PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
|
|
|
- Jared Bates
- 10 years ago
- Views:
Transcription
1 PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles P. Volonino ULB Darmstadt Upper Saddle River, New Jersey 07458
2 CONTENTS PREFACE PART I: xv DIGITAL LIABILITIES AND RISK MANAGEMENT Chapter 1 Security in a Globally Connected Economy 1 Introduction 1 What Is Information Security? 1 Definition 1 Security Goals 1 Applying Conventional Principles to the Cyber World 3 The Digital Liability Management (DLM) Model 3 The Principles of Security 4 Security Is Complex 4 Security Is Difficult to Cost-Justify, but Not Impossible 6 Security in the Information Economy 6 Global Economy in Transition 6 Legal Liability Issues 6 Guide to the Risks Inherent to Conducting Business in a Networked Economy 6 Mistakes, Malice, and Mischief Increase Liability and Legislation 7 Electronic Evidence 7 Threats to Information Security 7 Extended Legislation and Responsibilities 8 Liability Issues and Regulatory Obligations 8 Electronic Records Retention 9 International Organizations 10 DO] Defines Computer Crime 10 Congress Expands Computer Crime Legislation and Authority 10 New Ethic of Responsibility 11 Chapter Summary 12 Key Terms 12 Discussion Questions 12 Endnotes 13 Chapter 2 Sources of Digital Liability 14 Introduction 14 Assessing and Protecting Digital Assets 14 Risk Assessment 14 Insufficient Protection Against Avoidable Losses 17 VII
3 viii Contents Digital Liability Management 17 Activities That Cause Digital Liability 18 Digital Liability: Post Damage Estimations 20 Common Sources of Risk 20 User Ignorance 20 Lack of Enforceable Policy 21 Social Engineering 21 Excessive Sharing 22 Revealing Candor 23 Factors Exacerbating Digital Liability 23 Intractable Problems 24 Lagging Practices 24 Business and Legal Reasons for Concern 24 Because of Zero-Tolerance Environments 24 Because the Company's Well-Being Is at Stake 25 Because of Privileged Information 27 Tests of Negligence 27 Chapter Summary 28 Key Terms 29 Discussion Questions 29 Endnotes 30 Chapter 3 Threats, Vulnerabilities, and Risk Exposure 31 Introduction 31 Classification of Computer Threats and Vulnerabilities 34 Uses of the TTV 34 Taxonomy of Threats and Vulnerabilities 35 Origin of the Intrusion or Threat 37 External Threats and Vulnerabilities 37 Internal Threats and Vulnerabilities 41 Wireless Threats and Vulnerabilities 44 External Threats with Internal Intervention 44 Internal Protocol Vulnerabilities and Threats 45 Success of Hackers and Malware 47 Intruders Expand Their Options 47 Complexity of Software and Configurations 47 Why Hack Attacks Succeed So Often 47 Threats, Vulnerabilities, and First-Party and Third-Party Risks 48 First-Party Risks 48 Third-Party Risks 48 First- and Third-Party Damages 49 Chapter Summary 49 Key Terms 50 Discussion Questions 50 Endnotes 51
4 Contents ix Chapter 4 An Affirmative Model of Defense: Digital Liability Management 52 Introduction 52 The Information Security Challenge Is Not Being Met 52 The Importance of Execution 53 Hallmarks of Proper Execution 54 The Risk and Reward of New Initiatives 54 Higher Standards of Security 55 Why Is Information Security Poorly Executed? 55 The DLM Defense Model 56 The DLM Model 56 Tier 1: Senior Management Commitment and Support 56 Security Awareness Begins and Ends in the Boardroom 57 Overcoming Objections and Adversaries 58 Tier 2: Acceptable-Use Policies and Other Statements of Practice 59 AUPs Define Acceptable and Unacceptable Behavior 59 Stakeholders Involved in AUPs 59 AUPs Define Expectations and Demonstrate Due Diligence 60 Everyone Must Practice Information Security 60 Maintenance Is Important 60 Tier 3: Secure-Use Procedures 60 Tier 4: Hardware, Software, and Network Security Tools 61 Chapter Summary 61 Key Terms 62 Discussion Questions 62 Endnotes 62 Chapter 5 Models for Estimating Risk and Optimizing the Return on Security Investment 63 Introduction 63 The Importance of Risk Assessment 63 Getting Management's Attention 63 Risk Assessment: A Basic Requirement of ISO Raising the Status of Information Security Budgets 65 Assessing the Expected (Average) Cost of a Loss 65 Risk Assessment Cube 66 Expected Loss Value Estimations 67 Expected Loss Computation 67 Marginal Cost Benefit Analysis An Application of Expected Value 68 Balancing Expected Loss with the Cost of Security Defenses 69 Challenges in Estimating Loss of Digital Assets 69 Intangible Assets 69 Replication Increases Exposure and Probability of a Loss 70 Outsourcing Places Data and Documents Out of Control 71
5 X Contents Knowledge Assets Are Difficult to Replace 71 Mission-Critical Software Applications 72 Denial of Service Risk 72 Valuation of Digital Assets and Risk 73 Software Assets 73 Knowledge Assets 73 Goodwill 74 Sources of Information for Risk Estimations 74 Research and Consulting Firms 74 Technical Tools 74 Business Partners and Industry Groups 74 Overall Risk Evaluation Profile 75 Assess the Current Situation 75 Policy and Process Perspective 76 Organizational Perspective 76 Technology Perspective 77 Audits with Trading Partners and Customers 77 Chapter Summary 77 Key Terms 78 Discussion Questions 78 Endnotes 79 PART II: POLICIES, PRACTICES, AND DEFENSIVE TECHNOLOGY 80 Chapter 6 Acceptable-Use Policies: Human Defenses 80 Introduction 80 MCIWorldcom's AUP Leads to Early Dismissal of Lawsuit 81 The AUP: The Discipline and Diligence Defense Tier 83 Dual Functions of the AUP 83 Security Breach Prevention 83 Legal Protection 84 Legal Theories and Employer Liability Issues 84 Respondeat Superior Doctrine and Liability 85 Negligent Supervision and Duty of Care 85 Characteristics of Effective AUPs 86 Comprehensive Scope 86 Clear Language 86 Adaptive Content 86 Extension to Other Company Policies 86 Enforcement Provisions 86 Consent 86 Accountability 87 AUP Template 87
6 Contents xi Sample Acceptable-Use Policy (AUP) 87 Purpose and Scope 87 AUP Guidelines 88 Provisions and Prohibitions 88 Compliance 89 Chapter Summary 91 Key Terms 92 Discussion Questions 92 Endnotes 93 Chapter 7 Secure-Use Practices: Defensive Best Practices 94 Introduction 94 Secure Use Practices: Policies 94 Major Risk Factors 94 Limits on the Extent to Which Risk Factors Can Be Controlled 96 Enforcement of Secure-Use Practices Must Be Consistent with the AUP 96 Key Secure-Use Procedures and Practices 97 Introducing a Security Focus in the Organizational Planning Process 97 Establishing Security as a Business Function 97 Integrating Security and Business Plans 97 Deploying Information Security Standards 98 Documentation and Training 99 Incident Response Policy and Incident Response Teams 99 Developing a Notification Plan 100 Secure-Use Procedures: Technology 100 Shut Down Unnecessary Services 101 Set Up and Maintain Permissions Securely 101 Conduct Background Checks 102 Enforce Strong Passwords 102 Review Partner Contracts 102 Audit and Update 103 Physical Security 103 Audit and Test 105 Other Secure Principles and Practices 105 Insurance 105 Staying Current 106 Reinforcing Secure-Use Procedures 106 Rewarding Secure Behavior 106 Worst Practices 107 Dangerous Practices 107 Dangerous Sharing Practices 107 Chapter Summary 109 Key Terms 109
7 xii Contents Discussion Questions 109 Endnotes 109 Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses 111 Introduction 111 Factors Driving the Need for Diverse Technology Layers 113 Growth in Computer Crime 113 Growth in Software Complexity and Flaws 113 Growth in the Release Rate of Security Patches and Service Packs 114 Security Technology 115 No "Out-of-the-Box" Solutions 115 Tools and Targets 115 Multilayered, Diverse Technology Infrastructure 115 Characteristics of a Defensive Technology Infrastructure 116 Underlying Technical Issues 117 Functional Requirements of Hardware and Software 117 TCP/IP 117 Ports 118 File Integrity Checker 118 Routers 118 Perimeter and File Protection 119 Maintaining Confidentiality and Integrity 119 Firewalls 119 Stateful Inspection Firewalls 121 Proxy Server Firewalls 121 Multiple-Defense Firewalls 121 DMZ 121 Personal Firewalls 121 What Firewalls Cannot Defend Against 123 Port Scanning and Scanners 123 Intrusion Detection Systems (IDS) 124 Honeypots 126 Cryptography and Encryption Keys 127 Public Key Infrastructure (PKI) 128 Virtual Private Networks (VPNs) 129 Access Control: Tokens and Biometrics 132 Antivirus (AV) Software 132 Technology for Enforcing Policy 133 and Instant Messaging (IM) Filters 133 Content Monitors 134 Sniffers and Scanners 134 Chapter Summary 135 Key Terms 135 Discussion Questions 135 Endnotes 136
8 Contents xiii PART III: COMPUTER FORENSICS, ELECTRONIC EVIDENCE, FRAUD, AND COMPUTER CRIME LAWS 137 Chapter 9 Electronic Evidence, Electronic Records Management, and Computer Forensics 137 Introduction 137 Electronic Evidence 138 Discovery of Electronic Business Records for Use as Evidence 139 Consequences of Failing to Comply with Discovery Requests 139 Preserving and Disclosing E-Evidence 141 Federal Rules of Civil Procedure "The Rules" 143 Rule 34 Amended to Include Electronic Records 143 Unsettled Legal Issues Add Complexity and Risk 143 Other Legal Issues with Significant Consequences 144 Electronic Records Management (ERM) 144 Sarbanes-Oxley Act of ERM Guide for Employees 145 ERM and AUP 146 Computer Forensics 146 What Can Be Revealed 147 What Can Be Recovered 147 Handling E-Evidence: The 3 C's 147 Eliminating Electronic Records 148 High-Profile Legal Cases 149 Chapter Summary 150 Key Terms 150 Discussion Questions 150 Endnotes 151 Chapter 10 Computer Crime, Computer Fraud, and Cyber Terrorism 153 Introduction 153 U.S. Federal Statutes Defining Computer Crime, Fraud, and Terrorism 154 New and Amended Laws Address Internet Crimes 154 The Computer Fraud and Abuse Act and Other Statutes 155 Key "Computer Fraud and Abuse" Terms Defined 155 The Computer as the Target of a Crime: Crimes Against a Computer 157 The Computer as the Instrument of a Crime: Crimes Using a Computer 159 Computer Fraud 161 Defining the Problem 161 Factors Contributing to Computer Fraud 161 The Nature of Fraud and Its Warning Signs 161 Economic Fraud and White-Collar Crime 162 Theories and Principles of Punishment for White-Collar Crimes 162 The Prosecution and Costs ofwhite-collar Crime 162 Money Laundering 163
9 xiv Contents Computer Forensics Techniques for Catching Cyber Criminals 164 Documentation of Incidents and Incident Handling 165 Finding E-Evidence of an Intrusion or Attack 169 Tracking Down Cyber Criminals 169 Cyber Terrorism 170 The National Strategy to Secure Cyberspace 170 Digital Pearl Harbor Simulation 170 The Freedom Cyber Force Militia Hijacks Al-Jazeera's Websites 171 Chapter Summary 172 Key Terms 173 Discussion Questions 173 Endnotes 173 Appendix to Part III: USA PATRIOT Act 175 PART IV: PRIVACY 177 Chapter 11 Privacy and Data Protection 177 Introduction 177 Spam 177 Reasons for the Increase in Spam 177 The Economic Impact of Spam 178 Spam Defenses 179 Privacy 180 Characteristics of Security 180 Leaving a Digital Trail 181 Methods of Information Collection 181 International Privacy Law 183 OECD Privacy Guidelines 184 Compliance Initiatives 185 Chapter Summary 186 Key Terms 186 Discussion Questions 187 Endnotes 187 Appendix to Part IV: HIPAA Appendix and Glossary 188 GLOSSARY 192 ABBREVIATIONS AND ACRONYMS 211 REFERENCES 214 ONLINE REFERENCES 221 INDEX 224
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Cybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
Network Security: A Practical Approach. Jan L. Harrington
Network Security: A Practical Approach Jan L. Harrington ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Computer Security Literacy
Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
STATE OF NEW JERSEY Security Controls Assessment Checklist
STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response
Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer
Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Law & Ethics, Policies & Guidelines, and Security Awareness
Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of
CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker
ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
I. Introduction to Privacy: Common Principles and Approaches
I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe
It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe Agenda Who Is VendorSafe Technologies? It Won t Happen to Me! PCI DSS Overview The VendorSafe Solution Questions
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso
Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper
ARRA HITECH Stimulus HIPAA Security Compliance Reporter White Paper ARRA HITECH AND ACR2 HIPAA SECURITY The healthcare industry is in a time of great transition, with a government mandate for EHR/EMR systems,
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Zurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology A comprehensive approach
University of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
The Information Security Problem
Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
IT Security Procedure
IT Security Procedure 1. Purpose This Procedure outlines the process for appropriate security measures throughout the West Coast District Health Board (WCDHB) Information Systems. 2. Application This Procedure
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Enterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)
Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY
MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers
Information Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill
CompTIA Security+ Certification Study Guide (Exam SYO-301) Glen E. Clarke McGraw-Hill is an independent entity from CompTIA,This publication and CD may be used in assisting students to prepare for the
LINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP [email protected]
Securing your Corporate Infrastructure What is really needed to keep your assets protected
Securing your Corporate Infrastructure What is really needed to keep your assets protected Joseph Burkard CISA, CISSP October 3, 2002 1 Securing your Corporate Infrastructure Management Dilemma or Technical
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
HIPAA and Mental Health Privacy:
HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
