensing Issues  Input Controls  Backup and Recovery

4 Threats to Operations  Disclosure  Destruction  Loss of system and network capabilities  Corruption and Modification  Theft  Espionage  Hackers/Crackers  Malicious Code

5 Issues  Backup Maintenance  Change workstation/location –Used to improve security  Need to Know Required  Least Privilege Principle Enforced  Due Care  Due Diligence –U.S. Federal Sentencing Guidelines of 1991  Up to 290M for non-performance

6 Security Control Types  Directive control –Used to guide the security implementation  Preventive control –Can deter or mitigate undesirable actions  Detective control –Verifies whether a control has been successful  Corrective control –Used to reverse the effects of an unwanted activity

7 Examples  Directive – policies, standards, laws  Preventive – firewalls, authentication, access controls, antivirus software  Detective – audit trails, logs, CCTV, CRC  Corrective – incident handling, fire extingiuishers

8 Vulnerability Testing  Things to agree upon –Goals of the assessment –Written agreement from management –Explaining testing ramifications –Understand results are just a ‘snapshot’

9 Steps in Testing  Reconnaissance –Obtain info either passively or actively  Sniffing, eavesdropping, ARIN, Whois, etc.  Scanning –ID systems that are running and active services  Ping sweeps and port scans  Gaining Access –Exploiting vulnerabilities to gain access  Buffer overflow, brute force

10 More Steps  Maintaining Access –Uploading software to ensure reentry  Trojan Horse, backdoor  Covering Tracks –Hide one’s malicious activities  Delete system and application logs

11 Honeypots  Usually placed in DMZ –Should not be connected to internal network  Sacrificial lamb system  Goal is that hackers will attack this system instead of production system  Leaves many ports open and services running to be more ‘enticing’

12 Sensitive Media Handling  Marking  Handling  Storing  Destruction  Declassification

13 Continuity of Operations  Fault Tolerance –Software –Hardware  Data Protection –RAID 0, 1, 5, 10  Redundant Communications –Phone, Broadband, Wireless, Satellite  Redundant Power Supplies

14 Auditing  Auditing Basics –Logs, monitors, and triggers  Accountability, Compliance  Audit trails  Sampling and clipping levels  External auditors

15 Monitoring Tools  Warning banners  Keystroke monitoring  Traffic analysis  CCTV

16 More Terms  Ethical Hacking  War dialing  Radiation monitoring  Dumpster diving  Social engineering

17 Physical Security  Facility Location and construction  Electrical Issues  Perimeter Protection  Physical Intrusion Detection  Fire Prevention

18 Threats  Physical Damage  Theft of Assets  Interruption of Service  Disclosure of Proprietary Information  Natural Disaster  Vandalism  Terrorism

19 Administration Controls  Facility construction  Site management  Personnel controls  Emergency procedures  Awareness training

20 Technical Controls  Access controls  Alarms  CCTV/Monitors  HVAC  Power Supplies  Fire detection and suppression


Download ppt "Information Systems Security Operations Security Domain #9."

Similar presentations


Ads by Google