INFORMATION SECURITY MANAGEMENT IN IRANIAN SMART METERING PROJECT (FAHAM)
|
|
|
- Tracey Davidson
- 9 years ago
- Views:
Transcription
1 INFORMATION SECURITY MANAGEMENT IN IRANIAN SMART METERING PROJECT (FAHAM) Meisam Rezaeian Nader Salek Gilani Hadi Modaghegh Iran Energy Efficiency Organization Iran Energy Efficiency Organization Iran Energy Efficiency Organization (IEEO) Iran (IEEO) Iran (IEEO) Iran ABSTRACT In the recent years with the development of information systems and computer applications, information security has gained special attentions. Due to the implementation of Advanced Metering Infrastructure (AMI) in the near future, the electricity distribution companies will be able to remotely manage and monitor their customers through these systems and also all customers are able to interact with these companies. The main issue is providing security of smart metering system and how to manage and secure data exchange that directly undermine the vital activities of system. Therefore, with reasonable investment in information security and implementing an Security Management (ISMS) with appropriate security mechanisms benefited from increasing system reliability, business continuity, reducing threats and their effects and enhancing customer satisfaction alongside other main benefits of smart metering systems. In this paper we discuss information security issues in smart metering systems including threats, security services and mechanisms to deal with system risks and in particular, the proposed security solutions and schemes in Iranian Smart Metering Project (FAHAM) are presented. Keywords Security; Smart Meterig s; security management ; Risk Management; Security Operations Center; Iranian Smart Metering Project (FAHAM); I. INTRODUCTION Security (InfoSec) is called t o protect all forms of data (electronic, physical, etc ) against unauthorized access, abuse, disclosure, disruption, modification, recording and destruction. security is established with the aim of ensuring continuity of current operations, minimizing the risk, increasing trends and rate of investments. The history of information security begins with the history of computer security. In World War II, the first mainframe computers were developed to break the security codes. At this time, security requirements are summarized in the protection of places, devices and applications from external threats and this technical perspective of security was raised to the early 1980s [1]. After years it became clear that most of security penetrations occurred according to weaknesses in security management and lack of security training of personnel. Since the mid-80s to mid-90s, issues related to information security management policies and organizational structures were proposed. These security plans were completed gradually in the mid-90s with combination of the two previous stages and other parameters to implement security policies and mechanisms based on the needs of the organization. This stage includes activities such as the standardization of information security, international licenses and cultural background in the organization and evaluates information security measures permanently and dynamically. This process continues and is being completed [2]. Today, millions of insecure computer networks are connected together via the Internet. With increasing cyber attacks, governments and companies have to protect computer systems in utilities and other vital infrastructures. The Smart Grid is a next-generation electrical power system that is typified by the increased use of Communications and Technology in the generation, delivery and consumption of electrical energy [3]. Smart Grid facilitates control and monitoring of all equipments that can be connected to the grid [4]. Data, commands and requests are exchanged between Central Access (CAS), smart meters and other smart equipments by Advanced Metering Infrastructure (AMI) at the consumer level in distribution networks. There are security concerns in smart metering systems as well as other information systems. For example, with taking inappropriate security policies and mechanisms, consumption data measured by the meter is tampered or eavesdropped by hackers to discover when consumers are present in their homes. Another issue is cyber attacks to information and telecommunication networks and disconnecting of a large number of consumers and subsequently the energy and load balancing of the whole electrical network is affected. So it seems necessary to take appropriate security mechanisms for dealing with potential security threats of using smart meters. Section II introduces in Iranian Smart Metering Project (FAHAM). In section II, security management system and one of the conventional standards for implementation procedures of this system are described. Also, risk management plan for FAHAM assets and contingency planning for FAHAM services are presented. Section IV describes another most important security control that used for incident security response in Iranian Smart Metering Project (FAHAM) and finally, conclusions is presented. CIRED2015 1/5
2 II. IRANIAN SMART METERING PROJECT (FAHAM) The deployment of smart grid in Iran started with smart meter rollout and implementation of AMI pilot projects at December Iranian Smart Metering Plan (FAHAM) was funded by Ministry of Energy (MOE) of Iran and under the supervision of Iran Power Generation, Transmission and Management Company (TAVANIR). Implementation and development of FAHAM has been assigned to SABA (Iran Energy Efficiency Organization, IEEO) as a project manager from TAVANIR. In the first phase of this project, about one million smart meters will be installed in five separate areas including central, south east, south west, north west and north east that as shown in Fig. I. Five selected local distribution companies ( LDCs) in these areas are Tehran, Bushehr, Ahvaz, Zanjan and Mashhad respectively. At the second phase, implementation and deployment of smart metering includes MDM, system applications and WAN communication infrastructure will be done for all of consumers. Also the specification of data modeling and communication interfaces will be finalized, so the producers will be able to product interoperable smart meters for the utilities individually [5]. Fig. I. Five Areas of FAHAM Project There are business benefits of AMI implementation in Iran which are mentioned below [6]. Improvement of customers energy consumption profile Applying energy management by the network operator in normal and critical conditions Improving meter readings and billing processes Reducing non-technical losses as well as monitoring technical losses in the distribution network Improving quality of services and power quality like reducing the duration of outages and number of interruptions. Developing distributed generation and clean energy usage Possibility of electricity pre-sale and establishing electricity retail markets Optimizing operation and maintenance costs Providing appropriate management of water and gas meters III. INFORMATION SECURITY MANAGEMENT is considered as an important and valuable asset to any organization and therefore security mechanisms are necessary to keep them safe and secure. Security Management (ISMS) is a set of policies and planning activities, responsibilities, processes and security mechanisms that are used to manage organization's sensitive data. ISMS provides standards for immunization of cyberspace to establish, implement, operate, monitor, review and improve information security plans that are specified to the organization.[7] By providing the information security management standard in 1995, a systematic approach was formed to immunization of information technology systems. According to this approach, implementation and maintenance of information security management system is a continuous process according to the Deming cycle that consists of four stages including Plan, Do, Check and Act which is known as PDCA cycle. A. security management system standards The ISO/IEC series (or ISMS Family of Standards) comprises information security standards published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). The series provides best practice recommendations on information security management, risks and controls within the context of an overall information security management system (ISMS) [8]. ISO/IEC provides guidelines for information security risk management (ISRM) in an organization, specifically supporting the requirements of an information security management system defined by ISO/IEC ISO/IEC 27001:2005 is a risk based information security standard that the risk management process fits into the PDCA model. However, the latest standard, ISO/IEC 27001:2013, does not use this cycle. Table I. Alignment of ISMS and information security risk management process ISMS Process Plan Do Check Act Security Risk Management Process Establishing the context Risk assessment Developing risk treatment plan Risk acceptance Implementation of risk treatment plan Continual monitoring and reviewing of risks Maintain and improve the Security Risk Management Process CIRED2015 2/5
3 Fig. II. Security Risk Management Process [9] B. security risk management process Risk management (RM) is a comprehensive & continuing process to identify, analyze, evaluate, monitor and reduce risks of some business activities and processes to an acceptable level. To reduce risks, mechanisms & controls will be determined using the results of risk assessment and technical, economical, social and political requirements of organization. Table 1 summarizes the information security risk management process in accordance with PDCA cycle of the ISMS. The information security risk management process consists of context establishment, risk assessment, risk treatment, risk acceptance, risk communication and consultation and risk monitoring and review. Fig. II illustrates the information security risk management process can be iterative for risk assessment and risk treatment activities.[9] C. FAHAM Security Team In order to develop a risk management plan and a business continuity plan of FAHAM project, a team of experts with relevant specialty in electrical, telecommunications, computers(hardware & software), information technology and cryptography was formed and many sessions conducted continuously to identify the assets, determine risks associated and provide necessary controls for reducing risks that are addressed. The core of this team consists of some fixed members and varied members that the varied members depending on the needs of project will be added to it from stakeholders and related organizations. D. Risk Assessment & Risk Treatment Plan in FAHAM Project The Scope of FAHAH project is bounded to local distribution company area and consists of residential, commercial, agricultural, industrial, street lighting and public customers. At first, the key concepts is described that used in the risk assessment. 1) Key Consepts The CIA triad (confidentiality, integrity and availability) is one of the core principles of information security. There is continuous debate about extending this classic trio. [2] Other principles such as authentication, authorization, Non-repudiation and accountability have sometimes been proposed for addition. Threat A threat is the potential of human or natural agent that can be harm the assets of organization such as information, processes and etc with exploiting of their vulnerabilities. Threats may be deliberate, accidental or environmental and can be identified generically and by type (e.g. physical damage, natural events, unauthorized actions, technical failures, compromise information and functions). Vulnerability Vulnerability is a weakness of one asset or a group of assets that can be exploited by one or more threats. are classified according to the asset class that are related to hardware, software, network, personnel, site and organizational. For example insufficient software testing and lack of audit trail related to software and also unprotected communication lines and insecure network architecture related to communication. 2) Risk assessment method In FAHAM project used risk assessment is performed based on the ISO/IEC and risk is calculated by: Risk= Asset Value Vulnerability Threat Asset Value is sum of consequences caused by violation of security services including confidentiality, integrity and availability (CIA). Consequences are considered on financial, reputation and interruption of power supply caused by violation of any security services. OWASP Risk Rating Methodology introduces some factors for estimating vulnerability severity level & likelihood of threat. The threat agent factors are used to estimate the likelihood of a successful attack that occurred in worst case. Also vulnerability factors are used to estimate the likelihood of the discovery and exploit of particular vulnerability. These factors are optimized for FAHAM Project and presented in TABLE II & III. 1 Difficult 2 Difficult Table II. Vulnerability discovery Practically Impossible Lack of exploit Practically Impossible Lack of Awareness Unknown & No Intrusion detection Active Detection Logged & Reviewed CIRED2015 3/5
4 3 Medium 4 Easy 5 1 Easy Low 2 Low 3 Medium 4 High 5 High discovery Existance of Semi- Full- exploit Existance of Semi- Full- Awareness with Limited with Complete General Knowledge of Vulnerability Table III. Treat Agent Intrusion detection Selective Logged & Reviewed Logged Without Review No Intrusion Detection Mechanism Skill level Motive Opportunity Size No Technical Some Technical Advanced Computer Users Network And Programming Security Penetration No Reward & Some Rewards High Rewards Public Full Access & Expensive Resources Full Access Special Access Typical Access No Access & Resources Developers Administrator s Intranet Users Authenticated Users Anonymous Internet Users The important step before risk analysis and after establishing the context is risk identification. The purpose of risk identification is to collect input data for the risk analysis activity and to determine what could happen to cause a potential loss, and to gain insight into how, where and why the loss might happen. Risk identification includes five steps: identifying of assets, identifying of threats, identifying of existing controls, identifying of vulnerabilities and identifying of consequences. Output of identification of assets is a list of assets and the business processes related to these assets. Assets in FAHAM project are divided into several categories including hardware, software, network & communication, documents, personnel, site and organizational that presented with more details in Table IV. related to each asset have been extracted using Annex D of ISO and Chapter 6 of NIST IR based on the nature, environment and performance of assets. After determining the vulnerabilities, the level of each vulnerability associated with each asset are determined based on vulnerability factors in Table II. A threat has the potential to harm assets such as information, processes, systems and organizations. Threats related to each vulnerability are extracted using Annex C & D of ISO After finishing the risk assessment, Risk Treatment Plan (RTP) is developed and determines general risk treatment options and required actions and controls to reduce the risk to an acceptable level. Also a Statement of Applicability (SOA) is prepared and implemented by suppliers. As mentioned before, these processes can be iterative for risk assessment and risk treatment activities. Categories Hardware Network & Coms. Docs Personnel Site Org. Database Server, AHE Server, Web Server, Hardware Firewall Server O.S., User O.S., Active Directory, Firewall, Antivirus Data Communication Service, Router, Switch, Ethernet Design Requirement, Design, Security Design, Test Reports Administrators of MDM,DMS, Server Room in Regional, Server Room in Employer Org. Table IV. FAHAM Assets Assets Smart Meters: CT (3φ), CT/PT (3φ),Direct Current (3φ), Household(1φ). Data Concentrator(DC) Applications (MDM,DMS, CIS, DRMS, ) GPRS Interface, PLC Interface Guidelines and Procedures, Contracts, Operating Instructions, Installation And Replacement Instructions Administrative Assistants of MDM,DMS, CIS, DRMS, Documents Rooms, Staff Rooms in Regional Executive Org. IHD, HHU Meters' Firmware, DC's Firmware GPRS SimCard Installation and Replacement Forms, Update Forms, Data Collection Forms Power Users of MDM,DMS, Panel smart meters (Direct, 1φ), Panel 3φ smart meters (CT, CT/PT), Panel DC Consultant Company Flash Memory, CD/DVD, Printers, Scanners, Laptops, Telephone & Fax Application s Wireless Modem, Office Phone & Fax s Normal Users of MDM,DMS, Earthing, UPS, Air Conditioning, Fire Suppression, Security s Contractor E. Contingency Planning in FAHAM Project Contingency Planning (CP) is the program developed by organizational planners to prepare for, detect, react to, and recover from events that threaten the security of information resources and assets, both human and artificial. The main goal of CP is restoration to normal modes of operation with minimum cost and disruption CIRED2015 4/5
5 after an unexpected event. CP is included following components: Incident Response Plan (IRP), Disaster Recovery Plan (DRP) and Business Continuity Plan (BCP). IRP focuses on immediate response to an incident. DRP focuses on restoring operations at the primary site after disasters occur. BCP facilitates establishment of operations at an alternate site, until the organization is able to either resume operations back at their primary site or select a new primary location. The first phase in CP process is Business Impact Analysis (BIA) that encompasses activities aimed at identifying, quantifying and qualifying the business impact and other effects of a mission-critical activity failure on an organization. The fundamental outcomes of the BIA are identification of mission-critical activities, financial and nonfinancial impacts of a disruption and identification of the minimum level of resources needed to accomplish the organization s business objectives in terms of an acceptable recovery time: Recovery Time Objectives (RTO) and an acceptable recovery status of assets: Recovery Point Objectives (RPO). IV. SECURITY OPERATION CENTER & NETWORK OPERATION CENTERS other information systems in the world, Security Operation Center (SOC) with Security Incident Response Team (SIRT) and malware analysis laboratory are used for securing the Iranian smart metering system (FAHAM). Hierarchical Structure of SOC & NOCs is shown in Fig. III. SOC monitors the security incidents and defended the enterprise information systems such as web sites, applications, databases, data centers and servers from cyber attacks. Also, there are Network Operations Centers (NOCs) with Incident Response (IR) teams in each area that is specified in section II. Fig. III. Hierarchical Structure of SOC & NOCs Coordination and Security knowledge transfer between NOCs are conducted through a SOC in TAVANIR. SOC staff includes analysts, security engineers and SOC managers that are trained in computer engineering, cryptography and network engineering. NOCs are responsible for monitoring and maintaining infrastructure, resolve issues that could affect performance or availability and ensure uninterrupted network services. The Primary responsibilities of NOC include: network monitoring, incident response, communications management and reporting. IR team in NOC provides its services in three categories: Response, Prevention and Recovery. CONCLUSION In this paper, we discuss about main issues of information security management in smart metering systems including risk management, business continuity management and security incident response. Also, security mechanisms and controls in FAHAM project are presented. systems need consistent information management system with appropriate security mechanisms to deal with the risks of system. Best practices and solutions are used in FAHAM project basis of international standards and best practices on large project of the world. These mechanisms can reduce security risks and improve continuity of services and provide customers satisfaction. REFERENCES [1] M. E. Whiteman & H. J. Maltord, 2012, Security: An Introduction, Principles of Security,4th ed. Boston, MA, Course Technology, pp [2] M. Rezaeian,H. Modaghegh & N. Salek Gilani, Aug. 2013, Security in Smart Metering s, Iran Energy Efficieny Organization (IEEO), Department of Smart Metering s & Smart Grid, Special Reports, No. 12, [Online] Available: [3] What is the Smart Grid?, [Online] Available: [4] M. Shabanzadeh & M. P. Moghaddam, 2013, What is the Smart Grid? Definitions, Perspectives, and Ultimate Goals, 28 th International Power Conference, Tehran, Iran. [5] S. Jamal, Nov.2013, Iran s smart grid deployment from smart meter to overall system architecture, [Online] Available: [6] General, Economic, Functional, Technical & Communications Requirements of Iranian Smart Metering Project (FAHAM), Iran Energy Efficieny Organization(IEEO), Department of Smart Metering s & Smart Grid, Final Rep, Dec [Online] Available: [7] Technology -Security Techniques - Security Management s - Requirements, ISO/IEC 27001:2005, Oct [8] Security Standards [Online]. Available: [9] Technology - Security Techniques - Security Risk Management, ISO/IEC 27005:2011, CIRED2015 5/5
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA
1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Technology Service Manager Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS DA-1
PUBLIC POWER CORPORATION S.A. INFORMATION TECHNOLOGY DIVISION CENTRAL SYSTEMS SUPPORT SECTION IT SYSTEMS SECURITY SUBSECTION PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
State of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agencies Business Continuity Management Policy June 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
Information System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
Cyber Security Risk Mitigation Checklist
Cyber Security Risk Mitigation Checklist Contents Building a Risk Management AMI Program MDM Cyber Security Policy Communication Systems Personnel and Training Scada Operational Risks In Home Displays
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain
1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business
Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.
Principle of Information Security Asst. Prof. Kemathat Vibhatavanij Ph.D. Security Challenges Evolution of technology focused on ease of use Compliance to government laws and regulations Direct impact
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Information Security Policy Manual
Information Security Policy Manual Latest Revision: May 16, 2012 1 Table of Contents Information Security Policy Manual... 3 Contact... 4 Enforcement... 4 Policies And Related Procedures... 5 1. ACCEPTABLE
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
NOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting
Is Your IT Environment Secure? November 18, 2015 Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Clark Schaefer Consulting Serving elite and emerging companies with practical solutions
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
FACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
Information Security Incident Management Process
Information Security Incident Management Process Anna Kostina +7-903-586-45-47 [email protected] Natalia Miloslavskaya Kashirskoe highway,31 Moscow, Russia +7-495-323-90-84 [email protected] Alexander Tolstoy
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
Hengtian Information Security White Paper
Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
Industrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security [email protected] Responsible for the Global Delivery of Honeywell
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
University of Michigan Disaster Recovery / Business Continuity Administrative Information Systems 4/6/2004 1
University of Michigan Disaster Recovery / Business Continuity Administrative Information Systems. 1 Michigan Administrative Information Services (MAIS) MAIS is responsible for the production support of
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
UTMB INFORMATION RESOURCES PRACTICE STANDARD
IR Security Glossary Introduction Purpose Applicability Sensitive Digital Data Management Privacy Implications This abbreviated list provides explanations for typically used Information Resources (IR)
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
[Insert Company Logo]
[Insert Company Logo] Business Continuity and Disaster Recovery Planning (BCDRP) Manual 1 Table of Contents Critical Business Information 4 Business Continuity and Disaster Recover Planning (BCDRP) Personnel
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
