General Introduction Information Systems Backup & Recovery Physical Security Wireless Security... 20

Size: px
Start display at page:

Download "General Introduction... 3. Information Systems... 5. Backup & Recovery... 14. Physical Security... 17. Wireless Security... 20"

Transcription

1 Contents Prologue... 2 General Introduction... 3 Information Systems... 5 Passwords... 9 PC Security Backup & Recovery Physical Security Wireless Security Identity Theft Social Engineering Security Internet Security Computer Viruses Copyright Hacked Selling Information Security to Top Management

2 PROLOGUE From the standpoint of an Organization, Information has value and is therefore an asset. It needs to be protected just like any other corporate asset. And because as Information must be protected, the infrastructure that supports information must also be protected. This infrastructure includes all the networks, systems and functions that allow an organization to manage and control its information assets. The question is how do you protect your information assets? That s where this course comes in. The Information Security Awareness Course explains what you can do to protect your organization s information assets. The course objective is to raise Information Security Awareness and recognize your role in protecting the organization s information and information systems. The course is covering 12 topics planned to cover the whole spectrum of information security, in chunks easy to digest manner. The course will be concluded by an exam and a course wash-up. 2

3 39

4 Hacked Introduction In today s complex and Internet-dependent environments, the potential risk of a malicious hacker incident or security breach is growing at an alarming rate. The security of systems and applications remains an ongoing challenge for IT and business leadership. Many cyber-attacks are simply automated and indiscriminately target identifiable vulnerabilities in hardware and software, irrespective of the organization that uses them. These vulnerabilities include unpatched software, inadequate passwords, poorly coded websites and insecure applications. Pre Cautions Secure Coding Writing your applications and networks codes in a secure way is vital for the process of defending your applications and network as it assists in minimizing the risk of being hacked. Generally, it is much less expensive to build secure software than to correct security issues after the software package has been completed, not to mention the costs that may be associated with a security breach. Securing critical software resources is more important than ever as the focus of attackers has steadily moved toward the application layer as it has been proved with the top recent attacks. Your development team should be security masterful in order to implement and assess the security level of an application during its full lifecycle. Thus the develop team members should have the responsibility, adequate training, tools and resources to validate that the design and implementation of the entire system is secure. SANS Institute and EC Council are the leaders in this industry and can provide developers with the required tools and skills to attain an acceptable level of secure coding. Security Coding Checklist: Input Validation Output Encoding Authentication and Password Management Session Management Access Control Cryptographic Practices Error Handling and Logging 40

5 Data Protection Communication Security System Configuration Database Security File Management Memory Management Servers Hardening Server Hardening is the process of enhancing server security through a variety of means which results in a much more secure server operating environment. This is due to the advanced security measures that are put in place during the server hardening process. Probably one of the most important tasks to be handled on your servers, becomes more understandable when you realize all the risks involved. The default configuration of most operating systems is not designed with security as the primary focus. Instead, default setups focus more on usability, communications and functionality. To protect your servers you must establish solid and sophisticated server hardening policies for all servers in your organization. Developing a server hardening checklist would likely be a great first step in increasing your server and network security. Make sure that your checklist includes minimum security practices that you expect of your staff. If you go with a consultant you can provide them with your server hardening checklist to use as a baseline. The server hardening checklist varies from an Operating system to another, however the bellow list has the general tasks that should be followed for any operating system: Configure a security policy Disable or delete unnecessary accounts, ports and services Uninstall Unnecessary Applications Configure the operating system internal Firewall / Iptables Configure Auditing Disable unnecessary shares Configure Encryption Updates and Hot Fixes Install trusted Anti-Virus & Anti-Malware Least Privilege Disable Server Banner and Information Enable only the following methods, POST and GET Disable IP6 unless required Review Access Logs and system Error Logs There are a number of tools that could automate the process of Server hardening and the best products includes: Nessus, URL Scan, Microsoft security compliance management toolkit (SCM) and Microsoft baseline security analyzer (MBSA) 41

6 Routine Penetration Tests The most effective way to protect your data is to identify the potential vulnerabilities that exist and close them before you are attacked. By applying a series of thorough tests delivered by highly skilled, experienced experts who can find those holes and vulnerabilities fast, you will be able to quickly fix those areas, which in turn will increase your security posture. Penetration tests are designed to test networks, servers, applications, mobile platforms, laptops, wireless systems, printers and any other hardware or system that can store, transmit or process data that a cyber-criminal can exploit to take control of your systems. Types of Penetration Testing External pen-testing is the traditional, more common approach to pen-testing. It addresses the ability of a remote attacker to get to the internal network. The goal of the pen-test is to access specific servers and crown jewels within the internal network by exploiting externally exposed servers, clients, and people. Whether it is an exploit against a vulnerable Web application or tricking a user into giving you his password over the phone, allowing access to the VPN, the end game is getting from the outside to the inside. Internal pen-testing takes a different approach as it simulates what an insider attack could accomplish. The target is typically the same as external pen-testing, but the major differentiator is the attacker either has some sort of authorized access or is starting from a point within the internal network. Insider attacks have the potential of being much more devastating than an external attack because insiders already have the knowledge of what s important within a network and where it is located, something that external attackers don t usually know from the start. With the rapid changes in the IT industry in terms of technologies and tools, a cyber-criminal could be able to exploit a secure environment after a certain time and thus a routine penetration testing is required to identify the new emerging threats. OCERT Penetration Testing Service Oman National CERT provides penetration testing and Vulnerability assessment to all government and Critical National Infrastructure organizations. You can apply for the service through its website After conducting the Penetration testing and vulnerability assessment you ll receive a detailed report of the discovered vulnerabilities categorized according to their level risk and impact, including the suggested solution according to the best practice. ITA Web Security Policy Information Technology Authority has created a Web Security Policy with the 42

7 guidance of many information security specialists which you can easily follow to implement the best security measures to your web applications and servers. The policy can be downloaded here: Backups There is no doubt that backups are very important in any organization and it is one of the major security measures that must be implemented to ensure the data availability. However, it is important to understand the risks with backups and how to mitigate them. Backups should be stored in a Backup server and hard drives or tapes on daily/ weekly/monthly basis based on the data sensitivity and frequency of updates. The location where backups are stored in must be secured and controlled by an access control to ensure any illegal or unauthorized access. Moreover, Sensitive backups should be encrypted during the transit and the storage in case it falls into the wrong hands. Backup servers are no exception and must be hardened and penetration tested to ensure no vulnerability exists. The physical security of the storage location must be controlled and regulated to deny any unauthorized access. In case the physical storage devices are to be transported to an off-shore location it must be transported in locked containers and a background check on the transportation company and its staff must be conducted. As a regulatory process, all backup operations must be logged so incidents can be traced to their sources. Nowadays automated backups are getting very common as it provides an efficient solution to frequent backups. It is important to select a solution that implements security measures and logging service to keep track of the processes and their status. Such solutions must be updated and patched regularly. Testing the backup files is vital and must be done on regular basis on a test environment to ensure the data accuracy and its retention process. Monitoring Monitoring can assist greatly in detecting server performance, network performance, access logs and any malicious activities happening at the server level. Moreover, monitoring during testing phase could detect the threats that could be addressed and fixed before going live. As new threats emerge, monitoring could also detect them by identifying suspicious behavior which needs further investigation. Monitoring Benefits: 1. Protect against internal and external threats 2. Make the most of existing and future security investments 43

8 3. Bolster security with advanced research and global security intelligence 4. Obtain comprehensive visibility into the security activity on your network 5. Meet and exceed regulatory requirements for log monitoring It is important to follow an international standard when it comes to Log Monitoring like PCI-DSS and ISO Some organizations MUST follow these standards in order to get a license to conduct business like Critical National Infrastructure organizations i.e. Banks, Traffic Management, Oil and Gas etc. There are also a number of Operation Monitoring Frameworks that you can follow including Microsoft Operations Framework, and such frameworks can assist in: 1. Assess business exposure and identify which assets to secure. 2. Identify ways to reduce risk to acceptable levels. 3. Design a plan to mitigate security risks. 4. Monitor the efficiency of security mechanisms. 5. Re-evaluate effectiveness and security requirements regularly. As a best practice, it is important to acquire a monitoring solution that could gather all the monitoring logs in a central secured location to ease the process of viewing the logs and dealing with them. It is also advisable to have a dedicated monitoring team to do such task since they will play a vital role in viewing tons of logs and do the necessary security checks to identify high risk activities. The sections below will discuss what to monitor along with processes and solutions: Unauthorized Access (Security Audit) There are two types of events that are recorded in the Security event log: success audits and failure audits. Success Audit events indicate an operation that a user, service, or program performed has completed successfully. Failure Audit events detail operations that have not completed successfully. For example, failed user logon attempts would be examples of Failure Audit events and would be recorded in the Security event log if logon audits were enabled. In theory, Users must only be permissible to carry out certain tasks that were given to them by the administrator, so any tasks that are not allowed should be investigated, reported and restricted. Failure audits in most cases means an attack is happening and must be dealt with as quickly as possible to minimize the risks of any cyber-attacks. A policy should also be created to block any further attempts i.e. IP lockdown, username lockout etc. To assess your Security Audit policies it is important to: 1. Review current security audit settings. 2. Assess administrator roles and normal user tasks. 3. Review business policies and procedures. 44

9 4. Identify vulnerable systems. 5. List high-value assets. 6. Identify sensitive or suspicious accounts. 7. List authorized programs. 8. Investigate attempts from unusual geographic areas. It is also recommended to have a written process of adding new users to your Active Directory along with the roles they will be assigned to according to their level of access. Malicious Activity Monitoring Malicious activities can range from scanning for ports to planting worms and viruses. Such activities can be easily spotted by applying the above mentioned strategy and having an IDS/IPS in place. It is very important to capture as much information as possible in order to prevent and investigate such activities. Many advanced IDSs can notify the monitoring team of those activities which needs to be addressed in real time to minimize the impact and allow the team to investigate them further to avoid any false-positive notifications. The damage caused by an insider threat can take many forms, including the introduction of viruses, worms, or trojan horses; the theft of information or corporate secrets; the theft of money; the corruption or deletion of data; the altering of data to produce inconvenience or false criminal evidence; and the theft of the identities of specific individuals in the enterprise. Protection against the insider threat involves measures similar to those recommended for Internet users, such as the use of multiple spyware scanning programs, anti-virus programs, firewalls, and a rigorous data backup and archiving routine. Intrusion Detection An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS can play a vital role in early detecting security threats to your network, servers and websites. An IDS can be configured to detect certain types of malicious activities and notify the monitoring team about them. IDS Types Misuse detection vs. anomaly detection: in misuse detection, the IDS analyzes the information it gathers and compares it to large databases of attack signatures. Essentially, the IDS looks for a specific attack that has already been documented. Like a virus detection system, misuse detection software is only as good as the database of attack signatures that it uses to compare packets against. In anomaly detection, the system administrator defines the baseline, or normal, state of the network s traffic load, breakdown, protocol, and typical packet size. The anomaly 45

10 detector monitors network segments to compare their state to the normal baseline and look for anomalies. Network-based vs. host-based systems: in a network-based system, or NIDS, the individual packets flowing through a network are analyzed. The NIDS can detect malicious packets that are designed to be overlooked by a firewall s simplistic filtering rules. In a host-based system, the IDS examines at the activity on each individual computer or host. Passive system vs. reactive system: in a passive system, the IDS detects a potential security breach, logs the information and signals an alert. In a reactive system, the IDS responds to the suspicious activity by logging off a user or by reprogramming the firewall to block network traffic from the suspected malicious source. Intrusion Prevention Intrusion prevention system is used in computer security. It provides policies and rules for network traffic along with an intrusion detection system for alerting system or network administrators to suspicious traffic, but allows the administrator to provide the action upon being alerted. Some compare an IPS to a combination of IDS and an application layer firewall for protection. Intrusion prevention systems can be classified into four different types: 1. Network-based intrusion prevention system (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity. 2. Wireless intrusion prevention systems (WIPS): monitor a wireless network for suspicious traffic by analyzing wireless networking protocols. 3. Network behavior analysis (NBA): examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware and policy violations. 4. Host-based intrusion prevention system (HIPS): an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host. Having an IPS in place helps in taking an early action to prevent such activities and give more time to the monitoring team to investigate them. OCERT Monitoring Service Oman National CERT provides monitoring services for different levels and environments including: 1. Network Monitoring 2. Website Logs Monitoring 3. Website URL monitoring 4. Server Monitoring To read more about OCERT monitoring service please visit the following page: 46

11 Updates / Patching With the new emerging threats and zero-day-attacks it is important to keep your servers and appliances updated and patched to avoid any sudden attacks. Moreover, registering with reputable information security advisories is recommended to be notified of any alert. Automatic OS Updates Having automatic updates could save the administrators valuable time updating and patching in big organizations. Moreover, to hasten the process and ensure all machines are updated and patched is to use a central updates and patching deployment system which can be managed and pushed by the administrators. Latest Threats and Notifications Oman National Provides an online Threats and Alerts Notification (TNAS) service which you can join to be updated with the latest threats in Arabic and English. In addition, you can register through to receive the latest TNASs in your inbox. Scanning Having Anti-virus and Anti-spam solutions in your servers and machines would protect you from harmful and malicious viruses, Trojans and Bot Nets. Keeping your anti-virus definitions up to date is critical and should be managed professionally through an enterprise solution that pushes the updates to all the organization computers. With such enterprise solutions administrators can control the updates and also prohibit users from turning the AV off by using a password protected features that are only accessible to administrators. Malware Scanning Oman National CERT provides administrators and normal users an option to scan their machines against known malicious codes via the Cyber Clean Project which is accessible through OCERT CCP Security Auditing Passwords Passwords are generally the first line of defense against hackers and thus it is important to choose a password that is complex, hard to guess and non-dictionary. However the main challenge is to ensure the password rotation and renewal. At the active directory level, passwords must be set to be complex and by complex it must have at least one of the following: 1. Lowercase letter [abcdefghijklmnopqrstuvwxyz] 2. Uppercase letter [ABCDEFGHIJKLMNOPQRSTUVWXYZ] 3. Number [ ] 4. Character [!@#$%^&*()_+{} :»<>?~`-=[];,./] 47

12 Moreover, password must expire! Many databases gets hacked and users profiles gets leaked and thus it is important to routinely change the passwords and that is doable via enabling the password expiry rule in most advanced servers. For very sensitive data, there is a concept of two way authentication which requests the users to enter their passwords along with a second token or key that is securely generated and shared with the users. Many large organization uses hardware based token generators that are tied with the user account to ensure maximum security. In addition, there are software based token generators such as Google Authenticator which generates token numbers that keep changing over a short period of time. Many users think that having complex password, password rotation and 2-way authentication are inconvenient but those users must be educated about the importance of such procedure and how it assists in protecting theirs and their organizations information. Access Control Access control determines who should access what and what their level of access and their roles generally. Administrators should be ready with certain access templates to authenticate them against the Active Directory and ensure that only genuine users can access the organization network to carry their allotted tasks. Roles are very crucial since it determine the level of access granted to the users and ensure that users can get leveraged access to restricted and confidential data they are not supposed to access. Hackers will always try to get access to an organization network to steal information or to carry out an attack by leveraging certain rules, cracking password or through a backdoor. Such attempts must be identified in real-time and blocked immediately. Secure Remote Communication In many cases users would need to access their confidential data outside the organization premises i.e. s, and that should be done through secure channels to minimize the leakage of information. This can be done over: Secure FTP: is a computing network protocol for accessing and managing files on remote file systems. The main role of SFTP is to encrypt commands and data both, preventing passwords and sensitive information from being transmitted in the clear over a network. Secure Forms (SSL): Web servers and web browsers rely on the Secure Sockets Layer (SSL) protocol to help users protect their data during transfer by creating a uniquely encrypted channel for private communications over the public Internet. Each SSL Certificate consists of a key pair as well as verified identification information. When a web browser (or client) points to a secured website, the server shares the public key with the client to establish an encryption method 48

13 and a unique session key. The client confirms that it recognizes and trusts the issuer of the SSL Certificate. This process is known as the «SSL handshake» and it begins a secure session that protects message privacy, message integrity, and server security. SSL certificates can be purchased online through reputable companies such as Verisign, Symantec and other authorized Certificate Authorities (CA). VPN Access: VPNs, or Virtual Private Networks, allow users to securely access a private network and share data remotely through public networks. Much like a firewall protects your data on your computer, VPNs protect it online. And while a VPN is technically a WAN (Wide Area Network), the front end retains the same functionality, security, and appearance as it would on the private network. Secure Shell (SSH): SSH creates both the VPN tunnel and the encryption that protects it. This allows users to transfer information unsecured data by routing the traffic from remote fileservers through an encrypted channel. The data itself isn t encrypted but the channel its moving through is. SSH connections are created by the SSH client, which forwards traffic from a local port one on the remote server. All data between the two ends of the tunnel flow through these specified ports. Encryption It is always advisable to encrypt the data stored in the user s machines, servers and any storage device that contain sensitive data. Encryption can cause a delay in retrieving large amounts of data as it need to decrypt the data into a readable format before sending it back to the user. However, with the advancement in the processers these days this shouldn t an obstacle since the advantages outweigh the disadvantages. Many large organizations including ITA has enforced a policy to encrypt all portable devices including Laptops to add an additional layer of security in case the theft or lose of such devices which mostly contain sensitive data. Firewall A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Firewalls can be either hardware or software but the ideal firewall configuration will consist of both. In addition to limiting access to your computer and network, a firewall is also useful for allowing remote access to a private network through secure authentication certificates and logins. Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. Most hardware firewalls will have a minimum of four 49

14 network ports to connect other computers, but for larger networks, business networking firewall solutions are available. Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer. Application Firewall Application firewalls secure and protect application communications, in much the same way that network firewalls secure and protect network communications. By being aware of the language that applications use to transmit information, application firewalls can deny or modify invalid or suspicious activity. The widely used application firewalls include: ModSecurity and URLScan. Environment Segregation It is always a good practice to segregate your environments as it helps in minimizing the risk of publicly publishing harmful or buggy applications and codes. The 3 main advisable environments are: Testing Environment This environment provides limited restriction to the administrators and developers within an organization to test their application under different circumstances i.e. testing wrong data, penetration testing, code security check, sending harmful packages, creating non reversible actions etc. This environment is important since developers will have a replica of their production environment but with no fear of destroying it while conducting their tests since it is a private environment and not accessible by the public. Development Environment This environment is considered as the heaven of developers, they control the whole environment in terms of access and freedom to control the applications, installations, deletions etc. Developers can develop, test, and experiment with this environment as they see fit with their needs and requirements. Production Environment This is a very sensitive environment and the level of access should and must be controlled by professional administrators to ensure that it is up and running all the time. All the controls, firewalls, IPSs and IDSs should be configured and in place to protect this environment from hackers and cyber criminals. Usually an application or data must go through the two above mentioned environments to ensure their stability before being transferred to this environment by professional administrators. 50

15 Recovery Data recovery is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible for any reason. In enterprise information technology (IT), data recovery typically refers to the restoration of data to a desktop, laptop, server, or external storage system from a backup. The data recovery process may vary, depending on the circumstances of the data loss, the data recovery software used to create the backup, and the backup target media. For example, many desktop and laptop backup software platforms allow end users to restore lost files themselves, while restoration of a corrupted database from a tape backup is a more complicated process that requires IT intervention. Data recovery can also be provided as service. Such services are typically used to retrieve important files that were not backed up and accidentally deleted from a computer s file system but still remain on disk in fragments. An organization s disaster recovery plan should make known who in the organization is responsible for recovering data, provide a strategy for how data will be recovered and document acceptable recovery point and recovery time objectives. In case of emergencies a partial or full recovery should be made to make systems go live with the accurate data. How to deal with it This section will outline how to deal with successful hacking attempts to your system, website, network, database etc. The first step is to report such incident to a reputable organization that has the capabilities to investigate and resolve any cyber incidents while maintaining your privacy and confidentiality. Oman National CERT does fit that profile and will assist you with no additional cost and will act immediately. Oman National CERT How & Where to report OCERT provides different reporting channels including: 1. Online Incident Report 2. ocert999@ita.gov.om 3. Phone: (+968) What to prepare While waiting for a reply from OCERT, you can prepare the following items which will be required for the investigation process: 1. Log Files (Access Log Files, Server Log Files, Error Log File) 2. Copy of the infected file(s) 3. Full copy of the infected system 51

16 Additional items might be requested based on the results of the initial investigation and that will be requested at an earlier stage. Evidence Handling You infected or hacked machine, server, network is considered a crime scene and must be dealt with accordingly. Machines must not be restarted or normally shutdown under any circumstances. Internet/intranet connection cables can and should be disconnected immediately to start the damage control process. In case of criminal charges the infected machines will be used as evidence and the digital forensics team will analyze the evidence and write their final report which will be used in the court of law. Regain control With the above items kept in mind, it is important to regain control over your infected machines by: 1. Take your infected machine Offline! Disconnect it from local and external access. 2. Try to remove the infected files, scripts or malware. Once done with this process and you have reported the incident, you re welcome to assess the damage occurred of such an attack including: 1. Were they looking for sensitive information? 2. Did they want to gain control of your site for other purposes? 3. Look for any modified or uploaded files on your web server. 4. Check your server logs for any suspicious activity, such as failed login attempts, command history (especially as root), unknown user accounts, etc. 5. Determine the scope of the problem do you have other sites that may be affected? It is also important to understand that so far you haven t fixed the source of the problem so don t try to recover the website and publish it yet. 52

17 Investigations Log Reviews Oman National CERT team will send you a fully detailed report of the findings along with the possible fixes and will guide you through the recovery process. In addition since your organization is a target it would be advisable to forward all your access logs to OCERT monitoring team to do live monitoring to detect and prevent any malicious activities. There re a number of scripts and applications built in OCERT that could assist administrators in detecting and preventing possible hacking attempts. Such tools include the CIA Content Integrity Agent which prevents hackers from adding or altering any files on web servers. References 1. OWASP SCP Quick Reference Guide v2 2. Server Hardening Website Steps to harden Windows Servers 4. Linux Server Hardening Tips 5. Why penetration testing is important? 6. Internal vs. External Pen-Testing 7. Security Monitoring and Attack Detection 8. Secure Sockets Layer (SSL): How It Works 53

18 SELLING INFORMATION SECURITY TO TOP MANAGEMENT Introduction In order to really enforce people, you need to get top level buy-in, Ira Winkler, chief security strategist at Codenomicon. According to a survey that was done by Infosectoday.com in 2013 Top management support was the number 1 issue facing information security adaptation in most organizations in the US. Thus it s important to tackle this issue and propose solutions to overcome the reluctance of top management. Security has traditionally been viewed as a tradeoff with business productivity. It s been this way for years. But it doesn t have to be. CIOs and CISOs need to have their finger on the pulse of security and how it affects their business from a tactical and strategic perspective. Information security if practiced right shouldn t slow down the business, but actually complement it and even improve business agility. Proving security pays is difficult. In fact, with many security technologies, there s no demonstrable return on investment (ROI) justification for their deployment. But during the different sections of the course you ll possess the skills and techniques to sell Information Security to the Top Management. In this chapter we ll focus on the possible ways you as a security officer can sell Information Security to your organization s top management. Why top management doesn t understand information security! Before discussing the methods and solutions, it s important to understand how top management think in any organization that doesn t have a functional information security office. Information security is viewed as an operation Most c-level managers doesn t view information security as a strategic review, but more of an operational issue that could function on its own with the least amount of resources provided. This attitude has caused many organizations to either ignore information security or isolate the security team from other parts of the business and eliminate any possibility of communication between the security team and the business managers. 54

19 Different communication language Most managers are concerned about financial figures, Expenses, Profits and Return on Investment (ROI), so in concept they don t speak the same language as information security managers whom are concerned about data loss prevention, intrusion detection, policies, controls etc. Information security is not tangibly measured Most managers focuses on tangible results, unfortunately information security success is not tangibly measured since most of the investment to be made will protect intangible items even though what information security policies and controls protect is very crucial and critical to the business. IT and information security roles conflict Top management still believe that information security should be an IT operational Task and should be managed by the IT department without understanding the real role of Information security offices and how they should be totally independent in terms of management to carry their tasks efficiently. Top management isn t techically aware of the risks associated When the subject of information security is raised in management meetings it usually gets the lowest priority and least amount of time to be discussed since senior managers aren t technically aware of computer security crimes and cybercrimes. Solutions After knowing how top management think and precieve information security it would be great to know how to change their mindset and persuade them of the importance of information security to the organization. Get to know the right persons within your organization Having friendly discussion with the CFO, CEO or internal audit director could give you excellent insight on how best to approach the board. Also, make sure you have some space for discussing Information Security. These are your opportunities to keep the CEO up to date on your company s major risks and protective measures. Keep your ceo updated on laws and regulations Information protection is now mandatory. Laws, regulations, insurance requirements and shareholder expectations now make information protection a business requirement. Based on your organization s reporting structure, the CEO is the one who will deliver the InfoSec message to the board. You then need to win the heart and mind of your CEO and, hence, the board. Be very opportunistic CEOs are very selective about what they present to the board. You can take advantage of this to put information security on the agenda. For example, a well- 55

20 publicized computer crime (e.g. the recent Heartbleed vulnerability) is bound to have their attention. You can do the same with incidents within your own organization. Demonstrate that a major computer breach could mean that next quarter s numbers may be considerably lower. You should be very specific and provide numbers estimation. Leverage (and try to influence) the work performed by others The Internal Audit department work is usually very valuable. External audits and security testing services can also help a lot. As an ISP, you might be subject to ISAE audits. Use those to push your needs and concerns to the board. For example, I have recently performed an Information Security Governance audit for a big company. The client was their Internal Audit department, who was informally «hired» to do it by the CSO / Security department in order to move things forward with the board. Point out how good information security can be a value-add for your company Even though a CEO or some other top executive might understand the need for compliance, other members of top management probably won t buy into this idea this is why it is important to find some other benefits for implementing information security. I usually recommend thinking about four types of benefits: compliance, marketing, lowering costs, and optimizing business processes. The benefits of information security, especially the implementation of ISO are numerous. The following four are the most important: Compliance It might seem odd to list this as the first benefit, but it often shows the quickest return on investment if an organization must comply to various regulations regarding data protection, privacy and IT governance (particularly if it is a financial, health or government organization), then ISO can bring in the methodology which enables to do it in the most efficient way. Marketing edge In a market which is more and more competitive, it is sometimes very difficult to find something that will differentiate you in the eyes of your customers. ISO could be indeed a unique selling point, especially if you handle clients sensitive information. Lowering the expenses Information security is usually considered as a cost with no obvious financial gain. However, there is financial gain if you lower your expenses caused by incidents. You probably do have interruption in service, or occasional data leakage, or disgruntled employees. Or disgruntled former employees. The truth is, there is still no methodology and/or technology to calculate how much money you could save if you prevented such incidents. But it always sounds good if you bring such cases to management s attention. 56

21 Putting your business in order This one is probably the most underrated if you are a company which has been growing sharply for the last few years, you might experience problems like who has to decide what, who is responsible for certain information assets, who has to authorize access to information systems etc. Use well-accepted techniques of finance and decision-making processes to justify infosec investments Business executives spend money based on ROI, and may not react well to an approach based on unquantified, albeit very real, fears. It s not always easy -the available solutions often don t lend themselves to a by-the-numbers analysis- but your best shot is to present an objective and quantified estimate of the returns on InfoSec investments. These are would help you a lot when talking about finance and decision making processes: Company or executive liability The CEO and board of directors can be held personally liable if they re shown to have known that a business risk existed and they did nothing to remediate the risk. So, you can leverage this (gently) in your communication. Once they re on board with the need to self-assess, they may even elect to conduct physical pen testing of the company premises. «fire inspection» install key-logging USB sticks that phone home, on all the machines.) Costs or lost revenue from pci-dss If you receive payments through credit cards, the PCI-DSS «standard» mandates that certain security solutions must be implemented within the business infrastructure. Credit card companies have come up with this as a way of shifting the liability for fraudulent transactions from them, to you (the customer-facing business). If you were to be audited (and I m dealing with a medium-sized business that s being audited right now), you could be forced to bring in 3rd-party security vendors or managed-service-providers to assess and implement security, all at a much higher cost than you could do on your own, or risk being cut off from processing by Visa, MC, and/or AmEx until you can prove that you ve corrected the issues and have paid for an independent audit. You should seek more info on this on your own, as this is a real-world liability that s showing up for more and more businesses. Downtime and revenue-impact from government intervention In case of a successful cyber attacks targeting your organization the risk here is that legal enforcement agencies could confiscate computers or have your backbone drop(s) cut off until the exploited systems were cleaned. If you run your own datacenter, then you could see servers or racks disappear or at least be taken offline for some time while forensics are performed. This downtime could be devastating to the business. 57

22 Hackers An unprotected network, or insufficiently protected endpoints, could end up being the target (pun intended) of black-hat, grey-hat, or white-hat hackers. In other words, an independent 3rd-party may find a way to breach your systems for fun or profit. The outcomes of cyber-attacks could include: Company funds stolen through compromised banking login credentials, or directly accessed (owned) internal systems; Having to notify your customers that your systems have been breached, and their customer data (passwords, credit-card numbers, etc) has been stolen; Having to negotiate ransom payments with attackers to regain access to critical internal systems that they ve encrypted in order to lock you out and force you to pay; Having to negotiate with «security researchers» to gain sufficient time to patch internal systems or close security holes, before they «go public» with information that they ve defeated your perimeter security or layered defense mechanisms. The more aggressive «researchers» may provide proof-ofconcept tools or even detailed instructions on how to replicate the attack, so that other researchers may validate their findings (while hackers leverage the newly-disclosed info for an actual attack). Promoting a culture of security A culture of security is not an end in itself, but a pathway to achieve and maintain other objectives, such as proper use of information. The greatest benefit of a culture of security is the effect it has on other dynamic interconnections within an enterprise. It leads to greater internal and external trust, consistency of results, easier compliance with laws and regulations and greater value in the enterprise as whole. Who should information security office reports to? It seems like a simple question. After all, there seems to be little debate about where other C-suite officers should report. While there have been some discussions about the reporting structure for such C-level executives as the chief privacy officer and the chief compliance officer. As a best practice the CISO or the whole Information Security Office should report to the CEO since it s easier to convince the management and the board through him/her, however reporting to the CTO shouldn t stop you from carrying out your tasks as long you get the support required. 58

23 Oman national CERT role Oman National CERT has established a full program to promote Information Security Offices in the government and CNI entities providing the IS officers with the required tools including policies, office structure, controls, awareness programs to promote a security culture within their organizations. In addition Oman National CERT is willing to meet the top management to present the importance of information security and ultimately assist the implementation of a successful information security program. Conclusion In conclusion, it s important to know how to sell Information Security to your organization s top management to get the support required to carry your responsibilities easily and efficiently. We believe that by end of this course you have the skills and techniques required to convince the top management to support your department and team to fulfil their tasks and projects. References 1. ISO/IEC 17799:2005. Information Technology - Security Techniques - Code of Practice for Information Security Management, ISO, Geneve. (2005). 2. ISO/IEC 27001:2005. Information Technology - Security Techniques - Information Security Management Systems - Requirements, ISO, Geneve. (2005). 3. Heikkinen, I., Ramet, T., E-Learning as a Part of Information Security Education Development from Organisational Point of View». Oulu University, Oulu, Finland., In Finnish (2004). 4. Kajava, J., Critical Success Factors in Information Security Management in Organizations: The Commitment of Senior Management and the Information Security Awareness Programme (Abstract in English). Hallinnon tutkimus - Administrative Studies, Volume 22, Number 1, Tampere. (2003). 5. Lempinen H., Security Model as a Part of the Strategy of a Private Hospital (In Finnish), University of Oulu, Finland. (2002). 6. OECD, OECD Guidelines for the Security of Information Systems and Networks - Towards a Culture of Security, OECD Publications, Paris, France, 29 p. (2002). 59

24 EPILOGUE During this course you have covered a large concept and material. You should now be prepared to handle many of the potential treats that may confront you regarding information security. It is important to reemphasize a couple of points. First, the technology resources that you use and the information that you use, manipulate, access, create, or store in the process of doing your job, Their function is to make your job easier. Second, security policies and procedures were created not only protected us information but to help us achieve our objectives. It is your responsibility to help in the protection of this information. 60

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

Society for Information Management

Society for Information Management Society for Information Management The Projected Top 5 Security Issues of 2010 Steve Erdman CSO and Staff Security Consultant of SecureState Network +, MCP Precursor 2009 has been a difficult year in Information

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

On-Site Computer Solutions values these technologies as part of an overall security plan:

On-Site Computer Solutions values these technologies as part of an overall security plan: Network Security Best Practices On-Site Computer Solutions Brian McMurtry Version 1.2 Revised June 23, 2008 In a business world where data privacy, integrity, and security are paramount, the small and

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts. Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Why The Security You Bought Yesterday, Won t Save You Today

Why The Security You Bought Yesterday, Won t Save You Today 9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C. Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

LogRhythm and PCI Compliance

LogRhythm and PCI Compliance LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

KEY STEPS FOLLOWING A DATA BREACH

KEY STEPS FOLLOWING A DATA BREACH KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

Data Loss Prevention in the Enterprise

Data Loss Prevention in the Enterprise Data Loss Prevention in the Enterprise ISYM 525 Information Security Final Paper Written by Keneth R. Rhodes 12-01-09 In today s world data loss happens multiple times a day. Statistics show that there

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001 001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110

More information

Codes of Connection for Devices Connected to Newcastle University ICT Network

Codes of Connection for Devices Connected to Newcastle University ICT Network Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

NON-PROFIT ORGANIZATIONS NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT CONTRACTING

NON-PROFIT ORGANIZATIONS NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT CONTRACTING NON-PROFIT ORGANIZATIONS NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT CONTRACTING Lee E. Rice 1 and Syed (Shawon) M. Rahman, Ph.D. 2 1 School of Business and IT, Capella University, Minneapolis, MN,

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref: SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

Critical Security Controls

Critical Security Controls Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter The Critical Security Controls The Critical Security

More information

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats Symantec Enterprise Security WHITE PAPER Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats INSIDE Executive Summary Challenges to securing NAS An effective

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information