Enterprise Software Management Systems by Using Security Metrics
|
|
|
- Caren Walton
- 9 years ago
- Views:
Transcription
1 Enterprise Software Management Systems by Using Security Metrics Bhanudas S. Panchabhai 1, A. N. Patil 2 1 Department of Computer Science, R. C. Patel Arts, Commerce and Science College, Shirpur, Maharashtra, India 2 Vasantrao Naik Arts and Science College, Shahada, Maharashtra, India Abstract: Metrics are quantifiable measurement. Security metrics are quantitative indicators for the security attributes of an information system or technology. Metrics helps us to understand quality and consistency. Metrics provides a universal way to exchange ideas, to measure the product or service quality, and to improve a process. We cannot improve security if we cannot measure it. This applies to security as well. Security metrics are assuming tremendous importance as they are dynamic for measuring the current security status, to develop operational best practices and for managing future security research. This topic is very applicable at a time when organizations are coming under increasing pressure requiring them to demonstrate due persistence when protecting the data assets of themselves and their users. In these situations metrics (CVSS) can give the organizations a way to prioritize vulnerabilities and the risks they pose to enterprise information assets. This paper presents a framework for ranking vulnerabilities in a consistent fashion, and some operational metrics used by large enterprises in managing their software systems security process and to cover all dimensions of IT security from organizational (people), technical and operational points of view. Keywords: Common Vulnerability Scoring System, Vulnerabilities, Security Metrics, System Security, Security Management 1. Overview Penetration testing, vulnerability scoring, and means of probing defenses for weaknesses in security are some of the methods currently being used for evaluating IT systems and network security. These strategies are not adequate in the present situation considering higher frequency of new vulnerabilities discovered. Practice has shown that a set of good metrics would help both to determine the status of IT security performance and to enhance it by minimizing the window of exposure to the new vulnerabilities. Metrics display the effectiveness of goals and objectives established for IT security. They can measure the implementation of a security policy, the results of security services and the impact of security events on an enterprise s mission. IT security metrics can be collected at various levels and detailed metrics can be aggregated and rolled up to progressively higher levels depending on the size and complexity of the organization. It is essential here to highlight the important difference between metrics and measurements while measurements are instantaneous snap shots of particular measurable parameters, metrics are more complete pictures, and typically comprised of several measurements, baselines and other supporting information that provide the context for understanding the quantities. 2. Present Methodologies security officers of the sector. The Metrics work group of ISSEA (International Systems Security Engineering Association) has lead another standardization effort in this area. This group develops metrics for SSE-CMM (System Security Engineering Capability Maturity Model).One model used widely for conveying the vulnerability severity is the CVSS (Common Vulnerability Scoring System). The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. CVSS consists of three groups: Base, Temporal and Environmental. Each group produces a numeric score ranging from 0.0 to 10.0, and a vector, a compressed textual representation that reflects the values used to derive the score. The Base group represents the intrinsic qualities of The Temporal group reflects the characteristics of vulnerability that change over time. The Environmental group represents the characteristics of vulnerability that are unique to any user s environment. CVSS enables IT managers, vulnerability bulletin providers, security vendors, application vendors and researchers to all benefit by adopting this common language of scoring IT vulnerabilities. The metrics are organized into three groups: base, temporal, and environmental metrics. Security measurement using metrics has involved great interest in recent years with the help of guidelines, practices and standards accepted worldwide and with the efforts of International Organizations. Code of practices like S7799, ISO17799, and NIST SP provide a good starting point for organizations in this context. In 2004, SECMET (Security Metrics Consortium) was founded to define quantitative security risk metrics for industry, corporate and vendor adoption by top corporate Paper ID: OCT
2 Figure 1: Common Vulnerability Scoring System Framework 2.1 Base Metrics There are seven base metrics which represent the most fundamental features of vulnerability: The base metric group captures the characteristics of vulnerability that are constant with time and across user environments. The Access Vector, Access Complexity, and Authentication metrics capture how the vulnerability is accessed and whether or not extra conditions are required to exploit it. The three impact metrics measure how vulnerability, if exploited, will directly affect an IT asset, where the impacts are independently defined as the degree of loss of confidentiality, integrity, and availability. Table 1 Base Metric Measures Values Access Vector AV Access Complexity AC Authentication A Confidential Impact CI Integrity Impact II Availability Impact AI Whether the vulnerability is exploitable locally or remotely The complexity of attack required to exploit the vulnerability once an attacker has access to the target system Whether or not an attacker needs to be authenticated to the target system in order to exploit the vulnerability The impact on confidentiality of a successful exploit of the The impact on integrity of a successful exploit of the The impact on availability of a successful exploit of the Local, Adjacent Network, Network High, Medium, Low Single, Multiple, None Temporal Metrics Exploitability (E). Remediation Level (RL) Report Confidence(RC) 2.3 Environmental Metrics Table2 Measures This metric measures the current state of exploit techniques or code availability The remediation level of vulnerability is an important factor for prioritization. The typical vulnerability is unpatched when initially published. Workarounds or hot fixes may offer interim remediation until an official patch or upgrade is issued. This metric measures the degree of confidence in the existence of the vulnerability and the credibility of the known technical details. Sometimes, only the existence of vulnerabilities are publicized, but without specific details. Values Unproven (U), Proof-of-Concept (POC), Functional (F), High (H), Official Fix (OF), Temporary Fix (TF), Workaround (W), Unavailable (U), Unconfirmed (UC), Uncorroborated (UR), Confirmed (C) Different environments can have an immense bearing on the risk that vulnerability poses to an organization and its stakeholders. Environmental Metrics Collateral Damage Potential (CDP) Target Distribution (TD) Security Requirements (CR, IR, AR) Table 3 Measures This metric measures the potential for loss of life or physical assets through damage or theft of property or equipment. This metric measures the proportion of vulnerable systems These metrics enable the analyst to customize the CVSS score. Values None(N), Low(L), Low-Medium (LM), Medium-High (MH), High (H), AS Above AS Above The base equation is the foundation of CVSS scoring. Impact Bias IB Allows to convey a greater The base equation is: Base Score = round_to_1_decimal weighting to one of three (((0.6*Impact) + (0.4*Exploitability) 1.5)*f (Impact)) impact metrics over other Temporal Score = round_to_1_decimal (Base two Score*Exploitability*Remediation Level*Report 2.2 Temporal Metrics Confidence) Environmental Score = round_to_1_decimal ((Adjusted Temporal+ (10- The threat posed by vulnerability may change over time. AdjustedTemporal)*CollateralDamagePotential)*TargetD istribution) Paper ID: OCT
3 An Environmental score should be considered as the final score and used by organizations to prioritize response within their own environments. CVSS differs from other scoring systems (e.g. Microsoft Threat Scoring System, Symantec Threat Scoring System, CERT/CC Vulnerability Scoring or SANS Critical Vulnerability Analysis Scale Ratings) by offering an open framework that can be used to rank vulnerabilities in a consistent fashion while at the same time allowing for personalization within each user environment. As CVSS matures, these metrics may expand or adjust making it even more accurate, flexible and representative of modern vulnerabilities and their risks. Metrics should also be easily obtainable and feasible to measure. But research methodology plays an important role here, not to have partial data as a result; and to cover all dimensions of IT security from organizational (people), technical and operational points of view. 3. Security for Enterprise Software Systems In most large organizations, measurements of software systems security are often conducted by separate teams that independently define, collect, and analyze technical metrics. These metrics include the numbers of vulnerabilities found in network scans, known incidents reported, estimated losses from security events, security bug discovery rate in a new software application, intrusion detection system alerts, number of virus infected s intercepted, and others. The security metrics described in this section focus on network and systems integrity and reliability. The other aspects like information asset value, loss, and opportunity cost are not subject of this presentation. Depending upon their role in interacting with the software system various users are concerned about different aspects of information systems security. Table 4 Questions 1. How does enterprise software systems security this year compare to last year? 2. How does the enterprise software systems security compare to that of similar enterprises? 3. What are the costs and consequences of not acting to improve information systems security? 4. Do the security costs generate the expected return? An example of the Enterprise Software systems security metrics used at the management level Example 1.Systems Service Level 2.Network Service Level 3.Corporate Requirements Met Table 5 Percentage of time that information systems services are available for a given period of time as well as part of a time series to give historical context. Percentage of time that network services are available for a given period of time as well as part of a time series to give historical context. Percentage of business needs supported by the infrastructure and which are being met. 3.2 IT Systems Operations Groups It is responsible for infrastructures, and systems production support, are generally interested in a more granular view of the network and systems security. Whereas executives look for support for resource allocation decisions, network and IT operations people seek help to prevent, detect, and respond to network and systems security intrusions. Thus, questions of concern include: What computers, applications, or services is compromising enterprise s security? Where are they? How is the compromise taking place? Is it getting worse? How and where? How serious is the impact of the compromise? What technical measure can be taken to isolate and remediate the problem machines? Figure 2: Network and systems security based upon metrics An example of the security metrics used by network and IT operation groups is: 3.1 Managerial Officers Being responsible for the overall performance of the enterprise, are concerned with the ability of the information systems to support operations. Because they have the authority to allocate resources, both personnel and financial, to deal with problems of information systems security, they would be interested in answers to the following questions: Paper ID: OCT
4 Example 1.Compliant Devices 2.Managed Devices 3.Total Devices and Users 4.Network Latency 5.Packet loss 6.Network Utilization 7.Network throughput 8.Viruses detected in messages International Journal of Science and Research (IJSR) Table 6 Percentage of network devices that are security policy compliant Counts of systems and devices under active management Total numbers of devices and users on the network Mean time for packet delivery in the network. Percentage of packet losses Bandwidth utilization at key gateways in the network. Transfer rate for defined end-to-end network services, such as FTP, POP3, HTTP, etc. Percentage of s infected by viruses subjective readings are eliminated, making possible for sound measurement comparisons across either time (timeseries) or organizations. 3.4 Other metrics: Other several metrics that are as: We use following metrics for software project management of enterprise systems. The following figure shows the security metrics program for software project management. 3.3 An IT systems security team is typically responsible for the organization's security policies and programs. Although they may not have direct operational responsibility, they are interested in how security policies, procedures, and programs are ensuring or failing to ensure network and systems security. Table7 Questions 1. Where the computers responsible for compromising the network policy compliant? 2. What changes should be made to security policies and procedures? 3. What behavior changes should policy modifications be aiming to achieve? 4. What technologies could help prevent future compromises? 5. What was the impact of the compromise? A sample of the security metrics used by security operation team is available below: Example 1.Vulnerability Counts 2.Intrusion attempts 3.Unauthorized accesses attempts 4.Detailed Compliance Reports 5.Incident Forensics 6.Impact of Compromise Table 8 Numbers of vulnerabilities found on the network, broken out by those on policycompliant devices vs. those found on devices that are not. Number of true/false positive/negative intrusions attempts Percentage of unauthorized access for various network services (VPN, HTTP, SSH, etc.) and networked systems Numbers of users and devices compliant with each element of the security policy. The numbers of incidents attributable to policy failures vs. policy compliance failures. Users affected (service degraded, disrupted, or otherwise compromised); data lost, modified, or destroyed; The measurement process can be automated by implementing the software systems security monitoring solutions. In this way, measurement errors and the Figure 3: Security Metrics Program 3.5 Collect Metrics data mainly from Project Manager Development Team Testing Team Quality Team Help Desk Table 9 Name of the Metrics 1. Schedule performance (milestones, variances) 2. Cost performance (actual vs. planned; variances) 3. Effort performance (actual vs. planned; allocations) 4. Requirements management (total, growth, traceability) 5. Program size ( page counts - planned vs. actual) 6. Test performance (requirements tested, passed test) 7. Quality - Defect data status (problems open, closed, density, origin, etc.) 8. Process performance (tasks completed, action items) 9. Computer resource utilization (memory loading, CPU loading) 10. Management planning performance (estimates vs. actual, re-planning etc.) Paper ID: OCT
5 4. Conclusion International Journal of Science and Research (IJSR) The Metrics are central for measuring the cost and effectiveness of complex security controls. The measurement process can be automated by implementing the network and systems security monitoring solutions. In this way, measurement errors and the subjective interpretations are eliminated, making possible for credible measurement comparisons across either time (time-series) or organizations (benchmarks). In Security improvement begins by identifying metrics that quantify various aspects of security for the enterprise. Given the increased number of vulnerabilities the enterprises have to handle, we presented an open source framework (CVSS) that can be used to rank vulnerabilities in a consistent fashion. To achieve accurate measurements of productivity and quality requires automated metrics collection and analysis. In order to characterize, evaluate, predict and improve the process and product a metric baseline is essential. Nowadays enterprise software systems use the major technical-operational metrics for large enterprises. References [1] Andrew Jaquith, Security Metrics: Replacing Fear, Uncertainty, and Doubt, Addison Wesley, 2006 [2] Gerald L. Kovacich, Edward Halibozek, Security Metrics Management: How to Measure the Costs and Benefits of Security, Butterworth-Heinemann, 2005 [3] Marianne Swanson P & others, Security Metrics Guide for Information Technology Systems, NIST Special Publication , 2003) [4] Andrew Jaquith, Security Metrics: Replacing Fear, Uncertainty, and Doubt, Addison Wesley, 2006 [5] Mike Schiff man, Cisco CIAG, A Guide to the Common Vulnerability Scoring System (CVSS), Forum Incident Response and Security Teams ( Author Profile Bhanudas Suresh Panchabhai is presently working as Assistant Professor, Department of Computer Science, R. C. Patel ACS College, Shirpur, Dhule, Maharashtra, India. His research area include CVSS(Common Vulnerability Scoring System) as a Security Metrics for IT System. Dr. A. N. Patil is presently working as Principal, Vasantrao Naik College, Shahada, Nan durbar, and Maharashtra, India Paper ID: OCT
SECURITY METRICS FOR ENTERPRISE INFORMATION SYSTEMS
SECURITY METRICS FOR ENTERPRISE INFORMATION SYSTEMS Victor-Valeriu PATRICIU PhD, University Professor Department of Computer Engineering Military Technical Academy, Bucharest, Romania E-mail: [email protected]
Q: What is CVSS? Q: Who developed CVSS?
CVSS FAQ Q: What is CVSS? Q: Who developed CVSS? Q: What does CVSS not do? Q: What is involved in CVSS? Q: What are the details of the Base Metrics? Q: What are the details of the Temporal Metrics? Q:
A Complete Guide to the Common Vulnerability Scoring System Version 2.0
A Complete Guide to the Common Vulnerability Scoring System Version 2.0 June, 2007 Peter Mell, Karen Scarfone National Institute of Standards Sasha Romanosky Carnegie Mellon University and Technology Acknowledgements:
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
McAfee Vulnerability Manager 7.0.2
McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains
Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance
Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing
Pragmatic Metrics for Building Security Dashboards
SESSION ID: GRC-W03 Pragmatic Metrics for Building Security Dashboards James Tarala Principal Consultant Enclave Security @isaudit Problem Statement What s measured improves. Peter Drucker In an era of
Best Practices for Vulnerability Management
4 Steps to Reducing Risk with Vulnerability Management Best Practices Is Your Vulnerability Management Process Meaningful To Your Business? The vulnerability management process can be very useful and provide
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
AHS Flaw Remediation Standard
AGENCY OF HUMAN SERVICES AHS Flaw Remediation Standard Jack Green 10/14/2013 The purpose of this procedure is to facilitate the implementation of the Vermont Health Connect s security control requirements
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Information Security Office
Information Security Office SAMPLE Risk Assessment and Compliance Report Restricted Information (RI). Submitted to: SAMPLE CISO CIO CTO Submitted: SAMPLE DATE Prepared by: SAMPLE Appendices attached: Appendix
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Common Vulnerability Scoring System v3.0: Specification Document
Common Vulnerability Scoring System v3.0: Specification Document The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities.
A Software Security Assessment System Based On Analysis of
A Software Security Assessment System Based On Analysis of Vulnerabilities 1,2 Chenmeng Sui, 1 Yanzhao Liu, 2 Yun Liu, 1 China Information Technology Security Evaluation Center, Beijing,China,[email protected]
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Web Application Security. Sajjad Pourali [email protected] CERT of Ferdowsi University of Mashhad
Web Application Security Sajjad Pourali [email protected] CERT of Ferdowsi University of Mashhad Take away Why web application security is very important Understanding web application security How
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Manage Vulnerabilities (VULN) Capability Data Sheet
Manage Vulnerabilities (VULN) Capability Data Sheet Desired State: - Software products installed on all devices are free of known vulnerabilities 1 - The list of known vulnerabilities is up-to-date Desired
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance
REDSEAL NETWORKS SOLUTION BRIEF Proactive Network Intelligence Solutions For PCI DSS Compliance Overview PCI DSS has become a global requirement for all entities handling cardholder data. A company processing,
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Virtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Web Application security testing: who tests the test?
Web Application security testing: who tests the test? Ainārs Galvāns Application Penetration Tester www.exigenservices.lv About myself Functional testing Leading test group Reporting to client Performance
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Management (CSM) Capability
CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE
State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard
State of Minnesota Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard Approval: Enterprise Security Office (ESO) Standard Version 1.00 Gopal Khanna
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
ORGANIZADOR: APOIANTE PRINCIPAL:
ORGANIZADOR: APOIANTE PRINCIPAL: Miguel Gomes 912412885 [email protected] Alliances Portugal, Africa, Brasil Coverage One of the biggest CSP worlwide Tec. Inovator Strong Cloud Bet and investment
case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Vulnerability Management Nirvana: A Study in Predicting Exploitability
SESSION ID: TECH-F01 Vulnerability Management Nirvana: A Study in Predicting Exploitability Kymberlee Price Senior Director of Operations Bugcrowd @Kym_Possible Michael Roytman Senior Data Scientist Risk
Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
Security Metrics What Can We Measure?
Security Metrics What Can We Measure? Zed Abbadi The Public Company Accounting Oversight Board What is a Metric A metric is a system of related measures enabling quantification of some characteristic.
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Security Content Automation Protocol for Governance, Risk, Compliance, and Audit
UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Cyber Incident Response
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Cyber Incident Response No: NYS-S13-005 Updated: 03/20/2015 Issued By: NYS ITS
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
Securing Remote Vendor Access with Privileged Account Security
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
NUS InfoComm Security Landscape
NUS InfoComm Security Landscape Yong Fong Lian, Manager (IT Security), NUSCERT, NUS, Computer Centre 1 NUS Security Strategy People Process Technology 2 NUS Security Framework NUS InfoComm Security Framework
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Security and Vulnerability Issues in University Networks
, July 6-8, 2011, London, U.K. Security and Vulnerability Issues in University Networks Sanad Al Maskari, Dinesh Kumar Saini, Swati Y Raut and Lingraj A Hadimani Abstract The paper deals with security
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:
1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus
Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance.
Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance. Prevari makes organizations safer by providing instrumentation for managing risks to information. Prevari solutions
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
