Assets, Threats and Vulnerabilities: Discovery and Analysis
|
|
|
- Wendy Wiggins
- 10 years ago
- Views:
Transcription
1 Assets, Threats and Vulnerabilities: Discovery and Analysis A comprehensive approach to Enterprise Risk Management By Symantec Corporation Executive Summary... 2 Evolution of the Network Security Market... 3 Point Solutions Such as Firewalls and Encryption... 3 Intrusion-Driven Scanning for Vulnerabilities... 3 Scanning & Probing Products... 3 Potential Negative Impacts of Invasive Probing... 4 Intrusion Detection Systems... 4 Generation 3 Network Security Management... 4 Driving Forces Global Standards & Regulations... 5 Asset-Driven Risk Assessment... 5 Symantec Corporation... 6 Company Background... 6 Expert 4.1 Product Overview... 6 Risk = Assets x Threats x Vulnerabilities... 6 Comprehensive Database of Always-Current Security Information... 7 Non-Intrusive Network Mapping and Analysis... 7 Iterative Discover, Analyze and Fix Process... 7 Summary... 8 Benefits of Network Security Management... 8 Role-based Adaptability for Different Management Levels and Functions... 8 The Bottom Line... 9 Page 1
2 Executive Summary Over the past decade, the state-of-the-art in network security has evolved from its initial focus on point solutions, such as firewalls and encryption, through a second-generation of technologies that aimed primarily at identifying the entire universe of potential vulnerabilities within a network. As information networks and the organizations that they support have become more far-reaching, heterogeneous and complex, the limited scope of point products and the brute force of vulnerability probing have now both fallen short of meeting the needs of most large enterprise environments. As the third wave in Network Security is emerging, it has become clear that truly effective security measures must take a more comprehensive perspective, by providing a foundation of security information and support tools that allow the organization to interactively assess, prioritize and manage all aspects of protecting its vital information. Such comprehensive assessments must go well beyond just cataloging all the potential vulnerabilities, as has been the focus of second-generation scanning and probing tools. Such third-generation solutions must provide robust enterprise-wide comprehensive business driven risk assessment capabilities. These next generation Network Security Management Systems have to empower decision-makers at all levels, such as security managers, network administrators, CIOs, CFOs, etc., with quantifiable data regarding all three key aspects of the Risk Equation including: Development of a value-graded inventory of all information system Assets Definition of multi-faceted profiles of potential Threats to critical real-world business functions Comprehensive enterprise-level assessment and mapping of actual Vulnerabilities to the corresponding Threat and Asset rankings In addition to needing a structured, comprehensive, asset-driven, risk-assessment methodology, the various levels of corporate staff also require flexible easy-to-use analysis tools that can allow them to model and refine the tradeoffs associated with various security measures. For instance, from a CIO s perspective, it isn t very useful to have an exhaustive listing of every potential vulnerability without the decision-support tools to help define and rank the actual threats and potential costs associated with each one. Or from a network administrator s perspective, a vulnerability or threat listing that cannot be easily mapped to the actual topology of their current network assets is likely to raise their fear level but doesn t do much to help define a plan of action. The balance of this white paper will provide more detail on the evolving requirements for comprehensive asset-driven network security management, the enabling technologies, and the immediate benefits that can be achieved through these third-generation decisionsupport systems. In addition, we will provide background information outlining the specific expertise, capabilities and mission of Symantec Corporation plus a brief product overview of the Expert 4.1 risk assessment and analysis system. Page 2
3 Evolution of the Network Security Market Soon after organizations first began to rely upon networked computer environments to enhance the creation, storage, communication and use of vital information, critical concerns arose regarding the protection of that information from either unauthorized access and/or potential destruction. As with many product evolutions, the network security industry focused initially on shoring up the most glaring security weaknesses, then progressed from there to identifying other vulnerable areas needing attention. Point Solutions Such as Firewalls and Encryption The first generation of network security measures focused directly upon addressing the obvious vulnerabilities. Firewalls were originally designed because the ever-expanding connectivity of computer networks posed the clear risk of unauthorized intrusion. The basic premise of firewall technology is to segment the network into protected areas by establishing guarded gateways that are intended to keep the users and information on the inside safe from access by non-authorized users from the outside. Encryption on the other hand was simply intended to prevent unauthorized users from being able to read vital information even if they did get access to it. The major shortcoming with point solutions, such as firewalls and encryption, essentially lies not in what they can or cannot accomplish, but rather in deciding when and how best to employ them. For instance, a single network with one gateway to the outside world might lend itself to a fairly straightforward intuitive assessment of whether or not to deploy a firewall. But for most of today s larger organizations, the information networks consist of a myriad of internal networks and backbones populated by a heterogeneous mix of client desktops, applications servers, database/storage servers, remote dial-up servers, public-network access points, desktop dial-up modems, Intranet services, Internet presence, etc. Long ago we left behind the time when a security manager or network administrator could reliably deploy their point solutions on merely a gut-feel basis. Intrusion-Driven Scanning for Vulnerabilities The sheer variability and complexity of such network environments led to the development of more sophisticated mechanisms for identifying the vulnerable areas that required attention. A new category of products quickly emerged that essentially consisted of scanning and probing systems. These products were aimed primarily at finding the network s weak points through application of a variety of intrusion scenarios. Scanning & Probing Products The concept of scanning and probing initially appeared as hacker-oriented free-ware products, such as SATAN, COPS, Trip Wire, Strobe, etc., from which evolved a number of commercially supported products. The basic focus of scanning is to simply identify as many of the systems vulnerabilities as possible by actively attempting intrusions at many different points. While most of today s commercial scanning products do a very credible job of identifying vulnerabilities and the counter-measures or safeguards that can be used Page 3
4 to address them, their ranking mechanisms don t go much beyond relatively course gradations, such as High, Medium and Low priority. From a decision-support perspective, these second-generation systems also rarely include any capability for modeling different safeguard scenarios and/or conducting cost-benefit analysis of the proposed counter-measures. Potential Negative Impacts of Invasive Probing Another concern that has arisen with regard to scanning tools is the potential harmful effects that can result from the use of invasive brute force probing methodologies. As with the first tenet of the medical profession, network security products should have a primary goal to do no harm to the systems and organizations that they are serving. In a significant number of cases the mere application of simulated attacks through the use of intrusive probing can actually cause unintended system failures. Given the high cost of downtime and productivity loss associated with most mission-critical systems, system managers simply cannot afford the untargeted usage of an analysis tool that might find a potential vulnerability by inadvertently turning it into a catastrophic failure. Intrusion Detection Systems Another aspect of second-generation network security methods is the evolution of Intrusion Detection Systems, which proactively identify and track patterns of activities that can signal potential intrusion attempts and/or misuse of the information environment. Much of the pioneering work on intrusion detection systems was carried out by the current technology staff of Symantec Corporation as part of contract efforts between Trident Data Systems and the US Air Force Information Warfare Center (AFIWC) at Kelly Air Force Base in Texas. A significant result of this early work by today s Symantec technical staff was the implementation of the Distributed Intrusion Detection System, currently in use throughout Air Force installations worldwide. Much of the groundwork that went into our pioneering intrusion detection efforts consisted of the development of comprehensive methods for defining potential Threats as well as algorithm-driven techniques for quantifiably relating both Threats and Vulnerabilities to the actual criticality of specific Assets throughout the network. The further refinement and extension of these concepts for managing Total Risk Assessment have now formed the foundation for the next industry transition toward comprehensive Generation 3 Network Security Management solutions. Generation 3 Network Security Management The basic thrust of third-generation network security solutions is to bring together all of the pre-existing capabilities into a comprehensive management-oriented capability that allows rational security decisions to be effectively interwoven with the organization s overall mission, goals, and business objectives. The ultimate goal is to be able to make network security risk-management an integral component of the organization s basic tool set for on-going day-to-day management in line with its strategic goals. Rather than Page 4
5 constituting a limited scope activity or a point-in-time event, truly effective security management must be able to provide a top-down comprehensive context for more appropriately deploying specific scans, tests, analysis methods, safeguards and other counter-measures. Driving Forces Global Standards & Regulations Over the past few years the emphasis among leading regulatory and standards-setting organizations within the security environment has been toward the definition and establishment of comprehensive risk management systems. For instance, the British Standard BS7799 defines over 100 specific structured security guidelines in its Part 1 Code of Practices, but now also has added a Part 2 Management Standard that also specifies a management framework, objectives and control requirements for information security management systems. Similarly the U.S. Critical Infrastructure Assurance Office (CIAO) was established by the President in May 1998 to facilitate the creation of a national plan to protect the services that we depend on daily: telecommunications, banking and finance, electric power, transportation, gas and oil, emergency services and government services. In addition, the US General Accounting Office has produced a detailed report that outlines a compendium of best practices while also recommending the establishment of structured systems for managing information security. Ultimately, this emphasis on the management methods employed for ensuring information security appears to be moving the industry toward a process-certification system, potentially analogous to the ISO-9000 certification system used to ensure the integrity of Quality Management methods. As a matter of fact, BS7799 has already been adopted by a number of European countries and is being proposed as an ISO standard. Regardless of whether these emerging management practices remain as recommendations or evolve into mandates, it is clear that in the near future organizations will be held accountable for the rationale of their security management as well as its results. The ability to demonstrate appropriate duty of care measures will become critical factors for avoiding corporate liabilities and successfully meeting business objectives. Asset-Driven Risk Assessment From an enterprise-wide perspective, the structured management of overall security risks must invariably start with an understanding of the relative criticality and value of all the organization s information assets. Only by first identifying, cataloging and analyzing all of its assets can the organization assess the impacts of their potential unauthorized destruction or compromise. The valued-asset inventory then provides an appropriate context for judging the real risks associated with the potential vulnerabilities and threats to those assets. True third-generation information-security management tools, such as Symantec Corporations Expert 4.1 system are able to provide rational decision-support systems by building all subsequent analysis and actions on a solid foundation of assetdriven assessment, based on enterprise-level risk assessment systems and comprehensive business-focused threat and vulnerability databases. Page 5
6 Symantec Corporation Company Background Symantec, a world leader in Internet security technology, provides a broad range of content and network security solutions to individuals and companies. The company is a leading provider of virus protection, vulnerability assessment, Internet content and filtering, and mobile code detection technologies to enterprise customers. Headquartered in Cupertino, Calif., Symantec has worldwide operations in more than 24 countries. Expert 4.1 Product Overview Expert 4.1 is a true third-generation network security analysis and management solution that provides comprehensive decision-support capabilities for all organizational levels and functional areas. By allowing users to quickly and easily discover all aspects of their network, identify informational assets and then define and map vulnerabilities and threats, Expert empowers both technical and non-technical users with the vital businessoriented information needed for rationally allocating security investments. Risk = Assets x Threats x Vulnerabilities Expert builds upon L-3 Network Security s pioneering work that established comprehensive threat definitions and detailed algorithms for conducting Total Risk Assessment. Essentially, these algorithms assist the user in quantifying the combination of asset criticality, threat level and actual vulnerability for every informational asset in the network. By representing the total risk as the volume of a cube defined by all three of these factors, Expert helps the user to quickly determine which assets require attention and also to model which counter-measures and safeguards can have the greatest impacts on reducing overall risk. Asset RISK = Volume of Cube Threat Vulnerability Page 6
7 Comprehensive Database of Always-Current Security Information To aid in accurate analysis and data-driven decision-making, Expert also contains the world s most comprehensive safeguard and vulnerability database. Symantec Security professionals are continually researching, verifying and cataloging the most recent data available in both public and private domains. New information is updated and distributed monthly to registered users of Expert so that their on-going decisions are always based upon up-to-date information. Currently the Expert 4.1 database includes: Component information on hardware, operating systems and software from over 200 vendors Vulnerability information on design, administration and implementation weaknesses that can make systems vulnerable to potential attack Threat information that helps the user categorize potential human threats according to various levels of skill, motivation and access to the computing environment Safeguard information on security software, devices, policies, procedures, software fixes and work-arounds intended to reduce risk Business Specific data to assist users in mapping their security analysis efforts to targeted functional areas, such as manufacturing, finance, engineering, etc. Non-Intrusive Network Mapping and Analysis The heart of Expert s power lies in its ability to quickly and thoroughly discover and map entire networks in a non-intrusive mode. Under direct control of the user, this process automatically scans the network, using standard protocols to find and label all devices, such as computers, routers, firewalls and printers. Expert 4.1 also identifies operating systems, active services, and software in use throughout the network environment. In addition, the software s Modem Discovery function scans phone numbers for modem connections to help identify and enforce policies on controlling dial-up access. Expert 4.1 is specifically designed to perform the entire discovery process in a non-intrusive fashion that neither runs the risk of causing harmful disruptions nor places an extra load on the network. Iterative Discover, Analyze and Fix Process Expert then builds upon the comprehensive network discovery process by providing a rich set of both graphical and text-oriented analysis tools that guide the user through various in-depth assessments of both technical and business issues. Using this logical flow, decisions on safeguards, contingencies etc. can be directly related to their impacts on specific risks as well as their consistency with overall business objectives. Page 7
8 Discover Data gathering Analyze Data analysis Fix Safeguards Network objects Assets Vulnerabilities Threats Unauthorized activity Existing safeguards System performance Posture assessment Risk assessment Safeguard assessment Contingency planning Incident response Business impact Liability impact Policy Access control Encryption Anti-virus Patches Back-ups Physical security As safeguards and other fixes are implemented throughout the enterprise, Expert assists the user in performing an iterative assessment of the actual impacts by re-discovering the network and providing detailed reports comparing the changes in Vulnerabilities, Threats and/or Assets. Summary Benefits of Network Security Management Comprehensive network security management allows users to determine business impacts based upon the organization s specific network environment, informational asset inventory, potential threat profiles, and vulnerability assessment. Expert integrates all of these factors into a flexible decision-support system that empowers the organization s professional staff to deploy appropriate cost-effective safeguards and to continuously monitor the status of their security environment on a real time basis. Role-based Adaptability for Different Management Levels and Functions Expert 4.1 is specifically intended to provide role-based decision-making that allows nontechnical, technical and security staff to map, assess and manage the detailed aspects of the organization s network, while also providing strategic managers (e.g. CIOs and CFOs) with quantifiable answers to key questions, such as: Given the current security posture of my network, what is the annual loss expectancy due to security breaches? Page 8
9 If a specific vulnerability were exploited, what business operations would be impacted and to what degree? What are my potential legal liabilities? What security policies must I have in place to avoid loss of accreditation or litigation? What is the precise ROI of various security policies and countermeasures? How much should I spend on security? In addition to putting real-time vital information in easy-to-understand formats directly into the hands of corporate staff, Expert is finding broad applicability for use by security consultants, Big-5 accounting firms, etc. As a matter of fact, the flexible user-driven network-building capabilities of Expert can even enable a user or consultant to model and analyze various network architectures and topologies prior to beginning a new implementation. In these instances, Expert can actually help users avoid security problems from the outset rather than discovering them later. The Bottom Line The ultimate goal of third-generation information-security solutions in general and Symantec Corporations Expert 4.1 in particular is to: Allow organizations to make intelligent decisions about their network security posture by giving them the ability to comprehensively assess the impact on operations if network data is disclosed, corrupted, or made unavailable. Page 9
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management
Prevent cyber attacks. SEE what you are missing. See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk
WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI
WHITEPAPER Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI About PCI DSS Compliance The widespread use of debit and credit cards in retail transactions demands
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
Simplify Your Windows Server Migration
SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Building a Business Case:
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
MANAGED SECURITY SERVICES
MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Security. Security consulting and Integration: Definition and Deliverables. Introduction
Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
White Paper. Five Steps to Firewall Planning and Design
Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s
Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s emerging threats. In today s sophisticated online env
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
IBM Global Technology Services Preemptive security products and services
IBM Global Technology Services Preemptive security products and services Providing protection ahead of the threat Today, security threats to your organization leave little margin for error. To consistently
HP Security Assessment Services
HP Security Assessment Services HP Data Center Services Technical data Your corporate information and intellectual property are important assets that you want to protect from unauthorized users. Developing
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
For more information email [email protected] or call 703.749.7723
Vulnerability Assessment Methodology Today s networks are typically comprised of a variety of components from many vendors. This adds to the difficulties faced by the system administration staff, as they
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology
l Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Overview The final privacy rules for securing electronic health care became effective April 14th, 2003. These regulations require
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
The Information Assurance Process: Charting a Path Towards Compliance
The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.
Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement
Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Network Intrusion Prevention Systems Justification and ROI
White Paper October 2004 McAfee Protection-in-Depth Strategy Network Intrusion Prevention Systems 2 Table of Contents Are My Critical Data Safe? 3 The Effects and Results of an Intrusion 3 Why the Demand
Put into test the security of an environment and qualify its resistance to a certain level of attack.
Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Proactive IT Solutions More Reliable Networks Are Our Business
Proactive IT Solutions Logo Proactive IT Solutions More Reliable Networks Are Our Business Copyright 2005 Primetime, Inc. All rights reserved. Catalin Ursu [email protected] 973-233-1888 B 973-233-1887
