Analyzing the Security Significance of System Requirements
|
|
|
- Lynne Simmons
- 10 years ago
- Views:
Transcription
1 Analyzing the Security Significance of System Requirements Donald G. Firesmith Software Engineering Institute Abstract Safety and security are highly related concepts [1] [2] [3]. Both deal with the protection of valuable assets from harm, and both do this by avoiding, detecting, and responding to incidents that can cause such harm. In both cases, the dangers (hazards and threats respectively) that can cause or enable such incidents to occur are identified and the associated risks are analyzed in order to ensure that these risks are mitigated to acceptable levels. Safety engineering is typically concerned less with requirements than with its downstream activities (e.g., architecting, design, coding, testing) because much of hazard analysis is based on the existence of an architecture, the components of which can cause accidents if they fail. Yet one central safety engineering technique is to categorize the system requirements based on their safety significance and use this categorization to determine the associated level of development processes necessary to assure a corresponding acceptable level of safety risk. Based on the similarity between safety and security, this position paper advocates using a similar process to categorize the security significance of non-security requirements and use this information to ensure that an adequate development process is used to assure an acceptable level of security risk. 1. Introduction Although engineering security requirements is a very significant task [4], this paper deals instead with the security aspects of the other requirements of a system: the non-security requirements. Some functional, data, interface, and quality (e.g., interoperability, performance) requirements clearly have significant security ramifications, whereas others do not. For example, some requirements may address the storing and manipulation of sensitive information, whereas other requirements may address the display of publicly accessible information of relatively little importance. Clearly from a security standpoint, it is more important to properly implement those requirements with major security ramifications than it is to implement those requirements with little or no security significance. The safety community has developed a standard approach to solving this problem of requirements relevance, and the similarity between safety and security implies that it would be well worth considering if something similar can be done for security. The next section of this position paper briefly points out the many similarities between safety and security. The third section describes how a safety (hazard) analysis is commonly used to categorize requirements so that the limited project resources are concentrated on properly implementing the most safety-critical requirements. The fourth section proposes the use of an analogous approach for categorizing requirements in terms of their security ramifications. The fifth section discusses other related approaches. The final section raises questions to be considered by security engineers concerning adapting these safety concepts and techniques to security and suggest certain benefits that may result if they do. 2. Similarities between Safety and Security Safety and security are closely related quality factors in a system s quality model because they both describe important related attributes or characteristics of the system s overall quality [1] [2] [3]. Safety and security are subtypes of defensibility quality factor because they are both primarily concerned with the protection of valuable assets (e.g., people, property, services, and the environment) from harm (i.e., significant negative consequences). As illustrated in figure 1, the essential difference between safety and security is that safety deals with accidental harm, whereas security deals with malicious harm, which is harm resulting from attacks or probes by someone or something (e.g., viruses) playing the role of attacker.
2 This harm to valuable assets occurs during incidents, which are unplanned, unintended, unauthorized, (but not necessarily unexpected) events or series of related events that could cause unintended harm to one or more valuable assets. Safety incidents are either accidents (harm occurs) or near misses, whereas security incidents are successful attacks (harm occurs), unsuccessful attacks (harm does not occur), and probes (i.e., preparations for attacks). In order to prevent these undesired incidents, one typically begins by identifying the dangers that can cause them. Specifically, a danger is one or more conditions, situations, or states of a system that in conjunction with conditions in the environment of the system can cause or contribute to the occurrence of one or more related incidents. As illustrated in figure 3, dangers are classified into hazards (which can cause safety incidents) and threats, which can cause security incidents or survivability incidents (e.g., military attacks). Safety Security Survivability Hazard Danger may result in Threat Attacker involves the existence and profile of relevant State Incident may cause Environment System Unauthorized Harm may occur to Valuable Asset is responsible for protecting or not harming any Figure 1: Types of Harm to Valuable Assets Figure 2: Types of Incidents Figure 3: Types of Dangers One reason that dangers are analyzed (e.g., via hazard analysis or threat analysis) is to determine the associated risks so that risk mitigation can occur. Risk is usually defined as the probable magnitude of the potential harm to one or more assets that can occur due to a danger and is conservatively estimated as the maximum credible harm multiplied by the estimated probability that the associated accident / successful attack occurs. And as before, risks can be classified as safety risks due to hazards, security risks due to security threats, and [military] survivability risks. Once the system is [partially] implemented, it may have vulnerabilities (e.g., a lack of input validation) that can cause both accidents as well as enable successful attacks. Occasionally, the same controls used to overcome these vulnerabilities can work as safeguards (safety), countermeasures (security), and defenses (survivability). Finally, the safety engineers on an endeavor construct a safety case [5], which documents their:
3 Claims that the system is adequately safe (i.e., meets its safety requirements) Arguments for their claims of adequate safety. Compelling evidence backing up their arguments. Any assumptions on which their arguments may be based. 3. Safety Analysis and Categorization Safety engineers typically perform the following types of safety analyses: Asset analysis to determine which assets are valuable to legitimate stakeholders and how valuable they are. Harm analysis to determine the credible types and severities of the accidental harm that can occur to these assets, whereby harm severities are typically categories of the magnitude of harm. Incident analysis to determine the kinds of accidents that can cause harm to the assets as well as the kinds of near misses that need to be addressed. Hazard analysis to determine the hazards (i.e., hazardous conditions) that can lead to safety incidents as well as their causes and consequences. Note that the phrase hazard analysis is typically used to refer to the union of all of these different types of safety analysis. Risk analysis to categorize the safety incidents and hazards by levels of safety risk, such as intolerable, undesirable, as low as reasonably practical (ALARP), and acceptable. Once safety risks have been identified and categorized, safety engineers use the results of these analyses to assign corresponding: Safety Integrity Levels (SILs) to individual requirements or collections of related requirements. Safety Evidence Assurance Levels (SEALs) to the associated architectural, design, and code components that implement these requirements. Figure 4 shows an example categorization of harm severity, incident/hazard occurrence frequency, and resulting safety risks / safety integrity levels. For example, an accident with catastrophic consequences that is estimated to occur frequently would have an intolerable safety risk. Any requirement (or set of related requirements that would cause such a safety risk would have an intolerable risk, an associated SIL value of 4, and have to be either changed to lower the risk or else dropped as a requirement. On the other had, a requirement that could result in a remote chance of causing a critical accident would be assigned a SIL value of 2, which means that steps would need to be taken (e.g., architectural decisions, coding standards) to reduce the risk to as low as reasonably practical (ALARP). Finally, any requirement that only has a remote chance of causing an accident, the severity of which is negligible would have a SIL value of 1, meaning that the safety risk is acceptable and that no extra steps would need to be taken to reduce the risk. Figure 4: Safety Risk Categorization Matrix As mentioned previously, corresponding to each safety risk and requirements safety integrity level would be a corresponding safety evidence assurance level (SEAL) that would determine both the extra measures that would need to be taken to assure acceptable safety as well as the associated evidence that would need to be collected to support the safety certification (e.g., flight certification) of the system. For example, these measures could include anything from the formal specification of the requirements and formal proofs of correctness of the resulting design and implementation to the use of Fagan inspections, a safe subset of the programming language, and specific types of testing and test completeness criteria. 4. Security Analysis and Categorization A complete security analysis is a valuable part of managing security risks [6] [7]. As with safety, security analysis should include: Asset analysis to determine the assets that are sufficiently valuable to legitimate stakeholders to be worth protecting from attackers. Harm analysis to determine the types and severities of the malicious harm that can occur to these assets so that the level of investment in security countermeasures will be commensurate with the value of the assets being protected. Incident analysis to determine the kinds of security attacks that could cause malicious harm as well as the kinds of probes to be addressed. Threat analysis to determine the threats (i.e., threatening conditions) that can lead to security incidents. Because security involves attacks, these threats can be considered to be the existence of
4 attackers with specific profiles (e.g., means, motive, and opportunity) or the proactive tools of their trade (e.g., viruses and worms). Risk analysis to categorize the security incidents and threats by levels of security risk, such as intolerable, undesirable, as low as reasonably practical (ALARP), and acceptable. Security engineers usually specify general kinds of security goals regarding confidentiality, integrity, nonreputability of transactions, and availability in the face of denial of service (DoS) attacks. They also rely on implementing industry best practices such as the use of standard countermeasures (e.g., firewalls, encryption) and performing security testing (e.g., penetration tests). But given the similarity between safety and security, security engineers should consider taking the following steps to better address security engineering during requirements engineering: 1. Security Analysis. Perform security analysis early in the development cycle when it can still influence the requirements. Include asset analysis, harm analysis, threat analysis, and risk analysis. 2. Security Risk Categorization Matrix. Group potential malicious harm severities and potential frequencies of successful attacks and threat occurrences into meaningful categories. Use these to develop a security risk categorization matrix similar to a safety risk categorization matrix in figure Security Importance Levels (SILs). Group security risk categorization matrix cells having similar levels of security risk into security risk categories. Use this categorization to formally define the endeavor s security importance levels (SILs). Note that the use of the analogous phrase security integrity levels is not recommended because integrity has a specialized meaning within the security discipline. 4. Security Evidence Assurance Levels (SEALs). For each security SIL, define a corresponding security SEAL in terms of the best industry practices that should be followed to protect valuable assets from attack. These mandated practices will include both countermeasures (e.g., the use of firewalls and more secure coding standards) that are very general in that they provide widespread protection, as well as other more selective countermeasures (e.g., encryption) that will directly apply to smaller numbers of requirements. Although most of the measures mandated by these security SEALs will tend to be architecture-level countermeasures, the highest SEALs may also include the mandate to expend more resources during requirements engineering. For example, the highest SEALs may mandate the generation of pure security requirements associated with the non-security requirements as well as mandate the formal specification of such high SIL non-security requirements to ensure that they are complete and unambiguous. 5. Requirements Risks. Use the results of the preceding security analysis and the security risk categorization matrix to estimate the potential security risks associated with the non-security requirements, considering both individual requirements and where practical collections of related requirements. For each [group of] nonsecurity requirements, assign an appropriate security SIL by considering all types of: Valuable assets needing to be protected that are mentioned within the requirement. Harm that can occur to these assets due to attacks, especially if the requirement is not implemented correctly, thereby creating an associated vulnerability. Consider the loss of confidentiality including both privacy and anonymity. Consider the loss of integrity of data, communication, software (e.g., via viruses and worms), hardware (e.g., via tampering), and people (e.g., via corruption and bribery). Consider the loss of availability of data access and services. Finally, consider any need to avoid repudiation of transactions. Security incidents (attacks and probes) that could be used to attack the assets and cause malicious harm. When categorizing the non-security requirements by SIL, use any mention of users (e.g., as actors in use case models) and interface requirements to help identify requirements that will require derived identification, authentication, and authorization requirements. 6. Requirements Implementation. Use the SILs when tracing the requirements to architectural, design, and implementation components so that the appropriate level of process and best industry practices can be used to both properly implement the requirements and generate useful evidence for security certification purposes. 7. Security Case. Use the evidence resulting from applying the appropriate SEALs to provide useful arguments and evidence to build a security case that is similar to a safety case. 5. Related Work
5 Some of the similarities between safety and security have prompted others to recommend the use of safety techniques when performing security engineering. Sacha Brostoff and M. Angela note that safety and security are perceived by many people as expensive activities that are only critical when they fail [2]. When accidents and successful attacks finally occur, the last individual in the chain of events leading up to the incident is often made a scapegoat when blame can be spread across multiple people and processes. They therefore recommend using the Generic Error Modeling System (GEMS) for analyzing these individual and organization sources of failures [8]. This work, however, does not address similarities between safety and security requirements, but rather the causal chains of events that lead to accidents and successful attacks. Nancy Leveson and Mats Heimdahl also recognize many similarities between safety and security [3]. Based on these similarities, they recommend using the safety engineering techniques Intent Specifications [9] and Software Deviation Analysis (SDA) when performing security engineering. Intent specifications are a way of organizing project documentation, and level 1 (of 7) includes formally-specified requirements. SDA takes these formally specified requirements as an input and therefore is not relevant to categorizing security requirements. They do not address the security relevance of non-security requirements. 6. Conclusion The contents of this position paper are heavily based on the strong similarity between the concepts and associated analyses underlying safety and security engineering. Safety engineering categorizes nonsafety requirements using safety integrity levels (SILs), uses safety evidence assurance levels (SEALs) to enforce the additional measures needed to develop the more safety-critical parts of systems and to ensure the existence of the documentation needed to build safety cases and obtain safety certification. This paper suggests that security engineers should consider doing the same by: Using security importance levels (SILs) for categorizing non-security requirements in terms of their security relevance. Using security evidence assurance levels (SEALs) to enforce the additional measures needed to develop the more security-critical parts of systems and to ensure the existence of the documentation needed for security certification. Using security SILs and SEALs to build security cases. Safety and security engineering are typically considered to be separate specialty engineering disciplines, and these disciplines are therefore usually not well integrated with mainstream engineering disciplines such as requirements engineering, architecting, design, implementation, and testing. Thus, safety and security policies are sometimes under emphasized during architecting because they do not adequately affect the requirements specifications. But safety engineers have increased safety engineering s influence early in the development cycle by using safety SILs and SEALs. It is possible that the use of security SILs and SEALs could similarly be a way to: Enable security engineers to prioritize the requirements so that they can concentrate their limited resources on the most important requirements and their implementations Better integrate security engineering into requirements engineering and architecting. Ensure that security is better addressed early in the development cycle before the architecture is largely completed and frozen. 7. References [1] D.G. Firesmith, Common Concepts Underlying Safety, Security, and Survivability, Technical Note CMU/SEI TN-033, Software Engineering Institute, Pittsburgh, Pennsylvania, December [2] S. Brostoff and M. Sasse, Safe and Sound: a Safety- Critical Approach to Security, New Security Paradigms Workshop 01, September [3] N. Leveson and M. Heimdahl, New Approaches to Critical-Systems Survivability: Position Paper, 1998 Information Survivability Workshop (ISW 98), IEEE, October [4] D.G. Firesmith: Engineering Security Requirements, in Journal of Object Technology, vol. 2, no. 1, January- February 2003, pp [5] P. Bishop and R. Bloomfield, A Methodology for Safety Case Development, Adelard, London, United Kingdom, [6] C. Alberts and A. Dorofee, Managing Information Security Risks, Addison-Wesley, Boston, Massachusetts, [7] C. Alberts and A. Dorofee, Managing Information Risks: The Octave sm Approach, Addison Wesley, [8] J. Reason, Human Error, Cambridge University Press, Cambridge, UK, [9] N. Leveson, Intent Specifications: An Approach to Building Human-Centered Specifications, IEEE Transactions on Software Engineering, SE-26(1), January 2000.
Security Software Engineering: Do it the right way
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 19 Security Software Engineering: Do it the right way Ahmad
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
Chapter 4 Information Security Program Development
Chapter 4 Information Security Program Development Introduction Formal adherence to detailed security standards for electronic information processing systems is necessary for industry and government survival.
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
Security Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
A Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Secure By Design: Security in the Software Development Lifecycle
Secure By Design: Security in the Software Development Lifecycle Twin Cities Rational User s Group Security Briefing by Arctec Group (www.arctecgroup.net) Integrating Security into Software Development
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Cyril Onwubiko Networking and Communications Group http://ncg. ncg.kingston.ac.
Cyril Onwubiko Networking and Communications Group http://ncg ncg.kingston.ac..ac.uk http://ncg.kingston.ac.uk +44 (0)20 8547 2000 Security Threats & Vulnerabilities in assets are two most fundamental
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006
Multi-Factor Authentication (FMA) A new security feature for Home Banking Frequently Asked Questions 8/17/2006 1. Why is MFA being added? We take our obligation to protect our members seriously. To make
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact [email protected] Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
System Specification. Objectives
System Specification cmsc435-1 Objectives To explain how dependability requirements may be identified by analyzing the risks faced by critical systems To explain how safety requirements are generated from
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
Security Basics: A Whitepaper
Security Basics: A Whitepaper Todd Feinman, David Goldman, Ricky Wong and Neil Cooper PricewaterhouseCoopers LLP Resource Protection Services Introduction This paper will provide the reader with an overview
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Data Management & Protection: Common Definitions
Data Management & Protection: Common Definitions Document Version: 5.5 Effective Date: April 4, 2007 Original Issue Date: April 4, 2007 Most Recent Revision Date: November 29, 2011 Responsible: Alan Levy,
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Performing Effective Risk Assessments Dos and Don ts
Performing Effective Risk Assessments Dos and Don ts % Gary Braglia Security Specialist GreyCastle Security TCTC March 18, 2013 Introduction Who am I? Why Risk Management? Because you have to Because
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: August 2001 LETTER NO.: 01-CU-11 TO: SUBJ: ENCL: Federally Insured Credit Unions Electronic Data
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Cybersecurity for the C-Level
Cybersecurity for the C-Level Director Glossary of Defined Cybersecurity Terms A Active Attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources,
CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun
CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: [email protected]
SCAC Annual Conference. Cybersecurity Demystified
SCAC Annual Conference Cybersecurity Demystified Me Thomas Scott SC Deputy Chief Information Security Officer PMP, CISSP, CISA, GSLC, FEMA COOP Practitioner [email protected] 803-896-6395 What is Cyber
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Incident categories. Version 2.0-04.02.2013 (final version) Procedure (PRO 303)
Version 2.0-04.02.2013 (final version) Procedure (PRO 303) Classification: PUBLIC / Department: GOVCERT.LU Table Contents Table Contents... 2 1 Introduction... 3 1.1 Overview... 3 1.2 Purpose... 3 1.3
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Department of Education. Network Security Controls. Information Technology Audit
O L A OFFICE OF THE LEGISLATIVE AUDITOR STATE OF MINNESOTA FINANCIAL AUDIT DIVISION REPORT Department of Education Network Security Controls Information Technology Audit May 5, 2010 Report 10-17 FINANCIAL
MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0
MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
ARCHITECTURE DESIGN OF SECURITY SYSTEM
Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
California State University, Chico. Information Security Incident Management Plan
Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Security and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model
Safety and security are simply good business.
THE BUSINESS ASE FOR YBER SEURITY What s this about in a nutshell? The importance of cyber security for manufacturing and computer control systems has only recently been recognized and therefore has not
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
CSC 474 Information Systems Security
CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning [email protected] (919)513-4457 Office: Room
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
ESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: October 2000 LETTER NO.: 00-CU-07 TO: SUBJ: Federally Insured Credit Unions NCUA s Information
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
White Paper An Enterprise Security Program and Architecture to Support Business Drivers
White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security
A Structured Comparison of Security Standards
A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Integrating Security and Usability at Requirement Specification Process
Integrating Security and Usability at Requirement Specification Process Author: Nikhat Parveen 1, Rizwan Beg 2, M. H. Khan 3 1,2 Department of Computer Application, Integral University, Lucknow, India.
Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus
Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Security Risk Management - Approaches and Methodology
228 Informatica Economică vol. 15, no. 1/2011 Security Risk Management - Approaches and Methodology Elena Ramona STROIE, Alina Cristina RUSU Academy of Economic Studies, Bucharest, Romania [email protected],
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Incident Reporting Guidelines for Constituents (Public)
Incident Reporting Guidelines for Constituents (Public) Version 3.0-2016.01.19 (Final) Procedure (PRO 301) Department: GOVCERT.LU Classification: PUBLIC Contents 1 Introduction 3 1.1 Overview.................................................
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Waveney Lower Yare & Lothingland Internal Drainage Board Risk Management Strategy and Policy
Waveney Lower Yare & Lothingland Internal Drainage Board Risk Management Strategy and Policy Page: 1 Contents 1. Purpose, Aims & Objectives 2. Accountabilities, Roles & Reporting Lines 3. Skills & Expertise
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
River Stour (Kent) Internal Drainage Board Risk Management Strategy and Policy
River Stour (Kent) Internal Drainage Board Risk Management Strategy and Policy Page: 1 Contents 1. Purpose, Aims & Objectives 2. Accountabilities, Roles & Reporting Lines 3. Skills & Expertise 4. Embedding
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
A Methodology for Capturing Software Systems Security Requirements
A Methodology for Capturing Software Systems Security Requirements Hassan EL-Hadary Supervised by: Prof. Sherif EL-Kassas Outline Introduction to security Software Security Security Definitions Security
