EC-Council Certified Incident Handler
|
|
|
- Elijah Gardner
- 10 years ago
- Views:
Transcription
1 Page 1 Certified Incident Handler
2 Page 2 TM E CIH Certified Incident Handler
3 Course Description The Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. Page 3 In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident reporting methods, and incident recovery techniques in detail. The E CIH certification will provide professionals greater industry acceptance as the seasoned incident handler. Who Should Attend This course will significantly benefit incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals and anyone who is interested in incident handling and response. Duration 2 days (9:00 5:00) Certification The E CIH exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the E CIH certification.
4 Course Outline v1 Page 4 Module 01: Introduction to Incident Response and Handling Cyber Incident Statistics Computer Security Incident Information as Business Asset Data Classification Common Terminologies Information Warfare Key Concepts of Information Security Vulnerability, Threat, and Attack Types of Computer Security Incidents Examples of Computer Security Incidents Verizon Data Breach Investigations Report 2008 Incidents That Required the Execution of Disaster Recovery Plans Signs of an Incident Incident Categories o Incident Categories: Low Level o Incident Categories: Middle Level o Incident Categories: High Level Incident Prioritization Incident Response Incident Handling Use of Disaster Recovery Technologies Impact of Virtualization on Incident Response and Handling Estimating Cost of an Incident Key Findings of Symantec Global Disaster Recovery Survey Incident Reporting
5 Incident Reporting Organizations Vulnerability Resources Module 02: Risk Assessment Risk Risk Policy Risk Assessment NIST s Risk Assessment Methodology o Step 1: System Characterization o Step 2: Threats Identification o Step 3: Identify Vulnerabilities o Step 4: Control Analysis o Step 5: Likelihood Determination o Step 6: Impact Analysis o Step 7: Risk Determination o Step 8: Control Recommendations o Step 9: Results Documentation Steps to Assess Risks at Work Place o Step 1: Identify Hazard o Step 2: Determine Who Will be Harmed and How o Step 3: Analyze Risks and Check for Precautions o Step 4: Implement Results of Risk Assessment o Step 5: Review Risk Assessment Risk Analysis o Need for Risk Analysis o Risk Analysis: Approach Risk Mitigation o Risk Mitigation Strategies Page 5
6 Page 6 Cost/Benefit Analysis NIST Approach for Control Implementation Residual Risk Risk Management Tools o CRAMM o Acuity STREAM o Callio Secura o EAR / Pilar Module 03: Incident Response and Handling Steps How to Identify an Incident Handling Incidents Need for Incident Response Goals of Incident Response Incident Response Plan o Purpose of Incident Response Plan o Requirements of Incident Response Plan o Preparation Incident Response and Handling Steps o Step 1: Identification o Step 2: Incident Recording o Step 3: Initial Response o Step 4: Communicating the Incident o Step 5: Containment o Step 6: Formulating a Response Strategy o Step 7: Incident Classification o Step 8: Incident Investigation o Step 9: Data Collection
7 o Step 10: Forensic Analysis o Step 11: Evidence Protection o Step 12: Notify External Agencies o Step 13: Eradication o Step 14: Systems Recovery o Step 15: Incident Documentation o Step 16: Incident Damage and Cost Assessment o Step 17: Review and Update the Response Policies Training and Awareness Security Awareness and Training Checklist Incident Management o Purpose of Incident Management o Incident Management Process o Incident Management Team Incident Response Team o Incident Response Team Members o Incident Response Team Members Roles and Responsibilities o Developing Skills in Incident Response Personnel o Incident Response Team Structure o Incident Response Team Dependencies o Incident Response Team Services Defining the Relationship between Incident Response, Incident Handling, and Incident Management Incident Response Best Practices Incident Response Policy Incident Response Plan Checklist Incident Handling System: RTIR RPIER 1st Responder Framework Page 7
8 Page 8 Module 04: CSIRT What is CSIRT? What is the Need of an Incident Response Team (IRT) CSIRT Goals and Strategy CSIRT Vision Common Names of CSIRT CSIRT Mission Statement CSIRT Constituency CSIRT Place in the Organization CSIRT Relationship with Peers Types of CSIRT Environments Best Practices for creating a CSIRT o Step 1: Obtain Management Support and Buy-in o Step 2: Determine the CSIRT Development Strategic Plan o Step 3: Gather Relevant Information o Step 4: Design your CSIRT Vision o Step 5: Communicate the CSIRT Vision o Step 6: Begin CSIRT Implementation o Step 7: Announce the CSIRT o Step 8: Evaluate CSIRT Effectiveness Role of CSIRTs Roles in an Incident Response Team CSIRT Services o Reactive Services o Proactive Services o Security Quality Management Services CSIRT Policies and Procedures o Attributes
9 o Content o Validity o Implementation, Maintenance, and Enforcement How CSIRT Handles a Case CSIRT Incident Report Form Incident Tracking and Reporting Systems o Application for Incident Response Teams (AIRT) o BMC Remedy Action Request System o PGP Desktop o The GNU Privacy Guard (GnuPG) o Listserv CERT CERT-CC CERT(R) Coordination Center: Incident Reporting Form CERT:OCTAVE o OCTAVE Method o OCTAVE-S o OCTAVE Allegro World CERTs o Australia CERT (AUSCERT) o Hong Kong CERT (HKCERT/CC) o Indonesian CSIRT (ID-CERT) o Japan CERT-CC (JPCERT/CC) o Malaysian CERT (MyCERT) o Pakistan CERT (PakCERT) o Singapore CERT (SingCERT) o Taiwan CERT (TWCERT) o China CERT (CNCERT/CC) Page 9
10 Page 10 o US-CERT o Government Forum of Incident Response and Security Teams (GFIRST) o Canadian CERT o Forum of Incident Response and Security Teams o CAIS/RNP o NIC BR Security Office Brazilian CERT o EuroCERT o FUNET CERT o SURFnet-CERT o DFN-CERT o JANET-CERT o CERT POLSKA o Swiss Academic and Research Network CERT IRTs Around the World Module 05: Handling Network Security Incidents Denial-of-Service Incidents Distributed Denial-of-Service Attack Detecting DoS Attack Incident Handling Preparation for DoS o DoS Response Strategies o Preventing a DoS Incident o Following the Containment Strategy to Stop DoS Unauthorized Access Incident o Detecting Unauthorized Access Incident o Incident Handling Preparation
11 o Incident Prevention o Following the Containment Strategy to Stop Unauthorized Access o Eradication and Recovery o Recommendations Inappropriate Usage Incidents o Detecting the Inappropriate Usage Incidents o Incident Handling Preparation o Incident Prevention o Recommendations Multiple Component Incidents o Preparation for Multiple Component Incidents o Following the Containment Strategy to Stop Multiple Component Incidents o Recommendations Network Traffic Monitoring Tools o Ntop o EtherApe o Ngrep o SolarWinds: Orion NetFlow Traffic Analyzer o Nagios: op5 Monitor o CyberCop Scanner Network Auditing Tools o Nessus o Security Administrator s Integrated Network Tool (SAINT) o Security Auditor s Research Assistant (SARA) o Nmap o Netcat o Wireshark o Argus - Audit Record Generation and Utilization System Page 11
12 o Snort Network Protection Tools o Iptables o Proventia Network Intrusion Prevention System (IPS) o NetDetector o TigerGuard Page 12 Module 06: Handling Malicious Code Incidents Count of Malware Samples Virus Worms Trojans and Spywares Incident Handling Preparation Incident Prevention Detection of Malicious Code Containment Strategy Evidence Gathering and Handling Eradication and Recovery Recommendations Antivirus Systems o Symantec: Norton AntiVirus 2009 o Kaspersky Anti-Virus 2010 o AVG Anti-Virus o McAfee VirusScan Plus o BitDefender Antivirus 2009 o F-Secure Anti-Virus 2009 o Trend Micro AntiVirus plus AntiSpyware 2009 o HijackThis
13 o Tripwire Enterprise o Stinger Module 07: Handling Insider Threats Insider Threats Anatomy of an Insider Attack Insider Risk Matrix Insider Threats Detection Insider Threats Response Insider s Incident Response Plan Guidelines for Detecting and Preventing Insider Threats o Human Resources o Network Security o Access Controls o Security Awareness Program o Administrators and Privileged Users o Backups o Audit Trails and Log Monitoring Employee Monitoring Tools o Activity Monitor o Net Spy Pro o Spector Pro o SpyAgent o Handy Keylogger o Anti Keylogger o Actual Spy o IamBigBrother o 007 Spy Software Page 13
14 o SpyBuddy o SoftActivity Keylogger o Elite Keylogger o Spy Sweeper Page 14 Module 08: Forensic Analysis and Incident Response Computer Forensics Objectives of Forensics Analysis Role of Forensics Analysis in Incident Response Forensic Readiness Forensic Readiness And Business Continuity Types of Computer Forensics Computer Forensic Investigator People Involved in Computer Forensics Computer Forensics Process Digital Evidence Characteristics of Digital Evidence Collecting Electronic Evidence Challenging Aspects of Digital Evidence Forensic Policy Forensics in the Information System Life Cycle Forensic Analysis Guidelines Forensics Analysis Tools o Helix Tools Present in Helix CD for Windows Forensics o Windows Forensic Toolchest o Knoppix Linux o The Coroner s Toolkit (TCT)
15 o EnCase Forensic o THE FARMER S BOOT CD (FBCD) o DumpReg o DumpSec o DumpEvt o Foundstone Forensic ToolKit o Sysinternals Suite o NSLOOKUP o dig DNS Lookup Utility o Whois o VisualRoute o Netstat Command o Linux: DD Command o Linux: Find Command o Linux: Arp Command o Linux: ps, ls, lsof, and ifconfig Commands o Linux: Top Command o Linux: Grep Command o Linux: Strings Command Page 15 Module 09: Incident Reporting Incident Reporting Why to Report an Incident Why Organizations do not Report Computer Crimes Whom to Report an Incident How to Report an Incident Details to be Reported Preliminary Information Security Incident Reporting Form
16 Page 16 CERT Incident Reference Numbers Contact Information o Sample Report Showing Contact Information Summary of Hosts Involved o Sample Report Showing Summary of Hosts Involved Description of the Activity o Sample Report Showing Description of the Activity Log Extracts Showing the Activity o Example Showing the Log Extracts of an Activity Time Zone Federal Agency Incident Categories Organizations to Report Computer Incident o United State Internet Crime Task Force o Internet Crime Complaint Center (IC3) o Computer Crime & Intellectual Property Section o Internet Watch Foundation (IWF) Incident Reporting Guidelines Sample Incident Reporting Form Sample Post Incident Report Form Module 10: Incident Recovery Incident Recovery Principles of Incident Recovery Incident Recovery Steps Contingency/Continuity of Operations Planning Business Continuity Planning Incident Recovery Plan Incident Recovery Planning Process
17 o Incident Recovery Planning Team o Business Impact Analysis o Incident Recovery Plan Implementation o Incident Recovery Training o Incident Recovery Testing Page 17 Module 11: Security Policies and Laws Security Policy Key Elements of Security Policy Goals of a Security Policy Characteristics of a Security Policy Design of Security Policy Implementing Security Policies Acceptable Use Policy (AUP) Access Control Policy o Sample Access Control Policy o Importance of Access Control Policies Asset Control Policy Audit Trail Policy o Sample Audit Trail Policy 1 o Importance of Audit Trail Policy Logging Policy o Importance of Logging Policies Documentation Policy Evidence Collection Policy Evidence Preservation Policy Information Security Policy o Information Security Policy: University of California
18 Page 18 o Information Security Policy: Pearce & Pearce, Inc. o Importance of Information Security Policy National Information Assurance Certification & Accreditation Process (NIACAP) Policy o Importance of NIACAP Policy Physical Security Policy o Sample Physical Security Policy 1 o Sample Physical Security Policy 2 o Importance of Physical Security Policies Physical Security Guidelines Personnel Security Policies & Guidance Law and Incident Handling o Role of Law in Incident Handling o Legal Issues When Dealing With an Incident o Law Enforcement Agencies Laws and Acts o Searching and Seizing Computers without a Warrant A: Fourth Amendment s Reasonable Expectation of Privacy in Cases Involving Computers: General Principles A.4: Private Searches o The Privacy Protection Act o Federal Information Security Management Act (FISMA) o Mexico o Brazilian Laws o Canadian Laws o United Kingdom s Laws o Belgium Laws o German Laws o Italian Laws
19 o Cybercrime Act 2001 o Information Technology Act o Singapore Laws o Sarbanes-Oxley Act o Social Security Act o Gramm-Leach-Bliley Act o Health Insurance Portability and Accountability Act (HIPAA) Intellectual Property Laws o Intellectual Property o US Laws for Trademarks and Copyright o Australia Laws For Trademarks and Copyright o UK Laws for Trademarks and Copyright o China Laws for Trademarks and Copyright o Indian Laws for Trademarks and Copyright o Japanese Laws for Trademarks and Copyright o Canada Laws for Trademarks and Copyright o South African Laws for Trademarks and Copyright o South Korean Laws for Trademarks and Copyright o Belgium Laws for Trademarks and Copyright o Hong Kong Laws for Intellectual Property Page 19
20 For Training Requirements, Please Contact ATC. Page All rights reserved. This document is for informational purposes only. MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. and ECIH logos are registered trademarks or trademarks of in the United States and/or other countries.
IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
4. Exercise: Developing CERT Infrastructure 4.1 GENERAL DESCRIPTION 4.2 EXERCISE COURSE. 4.3 Introduction to the exercise. CERT Exercises Handbook
29 29 4. Exercise: Developing CERT Infrastructure Main Objective Targeted Audience Total Duration To learn what kind of software and hardware solutions could be used to provide a particular CERT service
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Open Source Incident Management Tool for CSIRTs
An Agency Under MOSTI Open Source Incident Management Tool for CSIRTs Adli Wahid Head, Malaysia CERT (MyCERT) CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia Agenda About MyCERT Where do incidents
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Some Tools for Computer Security Incident Response Team (CSIRT)
Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Incident Reporting Guidelines for Constituents (Public)
Incident Reporting Guidelines for Constituents (Public) Version 3.0-2016.01.19 (Final) Procedure (PRO 301) Department: GOVCERT.LU Classification: PUBLIC Contents 1 Introduction 3 1.1 Overview.................................................
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
CSIRT Introduction to Security Incident Handling
CSIRT Introduction to Security Incident Handling P. Jacques Houngbo AIS 2013Technical Workshops Lusaka, Zambia, June 2013 If you think technology can solve your security problems, then you don t understand
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200
Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200 Course Description: Advanced Cybersecurity is designed to provide students the advanced concepts and terminology of
Creating and Managing Computer Security Incident Response Teams (CSIRTs)
Creating and Managing Computer Security Incident Response Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Program Software Engineering Institute Carnegie Mellon University Pittsburgh,
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
Open Source Security Tool Overview
Open Source Security Tool Overview Presented by Kitch Spicer & Douglas Couch Security Engineers for ITaP 1 Introduction Vulnerability Testing Network Security Passive Network Detection Firewalls Anti-virus/Anti-malware
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Fortinet Solutions for Compliance Requirements
s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
Threat Management: Incident Handling. Incident Response Plan
In order to meet the requirements of VCCS Security Standards 13.1 Reporting Information Security Events, and 13.2 Management of Information Security Incidents, SVCC drafted an (IRP). Incident handling
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
How To Understand What A Virus Is And How To Protect Yourself From A Virus
Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
FALSE ALARM? Incident Management Case Study. Carlos Villalba [email protected]
FALSE ALARM? Incident Management Case Study Carlos Villalba [email protected] Initial Discovery The panic sets in: You think your company has been breached! So, what do you do? First steps First things
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
SCAC Annual Conference. Cybersecurity Demystified
SCAC Annual Conference Cybersecurity Demystified Me Thomas Scott SC Deputy Chief Information Security Officer PMP, CISSP, CISA, GSLC, FEMA COOP Practitioner [email protected] 803-896-6395 What is Cyber
STATE OF NEW JERSEY Security Controls Assessment Checklist
STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response
Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures
For discussion on 12 June 2000 Legislative Council Panel on Information Technology and Broadcasting Hacking and Virus Activities and Preventive Measures Purpose This paper briefs Members on the common
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Cyber Security: Cyber Incident Response Guide. A Non-Technical Guide. Essential for Business Managers Office Managers Operations Managers.
The Cyber Security: Cyber Incident Response Guide appendix has been developed and distributed for educational and non-commercial purposes only. Copies and reproductions of this content, in whole or in
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Symantec Security Information Manager Version 4.7
Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Cybersecurity as a Risk Factor in doing business
Cybersecurity as a Risk Factor in doing business 1 Data is the new raw material of business Economist UK, 2013. In trying to defend everything he defended nothing Frederick the Great, Prussia 1712-86.
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document
ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Endpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Incident categories. Version 2.0-04.02.2013 (final version) Procedure (PRO 303)
Version 2.0-04.02.2013 (final version) Procedure (PRO 303) Classification: PUBLIC / Department: GOVCERT.LU Table Contents Table Contents... 2 1 Introduction... 3 1.1 Overview... 3 1.2 Purpose... 3 1.3
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
McAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
Cyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
Cyber Security. A professional qualification awarded in association with University of Manchester Business School
ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
www.pwc.com How to effectively respond to an information security incident
www.pwc.com How to effectively respond to an information security incident Agenda Analogy Plan Preparation Incident Handling Overview Collect & Triage Investigation Containment Eradication Recovery 2 Are
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Cyber Security Threats and Countermeasures
GBDe 2006 Issue Group Cyber Security Threats and Countermeasures Issue Chair: Buheita Fujiwara, Chairman, Information-technology Promotion Agency (IPA), Japan 1. Overview Cyber security is expanding its
Local Government Cyber Security:
The Local Government Cyber Security: Cyber Incident Response Guide appendix has been developed and distributed for educational and non-commercial purposes only. Copies and reproductions of this content,
EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty
EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill
CompTIA Security+ Certification Study Guide (Exam SYO-301) Glen E. Clarke McGraw-Hill is an independent entity from CompTIA,This publication and CD may be used in assisting students to prepare for the
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed
Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification
Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC
Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Security Incident Investigation
Security Incident Investigation Mingchao Ma STFC RAL, UK HEPSYSMAN Workshop 10 th June 2010 Overview Security incident handling lifecycle Based on NIST SP800-61rev1 recommendation http://csrc.nist.gov/publications/nistpubs/800-61-rev1/sp800-61rev1.pdf
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?
Information Security Incident Management Program What is an Incident Management Program? It is a coordinated program of people, processes, tools and technology, which prevents and manages information security
Data Management & Protection: Common Definitions
Data Management & Protection: Common Definitions Document Version: 5.5 Effective Date: April 4, 2007 Original Issue Date: April 4, 2007 Most Recent Revision Date: November 29, 2011 Responsible: Alan Levy,
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
THE WORLD IS MOVING FAST, SECURITY FASTER.
THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS
Helping Corporations Defend Enterprise Attacks through Security Awareness & Desktop Security
Helping Corporations Defend Enterprise Attacks through Security Awareness & Desktop Security The Problem Statement Increasing incidents of crime & attacks (including cyber) with Potential to cause severe
EC Council Certified Ethical Hacker V8
Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they
Clarizen Security White Paper
WHITE PAPER Clarizen Security White Paper Standards and Practices UNITED STATES 1.866.502.9813 UNITED KINGDOM +44.0.20.3411.2345 ISRAEL +972.9.794.4300 FRANCE +33.18.28839.66 www.clarizen.com Table of
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
