Download presentation
Presentation is loading. Please wait.
Published byJeffry Spencer Modified over 9 years ago
1
Information Systems Security Operations Security Domain #9
2
Operations Security Objectives Operations Responsibility & Personnel Configuration Management Media Access Protection System Recovery Facsimile Security Vulnerability and Penetration Testing Attack Types
3
Computer Operations Fixing Hardware and software issues Media Libraries Controlling Remote Access Contingency Planning Incident Handling Licensing Issues Input Controls Backup and Recovery
4
Threats to Operations Disclosure Destruction Loss of system and network capabilities Corruption and Modification Theft Espionage Hackers/Crackers Malicious Code
5
Issues Backup Maintenance Change workstation/location –Used to improve security Need to Know Required Least Privilege Principle Enforced Due Care Due Diligence –U.S. Federal Sentencing Guidelines of 1991 Up to 290M for non-performance
6
Security Control Types Directive control –Used to guide the security implementation Preventive control –Can deter or mitigate undesirable actions Detective control –Verifies whether a control has been successful Corrective control –Used to reverse the effects of an unwanted activity
7
Examples Directive – policies, standards, laws Preventive – firewalls, authentication, access controls, antivirus software Detective – audit trails, logs, CCTV, CRC Corrective – incident handling, fire extingiuishers
8
Vulnerability Testing Things to agree upon –Goals of the assessment –Written agreement from management –Explaining testing ramifications –Understand results are just a ‘snapshot’
9
Steps in Testing Reconnaissance –Obtain info either passively or actively Sniffing, eavesdropping, ARIN, Whois, etc. Scanning –ID systems that are running and active services Ping sweeps and port scans Gaining Access –Exploiting vulnerabilities to gain access Buffer overflow, brute force
10
More Steps Maintaining Access –Uploading software to ensure reentry Trojan Horse, backdoor Covering Tracks –Hide one’s malicious activities Delete system and application logs
11
Honeypots Usually placed in DMZ –Should not be connected to internal network Sacrificial lamb system Goal is that hackers will attack this system instead of production system Leaves many ports open and services running to be more ‘enticing’
12
Sensitive Media Handling Marking Handling Storing Destruction Declassification
13
Continuity of Operations Fault Tolerance –Software –Hardware Data Protection –RAID 0, 1, 5, 10 Redundant Communications –Phone, Broadband, Wireless, Satellite Redundant Power Supplies
14
Auditing Auditing Basics –Logs, monitors, and triggers Accountability, Compliance Audit trails Sampling and clipping levels External auditors
15
Monitoring Tools Warning banners Keystroke monitoring Traffic analysis CCTV
16
More Terms Ethical Hacking War dialing Radiation monitoring Dumpster diving Social engineering
17
Physical Security Facility Location and construction Electrical Issues Perimeter Protection Physical Intrusion Detection Fire Prevention
18
Threats Physical Damage Theft of Assets Interruption of Service Disclosure of Proprietary Information Natural Disaster Vandalism Terrorism
19
Administration Controls Facility construction Site management Personnel controls Emergency procedures Awareness training
20
Technical Controls Access controls Alarms CCTV/Monitors HVAC Power Supplies Fire detection and suppression
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.