NSSA Faculty Involvement in IT Security Auditing at RIT
|
|
|
- Polly Beasley
- 9 years ago
- Views:
Transcription
1 NSSA Faculty Involvement in IT Security Auditing at RIT Daryl Johnson and Yin Pan Rochester Institute of Technology Agenda Motivation challenges A special IT security auditing team Auditing Procedures Techniques and Tools Benefits and our experience Improvements Why think about security? With our great reliance on computers and the Internet, plus the numerous flaws found in most systems, today is the Golden Age of Hacking. Targets Government agencies E-commerce sites, banks and credit-cared processors Companies Universities Risk Tolerance Exposure Reputation Financial loss Employment Freedom Injury Death Threat to family The Attackers --outside threats Organized crime Sensitive data for identity theft or other fraud Terrorists Shut down critical systems, destroy systems or cause potentially life-threatening problem Governments Have active interest in the activities of organizations Competition Hacktivists If your organization does something politically sensitive Hired guns Hired to stealing information or gaining access 1
2 The Attackers --Insiders Disgruntled employees Clueless employees Customers Attacking suppliers in an attempt to gain sensitive information about other customers or alter prices Suppliers/ Vendors Attack customers Contractors and consultants The Challenge Those in the security arena understand these threats. The challenge is to impart some sense of vulnerability to those outside. Everyone is a target of opportunity Some are a High Valued Target Which are you? How to fight back in this battle? Regulators create a large set of regulations and frameworks in an effort to enforce protection of information, privacy and transparency of information. We need to manage security risks and ensure compliance with information security regulations and industry standards Audit your system and network periodically! Challenges Where to find the auditors with the IT skills required to meet the rapidly increased needs Our university, Rochester Institute of Technology (RIT), faces the same challenge. RIT has a team of professional auditors whose expertise lie in financial audits the auditors lack of technical background of IT audits Our solution Utilizing faculty s auditing and computer security expertise RIT formed an auditing team that was composed of the RIT faculty the auditors the campus security officers Auditing campus wide servers and networks, and systems What is Auditing A methodical examination and review of measuring something against a standard Answer the question, How do you know? Example of audits 2
3 Objective of Auditing To measure and report on risks Against existing policy within the organization Against existing standards or guidelines, best practices Raise awareness and reduce risks How do we start? Preparation for the auditing Faculty signs confidentiality agreement. Follow the six-step Process for Audit from SANS 6 Step Process for Audit from SANS Audit Planning Meeting Relevant People With The Plan With high level people, Initiating audit Measuring the Systems Preparing the Report Presenting Results Report to Management Audit Planning by faculty and the campus auditors Determining audit objectives and scope identify responsibility Research vulnerabilities and risks Creating checklist Lay out the strategies Determining audit objectives and scope identify responsibility What is our audit goal? Policies for compliance? What should we audit? What is the time period for auditing? Our goal To secure every possible path into our critical systems To prevent the leaking of sensitive data out 3
4 What to be compliant with? Policies provided by the campus security office to follow Server security standard Network standard Industrial best practice Center for Internet Security NIST: NSA: SANs: Web Standards OWASP: What should we audit? Reviewing the RIT System Inventory and RIT Logical Network diagram provided by campus Information Technology Support Team Randomly select 5-10 systems, 5-10 servers and 5-10 routers for auditing Audit campus wide modem systems Time period audited Phase I and Phase II Phase I Campus wide modem security audits Require system administration to provide answers to the checklist Phase II Campus wide modem security audits Conduct servers and networks auditing by IT auditors Create Checklist / form The most important step for an auditor in the planning phase What are included in an audit checklist? Statement of purpose/scope (optional) What to measure against Existing corporate policy and procedure or create one Existing audit standards or guidelines Best practices Security guides with technical detail For example, the content to be checked, under which section, reference to the standard How to measure it Create the audit procedure to answer how to measure it References Findings Compliance An example Creating checklists Faculty and auditors studied the given standards and industrial best practice Meet the chief security officer to discuss the standards clarify, modify, enhance the server and network security standards Create IACA network checklist and IACA Server checklist Lay out the strategies How to provide the team with the confidential information (network diagram, routing configurations) in a secure manner? 4
5 Measure the systems First, we will discuss the overall approach Secondly, what we have done for our phase I Measuring the systems --Vulnerability assessment-- Specifically answering the question: how do you know? how do we verify? Procedure Starting with physical security Scan networks (wired and wireless) Secure the perimeter such as router, firewall, IDS, etc. Secure the DMZ Audit internal systems Methodologies for measuring systems Different phases of an audit Discovery methods Reconnaissance Network Identification and Penetration Scanning Systems Auditing Servers and Network perimeters auditing Reconnaissance Auditing team schedule at least a couple of days of comprehensive recon work With low-technology Social Engineering Physical break-in Dumpster diving Awareness & Education Search Engine and web-based reconnaissance Tools for Reconnaissance Google Sam Spade: A general purpose reconnaissance client tool Whois databases To find out a registrar for organization based on its domain name InterNIC at Outside of USA at Nslookup or dig for DNS information Range of IP addresses American Registry for Internet Numbers --Arin Network Identification and Penetration Wireless Access Points -- War driving Modem -- War dialing Network mapping Identifying services with port scanning Vulnerability scanning 5
6 War driving tools Identifying wireless access points and determining their ESSIDs Wireless side techniques include Active scanning-- NetStumbler Passive scanning -- Wellenreiter and Kismet Forcing de-authentication -- ESSID-Jack Wired side audit Nessus-- plugin 11026, Access point detection Airsnort and WEPCrack Brute forces WEP/RC4 keys War Dialing Approach Dial a collection of telephone numbers attempting to locate modem carriers, etc. Why are we still talking about war dialing? Clueless users connect a modem to their desktop computer in order to access it from home through PC Anywhere for example Give modem access to vendors and service providers to troubleshoot devices remotely via phone when the existing IP network goes down Abandoned and forgotten routers and servers still connect to modems Malicious act purposeful unauthorized access Rogue fax machines War Dialing How to prepare for the audit? Get permission the difference between a hacker and auditor Define the range to dial (remove emergency numbers) When to dial? How often? Test the audit by dialing some known numbers War Dialing tools Tools ToneLoc THC Scan 2.0 (The Hacker s Choice) Runs on platforms w/pc emulation PhoneSweep from SandStorm Enterprises (commercial) Phone Tag ModemScan TBA use a Palm OS War Dialing Results What can be found Modems Secondary dial tones Fax machines Logs warning banner or login prompt for revealing platform information Level of penetration Once you found a bunch of modems, what do you do with them? War Dialing Audit Strong modem and dial-up line policy and procedure Modems identified should be authorized for business use only Scan all telephone lines for authentication and authorization PBX or direct lines from the phone company digital PBX lines VoIP connections perform war dialing periodically Conduct a baseline of the modems within your environment audit the changes to the baseline over time Audit the dial-up banner information 6
7 Network Audit Secure the DMZ Map the hosts in the DMZ Audit goal: Make sure there are no extra ports open on the DMZ hosts Once you find out the open ports/services, use vulnerability tools to find any possible vulnerabilities associated with these services Network scan directions From outside to eliminate externally accessible vulnerabilities Form inside to eliminate internally accessible vulnerabilities Tools used in network scanning and vulnerability accessment Nmap, scanline, superscan Netstat, fport Nessus Firewalk cheops-ng Perimeter Devices Audit Company policy/procedure review and interviews Perimeter configuration Rule validation and perimeter penetration test From outside From inside Tools Auditing router configuration file -- RAT, SDM Password recovery -- Cain & Abel Auditing rule base -- hping2, nmap Services Auditing DNS, DHCP, SMB, FTP, SMTP, SNMP, SSH, VPN auditing basics Web server and database auditing basics Web server and application audit Web server audit Apache Windows IIS Web applications audit Commercial/free tools AppScan from Firewatch Hailstorm from Cenzic Nikto Brutus 7
8 Systems Auditing System information logging information Files and permissions data integrity Users, groups, and passwords services and processes Hidden data and rootkits detection Tools used for system auditing Unix/Linux netstat, nmap and lsof for gathering open ports chkrootkit and rkhunter for trojan horse detection tripwire for file integrity assessment John the Ripper for password recovery tara for an overall Unix assessment scan Windows ScanLine, SuperScan, fport for gathering open ports psservice and tasklist for gathering running services information Rootkit revealer for trojan horse detection Cain & Abel, lophtcrack and DumpSec for auditing users/groups and password strength Microsoft Baseline Security Analyzer for overall Windows assessment scan Measure the systems in our phase I Modem audits Propose a war dialing exercise Get the written permission from Administrator of which range of phones to be audit at certain time period. Perform the audit using phonesweep Analyze the result Auditing selected servers and routers with the defined checklists Presenting results To system administrators To Management Things that surprised us SA did not list VMware servers in the check list Using same password on routers Router uses Cisco type 7 encoding Using same admin password on ITS imaged PCs If a question is not addressed in the security standards, the SA refused to answer on these issues Other issues How to securely deliver sensitive data such as router config to auditing team to audit? PGP How to work with SAs? Benefits Through this audit, the professional auditor learned IT auditing technologies Auditor sits in auditing class Faculty members gain real auditing experiences Benefit to college Utilize the existing resources, save cost Security Officer Enhance the security standard 8
9 Benefits (Con t) Benefit to students Faculty members were able to bring their real auditing experience to the auditing and security courses. The auditing procedures and auditing experience will be added to the auditing course material Invite auditor to the auditing class Future direction Work on phase II How to deal with virtual servers? Work closely with other local companies SCADA included in audit What did we miss? Suggestions and Questions? Contacts Daryl Johnson Yin Pan 9
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur
Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Understanding Security Testing
Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many
By David G. Holmberg, Ph.D., Member ASHRAE
The following article was published in ASHRAE Journal, November 2003. Copyright 2003 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. It is presented for educational purposes
Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad
Vulnerability Assessment and Penetration Testing CC Faculty ALTTC, Ghaziabad Need Vulnerabilities Vulnerabilities are transpiring in different platforms and applications regularly. Information Security
Network Attacks and Defenses
Network Attacks and Defenses Tuesday, November 25, 2008 Sources: Skoudis, CounterHack; S&M Chapter 5 (including many images) CS342 Computer Security Department of Computer Science Wellesley College Networks
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --
Demystifying Penetration Testing
Demystifying Penetration Testing Prepared by Debasis Mohanty www.hackingspirits.com E-Mail: [email protected] Goals Of This Presentation An overview of how Vulnerability Assessment (VA) & Penetration
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
WHITE PAPER. An Introduction to Network- Vulnerability Testing
An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
Security Considerations White Paper for Cisco Smart Storage 1
Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Rapid Vulnerability Assessment Report
White Paper Rapid Vulnerability Assessment Report Table of Contents Executive Summary... Page 1 Characteristics of the Associated Business Corporation Network... Page 2 Recommendations for Improving Security...
DETAILED RISK ASSESSMENT REPORT
DETAILED RISK ASSESSMENT REPORT Executive Summary During the period June 1, 2004 to June 16, 2004 a detailed information security risk assessment was performed on the Department of Motor Vehicle s Motor
!!!!!!!!!!!!!!!!!!!!!!
Infrastructure Security Assessment Methodology January 2014 RSPS01 Version 2.1 RandomStorm - Security Assessment Methodology - RSPS01 Version 2.1-2014 - Page 1 Document Details Any enquires relating to
HIPAA Risk Analysis By: Matthew R. Johnson GIAC HIPAA Security Certificate (GHSC) Practical Assignment Version 1.0 Date: April 12, 2004
HIPAA Risk Analysis By: Matthew R. Johnson GIAC HIPAA Security Certificate (GHSC) Practical Assignment Version 1.0 Date: April 12, 2004 Table of Contents Abstract... 3 Assignment 1 Define the Environment...
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
EC Council Security Analyst (ECSA)
EC Council Security Analyst (ECSA) Course ID SEC190 Course Description Any computer user needs to know how to protect information assets and securely connect to another system over a network. Security5
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Presenters: Bruce Upton CISSP, CISA, C EH [email protected] Jerry McClurg CISSP, CISA, C EH [email protected] Agenda and Overview:
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Open Source Security Tools
Open Source Security Tools Practical Applications for Security Tony Howlett Prentice Hall Professional Technical Reference PRENTICE Upper Saddle River, NJ 07458 www.phptr.com Preface xi Audience xii Contents
ETHICAL HACKING. By REAL TIME FACULTY
w w ẉ s u n m ar s ṣ n et ETHICAL HACKING Duration : 1 Month Timings : 4.30 p.m. to 6.00 p.m. By REAL TIME FACULTY # 407, 4 th Floor, New HUDA MYTHRI VIHAR, Beside Aditya Trade Centre, Ameerpet, Hyd. -
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Vinny Hoxha Vinny Hoxha 12/08/2009
Ethical Hacking and Penetration Testing Vinny Hoxha Vinny Hoxha 12/08/2009 What is Ethical Hacking? Types of Attacks Testing Approach Vulnerability Assessments vs. Penetration Testing Testing Methodology
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)
Ed Ferrara, MSIA, CISSP [email protected]. Fox School of Business
MIS 5208 Week 4 Cybersecurity & Fraud Ed Ferrara, MSIA, CISSP [email protected] Hacking Source: www.youtube.com Computer Crime A cyber breach is any event that intentionally or unintentionally causes
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
2012 Risk Assessment Workshop
2012 Risk Assessment Workshop Agenda Risk Assessment Strategy for Texas State Device Registration Application Risk Assessment using ISAAC Review Server Management responsibilities 1 Risk Assessment Strategy
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
Consensus Policy Resource Community. Lab Security Policy
Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014
QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location
ANTI-HACKER TOOL KIT. ourth Edition
ANTI-HACKER TOOL KIT i ' Mm. i m Fm ourth Edition m CONTENTS Acknowledgments Introduction xvii xix The Best of the Basics 1 Managing Source Code and Working with Programming Languages 3 SCM Concepts 4
Network Penetration Testing
Network Penetration Testing Happiest People Happiest Customers Contents Abstract...3 Introduction...3 Why Penetration Test?...3 Need for Omni-Channel...3 Types of Penetration Testing...3 External Network
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Simple Steps to Securing Your SSL VPN
Simple Steps to Securing Your SSL VPN A five-point strategy for secure remote access Managing secure remote access is a tough job. Because remote systems may directly connect to the Internet rather than
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Log Management for the University of California: Issues and Recommendations
Log Management for the University of California: Issues and Recommendations Table of Contents 1 Introduction...2 2 Candidate Sources of Logged Information...3 3 Recommended Log Management Practices...4
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Penetration Testing - a way for improving our cyber security
OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH [email protected] Copyright The OWASP
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
