Risk Assessment for Security Economics
|
|
|
- Leslie Lloyd
- 10 years ago
- Views:
Transcription
1 Daniele Spagnulo Risk Assessment for Security Economics Workshop on Security Frameworks "Security Assurance 16th December 2005 Dipartimento di Matematica ed Informatica Università di Catania
2 What is IT? IT : Short for Information Technology, and pronounced as separate letters,, the broad subject concerned with all aspects of managing and processing information, especially within a large organization or company. Because computers are central to information management, computer departments within companies and universities are often called IT departments. Business requirements: preserve IT Systems Data from damages involved in 1. Integrity = Unauthorized People cannot modifiy System s Information; 2. Availability = System is always operative and functional; 3. Privacy = Unauthorized People cannot approach System s Information; Security Frameworks
3 We could reach this aim through Security Risk Analysis: a process to ensure that the security controls for an IT system are fully commensurate with its risks. Security Risk Analysis Risk Management (Business) Information Security Risk Management Security Frameworks
4 Today s Main Topics Information Security Risk Management; Risk Management Methodologies; Attack Trees, Vulnerability Trees,, Fault Trees and Event Trees; Attack Scenery Analysis through Attack Trees ; Security Frameworks
5 Information Security Risk Management Aim: watching over business in order to identify IT risks and trying to managing them in order to cut down impact s consequences. Risk Assessment Information Security Risk Management Risk Mitigation Evaluation and Assessment Security Frameworks
6 Risk Assessment Asset (def.): Any real or personal property, tangible or intangible, that a company or individual owns that can be given or assigned a monetary value. Intangible property includes things such as goodwill, proprietary information, and related property. Security Frameworks
7 Risk Assessment Phase 1 System Features Analysis Phase 2 Phase 3 Threats Vulnerabilities Identification Identification Phase 6 Phase 5 Impact Threat Impact Analysis Analysis Phase 4 Controls Analysis Phase 7 Risks Determination Phase 8 Phase 9 Controls Final Recommendation Documentation Security Frameworks
8 Risk Assessment: Sources of Threats Security Frameworks
9 Risk Mitigation (def.): the process of evaluating and implementing recommended controls as a result of the previuous phase of Risk Assessment, giving necessary support to Management planning the budget and executing controls Risk mitigation possible strategies: 1. Risk Assumption; 2. Risk Elimination; 3. Risk Restriction; 4. Risk Planning; 5. Research And Comprehension; 6. Risk Transfer; Security Frameworks
10 Risk Mitigation Phase 1 Actions Prioriting Phase 2 Phase 3 Recommended Controls Evaluation CBA Analysis Phase 6 Phase 5 Safeguard Plan Responsibilities Developing Assignment Phase 4 Controls Selection Phase 7 Selected Controls Implementation Security Frameworks
11 Risk Mitigation: Most used Countermeasures Security Frameworks
12 Risk Evaluation and Assessment IT Systems are often modified; System Conditions are changed; We need another Risk Assessment Process?... NO! We have just to evaluate periodically system risks in order to adapt necessary changes to applied countermeasures Security Frameworks
13 Risk Management Methodologies Three kind of approach: Qualitative ; Quantitative; Hybrid; Security Frameworks
14 Qualitative Approach Simple and Flexible; No Technical Knowledge required; Use of Interviews to define value and risk run for each asset; Risk/Value High,Medium,Low ; Useful tools: Risks Matrix Final aim? Outline possible attack sceneries Security Frameworks
15 Quantitative Approach Numeric evaluation of assets; Technical Knowledge required; Use of indexes to define correct forecast inherent the system; Risk/Value EF,SLE,ARO,ALE,ROSI,ROA, Cost/Benefits Analysis; Final aim? Outline possible attack sceneries Security Frameworks
16 Quantitative Approach Exposure Factor (EF): (EF): The proportion of an asset's valuethatislikelytobedestroyedbya particularrisk, expressed as a percentage. Single Loss Expectancy (SLE): (SLE): The Single Loss Expectancy (SLE) is the expected monetary loss every time a risk occurs. The Single Loss Expectancy, Asset Value (AV), and exposure factor (EF) are related by the formula: SLE = AV * EF Security Frameworks
17 Quantitative Approach Annualized Rate of Occurence (ARO): The probability that a risk will occur in a particular year. Annualized Loss Expectancy (ALE): (ALE): The Annualized Loss Expectancy (ALE) is the expected monetary loss that can be expected for an asset due to a risk over a one year period. It is defined as: ALE = SLE * ARO where SLE is the Single Loss Expectancy and ARO is the Annualized Rate of Occurrence. Security Frameworks
18 Quantitative Approach Security Frameworks
19 Quantitative Approach Costs/Benefits Analysis: It could be executed using three indexes 1. ALE (prior) : ALE before applying countermeasures; 2. ALE (post) : ALE with in force countermeasures; 3. Annualized Cost of Safeguard (ACS) : countermeasures total cost; CBA = ALE (prior) ALE (post) - ACS Security Frameworks
20 Quantitative Approach Return on Security Investment (ROI/ROSI): It s a gauge used to evaluate investment rendering and to compare other alternatives ROI = CBA/ACS ROSI = (Risk Exposure * % Risk Mitigated) SC/SC Return on Attack (ROA): It s a gauge used from attackers to evaluate attacks profit ROA= gain from successful attack / cost before S + loss caused by S Security Frameworks
21 Fault Tree Analysis fault tree analysis (a.k.a. fault analysis) offers the ability to focus on an event of importance, such as a highly critical safety issue, and work to minimize its occurrence or consequence. Fault tree analyses are performed using a top-down approach. The resulting fault tree diagram is a graphical representation of the chain of events in your system or process, built using events and logical gate configurations. Aid Squad Failed Workers Cannot Escape Workers Trapped Into flames Flames near workers Alarm Failed Security Frameworks
22 Event Trees An event tree is a visual representation of all the events which can occur in a system. Event trees can be used to analyze systems in which all components are continuously operating, or for systems in which some or all of the components are in standby mode. The starting point (referred to as the initiating event) disrupts normal system operation. The event tree displays the sequences of events involving success and/or failure of the system components. Security Frameworks
23 Vulnerability Trees Vulnerability trees are hierarchy trees constructed as a result of the relationship between one vulnerability and other vulnerabilities and/or steps; A threat agent has to carry out in order to reach the top of the tree; The top of the tree is known as the top vulnerability and we will symbolise it with a capital V. Thereare a largenumberof ways that such a top vulnerability can be exploited. Each of these ways will constitute a branch of the tree. The branches will be constructed by child vulnerabilities. A zone B zone G C F Security Frameworks H D A B E
24 Attack Trees Structured attack scenarios against a system organized in a tree structure; Root node represents a main goal, child nodes are subgoals that must be achieved to accomplish higher level goals; A given system is likely to have many attack trees associated with its operation; A set of attack trees is referred to as an attack forest; And/Or structure;
25 Attack Trees Open Safe Break lock Know code Hole in The wall Steal safe Written in A note Given by a Person Menace Blackmail Eavesdrop Corrupt Extort code Snooping talks Security Frameworks
26 Attack Trees Open Safe Break lock Know code Hole in The wall Steal safe Written in A note Given by a Person Menace Blackmai l Eavesdrop Corrupt Extort Code Snooping Talks Security Frameworks
27 Attack Scenery Analysis Analysing Sceneries Attack we ll follow these simple steps 1. Attack Strategies Recognizing; 2. Countermeasures Recognizing; While to examine various points of view analysing Attack Sceneries we ll folow these steps: 1. Attack Tree Labelling; 2. Countermeasures Labelling; Security Frameworks
28 Attack Strategies Recognizing Attacker s Aim: Steal data from a server Steal Data Steal Saved Data Steal Server Phisically Let s develop separately these childs Security Frameworks
29 Attack Strategies Recognizing Steal Saved Data Obtain a Login Have a Login Attack Remotely Steal to an User Corrupt an User Exploit DB Vulnerability Exploit Mail Vulnerability Steal Server Phisically Break into building Break through Door Escape unobserved Break into building Obtain keys Escape unobserved Security Frameworks
30 Countermeasures Recognizing Steal Saved Data Obtain a Login Have a Login Attack Remotely Steal to an User Corrupt an User Resp. Redistr. Exploit DB Vulnerability Exploit Mail Vulnerability Change Password Change Password Motivate Workers System Update Antivirus Shutdown Pc After use Add Auth Mechanism Check Script Validation Block Susp. Attachments Add Auth Mechanism Resp. Redistr. Content Separation Resp. Redistr. Motivate workers Security Frameworks
31 Countermeasures Recognizing Steal Server Phisically Break into building Break through Door Escape unobserved Break into building Obtain keys Escape unobserved Install Cameras Install Armoured door Install Cameras Install Cameras Magnetic lock Install cameras policeman policeman policeman policeman Security Frameworks
32 Business Point of View Attack Tree Labelling: 1. Study tree in order to define best investments and to preserve assets; 2. Use of labels in order to evaluate tree in a quantitative way (AV,EF,ARO) nodes: SLE and ALE calculations depends only on EF and ARO values involved in the node itself; Attacks described by AND nodes: SLE and ALE calculations depends on EF and ARO values involved with the actions under the AND node; 3. Attacks described by OR nodes 4. Attacks
33 Business Point of View A AV EFb AROb B SLEb ALEb EFc AROc C SLEc ALEc D E Security Frameworks
34 Business Point of View Attack EF ARO SLE ALE Steal Data + Steal Root Perm. 100% 0, Steal Saved Data + Corrupt to gain Root Perm. Steal Saved Data + Root Perm. Steal Saved Data + Remote Attack (DB) Steal Saved Data + Remote Attack (DB) 100% 0, % 0, % 0, % 0, Security Frameworks
35 Business Point of View Countermeasures Labelling: 1. Study tree in order to define best defense sceneries; 2. Use of labels in order to evaluate best countermeasures (% Risk Mitigated, Cost of Investment,ROSI); 3. Countermeasures described by OR nodes: ROSI calculated for each countermeasure; ROSI is 4. Countermeasures described by AND nodes: ROSI calculated for each countermeasure s combination; ROSI is Security Frameworks
36 Business Point of View A B C %RM1 Cost1 %RM2 Cost2 1 2 ROSI1 ROSI2 %RM3 Cost3 D 3 E %RM4 Cost4 4 ROSI 3,4 ROSI 3,5 %RM5 Cost5 5 Security Frameworks
37 Business Point of View Countermeasure ALE %RM Cost ROSI Change Password % 500 9,80 Shutdown Pc after use % 100 8,00 Responsibility Redistribution % ,70 System Update % ,59 Antivirus % ,10 Security Frameworks
38 Attacker Point of View Attack Tree Labelling: 1. Study tree in order to define the expect profit gained from successful attacks; 2. Use of labels in order to evaluate Attack s cost (Gain,Cost Cost) 3. Attacks described by OR nodes: Cost Cost calculation depends only on Cost values involved in the node itself; 4. Attacks described by AND nodes: Cost Cost calculation depends on Cost values involved with the composing nodes; Security Frameworks
39 Attacker Point of View A AV B CostB C CostC = CostD + CostE CostD D E CostE Security Frameworks
40 Attacker Point of View Attack Cost Steal Data + Steal Root Perm Steal Saved Data + Corrupt to gain Root Perm Steal Saved Data + Root Perm. 0 Steal Saved Data + Remote Attack (DB) Steal Saved Data + Remote Attack (DB) Security Frameworks
41 Attacker Point of View Countermeasures Labelling: 1. Study tree in order to define best attack strategies; 2. Use of labels in order to evaluate gain expected from a successful attack (loss,roa); 3. Countermeasures described by OR nodes: ROA calculated for each countermeasure; ROA is 4. Countermeasures described by AND nodes: ROA calculated for each countermeasure s combination; ROA is Security Frameworks
42 Attacker Point of View A B C loss1 loss2 1 2 ROA1 ROA2 loss3 D 3 E loss4 4 ROA 3,4 ROA 3,5 loss5 5 Security Frameworks
43 Attacker Point of View Countermeasure Cost Loss ROA Change Password ,50 Add Authentication Mechanism ,60 Responsibility Redistribution ,85 System Update ,67 Antivirus ,00 Security Frameworks
44 Conclusions Possible future works: 1. Developing a new method involved with ARO evaluation; 2. Add a new index to ROA regarding a possible Attack Opposite Exposition; 3. Developing economical studies to underline the most exploited vulnerabilities;
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Data Handling in University Case Study- Information Security in University Agenda Case Study Background
RISK ASSESSMENT GUIDELINES
RISK ASSESSMENT GUIDELINES A Risk Assessment is a business tool used to gauge risks to the business and to assist in safeguarding against that risk by developing countermeasures and mitigation strategies.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments Objectives Define risk and risk management Describe the components of risk management List
A Practical Approach to Threat Modeling
A Practical Approach to Threat Modeling Tom Olzak March 2006 Today s security management efforts are based on risk management principles. In other words, security resources are applied to vulnerabilities
security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.
Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,
Project Risk Management
Project Risk Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Risk Management
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.
S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in
Information Security Training for SysAdmins. Center for Education and Research in Information Assurance and Security, Purdue University
Information Security Training for SysAdmins Center for Education and Research in Information Assurance and Security, Purdue University Published by: CERIAS, The Center for Education and Research in Information
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities Agenda Information Security Management in Universities Recent
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
The Second National HIPAA Summit
HIPAA Security Regulations: Documentation and Procedures The Second National HIPAA Summit Healthcare Computing Strategies, Inc. John Parmigiani Practice Director, Compliance Programs Tom Walsh, CISSP Practice
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
IT@Intel. Measuring the Return on IT Security Investments. White Paper Intel Information Technology Computer Manufacturing Information Security
White Paper Intel Information Technology Computer Manufacturing Information Security Measuring the Return on IT Security Investments Intel IT developed a model for measuring return on security investment
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Network Security and the Small Business
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Nuclear Security Requires Cyber Security
Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027
Microsoft Services Premier Support. Security Services Catalogue
Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated
Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!
Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Presented by: Kristen Zarcadoolas, Jim Soenksen, and Ed Sale PART 2: plan, act, repeat (from the look, plan,
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
An Information Security and Privacy Perspective for Procurement Services Projects
MANAGEMENT OF DATA: An Information Security and Privacy Perspective for Procurement Services Projects Presentation for: Procurement Services Senior Leadership Meeting Presented by: Ann Nagel, Associate
IBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
Security Risk Assessment
Security Risk Assessment Applied Risk Management July 2002 What is Risk? Risk is: Something that creates a hazard A cost of doing business Risk can never be eliminated, merely reduced to an acceptable
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
Security Standards Workshop: An Overview From Risk Assessment to Proposed Policies
Security Standards Workshop: An Overview From Risk Assessment to Proposed Policies Presenter: Frank Ruelas, MBA Director, Corporate Compliance Gila River Health Care Corporation Sacaton, Arizona September
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
Security Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating
Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating to all users of UNH IT resources, and improve the availability
Attack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
Negative Risk. Risk Can Be Positive. The Importance of Project Risk Management
The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project and in the best interests t of
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Lab 1: Security Audit
Lab 1: Security Audit Mark Gius October 10, 2014 1 System Description The system is a low-powered Atom PC, small form factor (it is less than 12 on each side, and about 3 tall), with a 320GB hard drive
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM 1 V.A.Injamuri Govt. College of Engineering,Aurangabad, India 1 [email protected] Abstract This paper is focused on practical securing Linux
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Risk Management Handbook
Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk
Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Cyber Security Risk Mitigation Checklist
Cyber Security Risk Mitigation Checklist Contents Building a Risk Management AMI Program MDM Cyber Security Policy Communication Systems Personnel and Training Scada Operational Risks In Home Displays
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
State of Vermont. Physical Security for Computer Protection Policy
State of Vermont Physical Security for Computer Protection Policy Date Approved: 04-02-10 Approved by: Tom Pelham Policy Number: 0501.012005 Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose...
How to Build a Security Dashboard
Building a Security Dashboard Joel M Snyder [email protected] Senior Partner Opus One Agenda What s a Dashboard? How do I build one (part 1)? don t fit in an hour A Security Dashboard Provides
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
Quick Reference Guide Interactive PDF Project Management Processes for a Project
Project Processes for a Project Click the Knowledge Area title (below and left in blue underline) to view the details of each Process Group. Project Process Groups and Knowledge Areas Mapping Project Process
This means that any user from the testing domain can now logon to Cognos 8 (and therefore Controller 8 etc.).
ChaseReferrals and multidomaintrees Graphical explanation of the difference Imagine your Active Directory network looked as follows: Then imagine that you have installed your Controller report server inside
