Course information. INF3510 Information Security. Lecture 01: - Course info - Basic concepts in information security. Course organisation
|
|
|
- Eunice Walker
- 9 years ago
- Views:
Transcription
1 Course information INF3510 Information Security Lecture 01: - Course info - Basic concepts in information security Course organization Prerequisites Syllabus and text book Lecture plan Home exam Assessment and exams Security education AFSecurity University of Oslo, spring 2015 UiO Spring 2015 L01 - INF3510 Information Security 2 Course organisation Course activities Attend 2 hours lectures per week Lecture notes available at least one day prior to lecture Work on the workshop questions Will be discussed during the following week s workshop which follows immediately after the 2-hour lecture Work on the home exam Topic for the assignment can be freely chosen. Not just about facts, you also need to understand concepts apply those concepts think about implications understand limitations Course Resources Learning material will be made available on: lecture presentations, workshop questions, etc. List of English security terms translated to Norwegian Assignment topic for home exam on: Various online resources E.g. NIST special computer security publications UiO Spring 2015 L01 - INF3510 Information Security 3 UiO Spring 2015 L01 - INF3510 Information Security 4
2 Lecturer Prof. Audun Jøsang, Education Baccalaureat, Lycée Corneille, France, 1981 BSc Telematics, NTH 1987 MSc Information Security, Royal Holloway College, London, 1993 PhD Information Security, NTNU, 1998 CISSP 2005, CISM 2010, Work System design engineer, Alcatel, Belgium Associate Professor, NTNU, Research Leader, DSTC, Australia Associate Professor, QUT, Australia, Professor, UiO, 2008 Prerequisites Prerequisites Basic computer and network technology Basic mathematics Theoretic focus on a basic level Discrete mathematics, number theory, modular arithmetic Information theory Probability calculus Computer and network architecture UiO Spring 2015 L01 - INF3510 Information Security 5 UiO Spring 2015 L01 - INF3510 Information Security 6 Syllabus and text book The syllabus for this course consists of the material presented during the lectures, as described in the lecture notes. Adequate comprehension of the material requires that you also read parts of the text book and other documents work out answers to the workshop questions follow the lectures. Text book: CISSP All-in-One Exam Guide 6 th Edition, 2013 Author: Shon Harris Shon Harris The book covers the 10 CBK domains (Common Body of Knowledge) for the CISSP Exam (Certified Information Systems Security Professional). Easy to order book from amazon.com, price: US$ 50 How to use Harris CISSP book (6th ed.) 1430 pages in total But exclude Ch.1 (Becoming a CISSP) 50 pages of appendix, glossary and index 300 pages of tips, Q&A Parts of chapters Around 800 pages of readable material The book is very easy to read Sometimes long explanations and examples Each chapter has Main Sections (big font) and Subsections (small font), but no numbering, a bit confusing. Don t read distracting comments in italics under section titles UiO Spring 2015 L01 - INF3510 Information Security 7 UiO Spring 2015 L01 - INF3510 Information Security 8
3 Draft Lecture Plan Week Date # Topic W Course Information. Basic Concepts in IS W IS Management, Human Factors for IS W Risk Management and Business Continuity Planning W Computer Security W Cryptography W Key Management and PKI W Digital Forensics W User W Identity Management and Access Control W Network Security W14 Easter break W15 Easter break W Network Perimeter Security W Development and Application Security W Operations Security W19 No lecture W20 No lecture W Review W22 No lecture W Exam time: 14:30h - 18:30h (4 hours) UiO Spring 2015 L01 - INF3510 Information Security 9 Home Exam Write an essay on a security topic chosen by you Individual, or in group of 2 or 3 students Select topic and specify group on wiki Length: words (approx pages) Due date: Assessment criteria: Structure and presentation: weight ¼ Scope and depth of content: weight ¼ Evidence of independent research and analysis: weight ¼ Proper use of references: weight ¼ UiO Spring 2015 L01 - INF3510 Information Security 10 Assessment and Marking Course weight: 10 study points Assessment items: Home exam: weight 0.4 Written exam: weight 0.6 Required to get a pass score on both assessment items At least 40% on home exam and 40% on written exam Relatively easy to get a high score on home exam Relatively difficult to get a high score on written exam Academic dishonesty (including plagiarism and cheating) is actively discouraged See: Should be no problem UiO Spring 2015 L01 - INF3510 Information Security 11 Statistics from previous exams Year # students # A (%) 4 (4%) # B (%) 8 (7.5%) # C (%) 45 (44%) # D (%) 14 (13.5%) # E (%) 9 (4.5%) For the 2013 spring semester the course was cancelled due to faculty politics. 2 (6%) 1 (2%) 1 (2%) 6 (18%) 10 (14%) 15 (26%) 14 (41%) 33 (47%) 25 (43%) 0 (0.0%) 9 (13%) 7 (12%) 6 (17.5%) 10 (14%) 3 (5%) # F (%) 23 (22.5%) 6 (17.5%) 7 (10%) 7 (12%) UiO Spring 2015 L01 - INF3510 Information Security 12
4 Other security courses at UiO UNIK4220 Introduction to Cryptography (autumn) Leif Nilsen (Thales) UNIK4250 Security in Distributed Systems (spring) Josef Noll (IfI) UNIK4270 Security in Operating Systems and Software (autumn) Audun Jøsang (IfI) INF Unassailable IT-systems (autumn) Ketil Stølen (SINTEF) ITLED4230 Ledelse av informasjonssikkerhet (autumn) Audun Jøsang Only for professionals (fee NOK 25K) Why study information security? Being an IT expert requires knowledge about IT security Imagine building architects without knowledge about fire safety Building IT systems without considering security will lead to vulnerable IT systems Our IT infrastructure is vulnerable to cyber attacks IT experts without security skills are part of the problem! Learn about IT security to become part of the solution Information security is a political issue Often seen as a cost, but saves costs in the long term Must compete with other disciplines in IT industry and education UiO Spring 2015 L01 - INF3510 Information Security 13 UiO Spring 2015 L01 - INF3510 Information Security 14 Certifications for IS Professionals Many different types of certifications available vendor neutral or vendor specific from non-profit organisations or commercial for-profit organisations Certification gives assurance of knowledge and skills, needed in job functions gives credibility for consultants, applying for jobs, for promotion Sometimes required US Government IT Security jobs Knowledge domains reflect current topics in IT Security Generally kept up-to-date ISACA Certifications (Information Systems Audit and Control Association) ISACA provides certification for IT professionals CISM - Certified Information Security Manager CISA - Certified Information System Auditor CGIT - Certified in the Governance of Enterprise IT CRSIC - Certified in Risk and Information Systems Control CISM is the most popular ISACA security certification IT auditors and consultants commonly have ISACA certifications ISACA promotes IT governance framework COBIT (Control Objectives for Information and Related Technologies) UiO Spring 2015 L01 - INF3510 Information Security 15 UiO Spring 2015 L01 - INF3510 Information Security 16
5 CISM: Certified Information Security Manager CISM Exam Focuses on 4 domains of IS management 1. Information Security Governance 2. Information Risk Management 3. Information Security Program Development and Management 4. Information Security Incident Management Official prep manual published by ISACA Price: US $115 ($85 for ISACA members) Exams normally twice per year worldwide Next exam in Oslo (and worldwide): 13 June 2015 Deadline for registering: 10 April 2015 (final deadline) Register for exam at Exam fee approx. US $500 Multiple choice exam Requires 5 years professional experience Yearly CISM maintenance fee approx. US $100 Requires 120 hours practice time per 3 years UiO Spring 2015 L01 - INF3510 Information Security 17 UiO Spring 2015 L01 - INF3510 Information Security 18 (ISC) 2 Certifications International Information Systems Security Certification Consortium (ISC) 2 provides certification for information security professionals CISSP - Certified Information Systems Security Professional ISSAP - Information Systems Security Architecture Professional ISSMP - Information Systems Security Management Professional ISSEP - Information Systems Security Engineering Professional CAP - Certification and Accreditation Professional SSCP - Systems Security Certified Practitioner CSSLP - Certified Secure Software Lifecycle Professional CISSP is the most common IT security certification Most IT Security Consultants are CISSP CISSP Exam: Certified Information System Security Professional Many different books to prepare for CISSP exam e.g. text book used for INF3510 course CISSP All-in-One Exam Guide 6 th Edition, 2013 Author: Shon Harris 560 fee to sit CISSP exam Exam through Test Centre in Oslo: Brynsveien 12, Bryn, Oslo Most of the of the material presented in the INF3510 course is taken from the syllabus of the CISSP CBK (Common Body of Knowledge). UiO Spring 2015 L01 - INF3510 Information Security 19 UiO Spring 2015 L01 - INF3510 Information Security 20
6 CISSP CBK (Common Body of Knowledge) 1. Access Control (user authentication and identity management) 2. Telecommunications and Network Security 3. Information Security Management and Risk Management 4. Application Security (software security) 5. Cryptography 6. Security Architecture and Design (computer security) 7. Operations Security 8. Business Continuity Planning and Disaster Recovery Planning 9. Legal Regulations, Compliance and Investigation (forensics) 10.Physical and Environmental Security Security Surveys Useful for knowing the trend and current state of information security threats and attacks CSI Computer Crime & Security Survey ( Verizon Data Breach Report: PWC: US IC3 (The Internet Crime Complaint Center): Mørketallsundersøkelsen; + many others UiO Spring 2015 L01 - INF3510 Information Security 21 UiO Spring 2015 L01 - INF3510 Information Security 22 Security Advisories Useful for learning about new threats and vulnerabilities NorCERT: For government sector: NorSIS: For private sector: US CERT: Australia AusCERT: + many others Academic Forum on Security Monthly seminar on information security Guest speakers Next AFSecurity: Wednesday 11 March 2015, 14:00h Topic: Cybersecurity Management Speaker: Frode Hommedal (Telenor) AFSecurity All interested are welcome! UiO Spring 2015 L01 - INF3510 Information Security 23 UiO Spring 2015 L01 - INF3510 Information Security 24
7 Information Security Basic Concepts Good and bad translation English Security Safety Certainty Norwegian Sikkerhet Trygghet Visshet Good Security Safety Certainty Sikkerhet Bad UiO Spring 2015 L01 - INF3510 Information Security 26 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment, the nation Security and related concepts National security (political stability) Safety (health) Environmental security (clean environment) Information security etc. What is Information Security Information Security focuses on protecting information assets from damage or harm What are the assets to be protected? Example: data files, software, IT equipment and infrastructure Covers both intentional and accidental events Threat agents can be people or acts of nature People can cause harm by accident or by intent Information Security defined: The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved. (ISO27001) UiO Spring 2015 L01 - INF3510 Information Security 27 UiO Spring 2015 L01 - INF3510 Information Security 28
8 Scope of information security IS management has as goal to avoid damage and to control risk of damage to information assets IS management focuses on: Understanding threats and vulnerabilities Managing threats by reducing vulnerabilities or threat exposures Detection of attacks and recovery from attacks Investigate and collect evidence about incidents (forensics) The Need for Information Security Why not simply solve all security problems once for all? Reasons why that s impossible: Rapid innovation constantly generates new technology with new vulnerabilities More activities go online Crime follows the money Information security is a second thought when developing IT New and changing threats More effective and efficient attack technique and tools are being developed Conclusion: Information security doesn t have a final goal, it s a continuing process UiO Spring 2015 L01 - INF3510 Information Security 29 UiO Spring 2015 L01 - INF3510 Information Security 30 Internet Storm Survival Time Measure Malware Trend The survival time is calculated as the average time between attacks against average target IP address. UiO Spring 2015 L01 - INF3510 Information Security 31 UiO Spring 2015 L01 - INF3510 Information Security 32
9 Security control categories Security control functional types Physical controls Facility protection Security guards Locks Monitoring Environmental controls Intrusion detection Information Security Technical controls Logical access control Cryptographic controls Security devices User authentication Intrusion detection Forensics Administrative controls Policies Standards Procedures & practice Personnel screening Awareness training Preventive controls: prevent attempts to exploit vulnerabilities Example: encryption of files Detective controls: warn of attempts to exploit vulnerabilities Example: Intrusion detection systems (IDS) Corrective controls: correct errors or irregularities that have been detected. Example: Restoring all applications from the last known good image to bring a corrupted system back online Use a combination of controls to help ensure that the organisational processes, people, and technology operate within prescribed bounds. UiO Spring 2015 L01 - INF3510 Information Security 33 UiO Spring 2015 L01 - INF3510 Information Security 34 Controls by Information States Information security involves protecting information assets from harm or damage. Information is considered in one of three possible states: During storage Information storage containers Electronic, physical, human During transmission Physical or electronic During processing (use) Physical or electronic Security Services and Properties A security service is a high level security property The traditional definition of information security is to preserve the three CIA properties for data and services: Confidentiality: Integrity Availability: Data and Services Availability The CIA properties are the three main security services Security controls for all information states are needed UiO Spring 2015 L01 - INF3510 Information Security 35 UiO Spring 2015 L01 - INF3510 Information Security 36
10 Security services and controls Security services (aka. goals or properties) implementation independent supported by specific controls Security controls (aka. mechanisms) Practical mechanisms, actions, tools or procedures that are used to provide security services Security services: e.g. Confidentiality Integrity Availability support Security controls: Confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. (ISO 27001) Can be divided into: Secrecy: Protecting business data Privacy: Protecting personal data Anonymity: Hide who is engaging in what actions Main threat: Information theft Controls: Encryption, Access Control, Perimeter defence e.g. Encryption Firewalls Awareness UiO Spring 2015 L01 - INF3510 Information Security 37 UiO Spring 2015 L01 - INF3510 Information Security 38 Integrity Data Integrity: The property that data has not been altered or destroyed in an unauthorized manner. (X.800) System Integrity: The property of safeguarding the accuracy and completeness of assets (ISO 27001) Main threat: Data and system corruption Controls: Cryptographic integrity check, Encryption, Access Control Perimeter defence Audit Verification of systems and applications Availability The property of being accessible and usable upon demand by an authorized entity. (ISO 27001) Main threat: Denial of Service (DoS) The prevention of authorized access to resources or the delaying of time critical operations Controls: Redundancy of resources, traffic filtering, incident recovery, international collaboration and policing UiO Spring 2015 L01 - INF3510 Information Security 39 UiO Spring 2015 L01 - INF3510 Information Security 40
11 Authenticity (Security Service) The CIA properties are quite general security services. Other security services are often mentioned. is very important, with various types: Taxonomy of User authentication: The process of verifying a claimed identity of a (legal) user when accessing a system or an application. Organisation authentication: The process of verifying a claimed identity of a (legal) organisation in an online interaction/session System authentication (peer entity authentication): The corroboration (verification) that a peer entity (system) in an association (connection, session) is the one claimed (X.800). Data origin authentication (message authentication): The corroboration (verification) that the source of data received is as claimed (X.800). User passwords, tokens, OTP, biometrics, PKI Entity Organisation crypto protocols, e.g. TLS, PKI System crypto protocols, e.g. IPSec, PKI Data MAC, DigSig&PKI UiO Spring 2015 L01 - INF3510 Information Security 41 UiO Spring 2015 L01 - INF3510 Information Security 42 User Identification and System Host A Host B Identification Who you claim to be Method: (user)name, biometrics User authentication Prove that you are the one you claim to be Main threat: Unauthorized access Controls: Passwords, Personal cryptographic tokens, OTP generators, etc. Biometrics Id cards Cryptographic security/authentication protocols Alice Wonderland D.O.B Cheshire, England Student nr University of Oxford token Goal Establish the correct identity of remote hosts Main threat: Network intrusion Masquerading attacks, Replay attacks (D)DOS attacks Controls: Cryptographic authentication protocols based on hashing and encryption algorithms Examples: TLS, VPN, IPSEC UiO Spring 2015 L01 - INF3510 Information Security 43 UiO Spring 2015 L01 - INF3510 Information Security 44
12 Data Origin (Message authentication) Goal: Recipient of a message (i.e. data) can verify the correctness of claimed sender identity But 3 rd party may not be able to verify it Main threats: False transactions False messages and data Controls: Encryption with shared secret key MAC (Message Code) Security protocols Digital signature with private key Electronic signature, i.e. any digital evidence UiO Spring 2015 L01 - INF3510 Information Security 45 Non-Repudiation (Security Service) Goal: Making sending and receiving messages undeniable through unforgible evidence. Non-repudiation of origin: proof that data was sent. Non-repudiation of delivery: proof that data was received. NB: imprecise interpretation: Has a message been received and read just because it has been delivered to your mailbox? Main threats: Sender falsely denying having sent message Recipient falsely denying having received message Control: digital signature Cryptographic evidence that can be confirmed by a third party Data origin authentication and non-repudiation are similar Data origin authentication only provides proof to recipient party Non-repudiation also provides proof to third parties UiO Spring 2015 L01 - INF3510 Information Security 46 Accountability (Security Service) Goal: Trace action to a specific user and hold them responsible Audit information must be selectively kept and protected so that actions affecting security can be traced to the responsible party (TCSEC/Orange Book) Main threats: Inability to identify source of incident Inability to make attacker responsible Controls: Identify and authenticate users Log all system events (audit) Electronic signature Non-repudiation based on digital signature Forensics Authorization Authorization is to specify access and usage permissions for entities, roles or processes Authorization policy normally defined by humans Issued by an authority within the domain/organisation Authority can be delegated Implemented in IT systems as configuration/policy Beware of confusion (also in Harris text book): Correct: Harris 6 th ed. p.161: "A user may be authorized to access the files on the file server, but until she is properly identified and authenticated, those resources are out of reach." Wrong: Harris 6 th ed. p.161: "If the system determines that the subject may access the resource, it authorizes the subject". UiO Spring 2015 L01 - INF3510 Information Security 47 UiO Spring 2015 L01 - INF3510 Information Security 48
13 Identity and Access Management (IAM) Phases Confusion about Authorization Configuration phase Registration Provisioning Authorization Identification Operation phase Access control Claim identity Prove claimed identity Are you authorized? Termination phase Revoke authorization Deactivate credentials De-registration The term authorization is often wrongly used in the sense of access control e.g. If the system determines that the subject may access the resource, it authorizes the subject (e.g. Harris 6 th ed. p.161) Common in text books and technical specifications (RFC 2196 ) Cisco AAA Server (, Authorization and Accounting) Wrong usage of authorization leads to absurd situations: 1. You get somebody s password, and uses it to access account 2. Login screen gives warning: Only authorized users may access this system 3. You are caught and taken to court 4. You say: The text book at university said I was authorized if the system granted access, which it did, so I was authorized UiO Spring 2015 L01 - INF3510 Information Security 49 UiO Spring 2015 L01 - INF3510 Information Security 50 Identity and Access Management Concepts System Owner Domain registration 1 User 2 provisioning Identity Provider System Owner 3 authorization policy 7 decision PAP PDP request User 6 authentication function request 4 + log-on Id Cr request resource & access type End of lecture access 8 PEP 5 System resource Access control function PAP: Policy Administration Point PEP: Policy Enforcement Point Registration PDP: Policy Decision Point IdP: Identity Provider Operations UiO Spring 2015 L01 - INF3510 Information Security 51
INF3510 Information Security. Lecture 01: - Course info - Basic concepts in information security
INF3510 Information Security Lecture 01: - Course info - Basic concepts in information security University of Oslo, spring 2015 Course information Course organization Prerequisites Syllabus and text book
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
INF3510 Information Security University of Oslo Spring 2011. Lecture 1 Course Information Background and Basic Concepts
INF3510 Information Security University of Oslo Spring 2011 Lecture 1 Course Information Background and Basic Concepts Course information Scope of information security Syllabus and text book Lecture plan
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
Human Factors in Information Security
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
CSC 474 Information Systems Security
CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning [email protected] (919)513-4457 Office: Room
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Certification for Information System Security Professional (CISSP)
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun
CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: [email protected]
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
The Value of Information Security Certifications
The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO
Policy: Information Security Audit Program Issued by the CTO Policy No: WVOT-PO1008 Issue Date: 08.01.09 Revised: Page 1 of 12 1.0 PURPOSE The West Virginia Office of Technology (WVOT) will maintain an
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
Network Security. Network Security Hierarchy. CISCO Security Curriculum
Network Security Network Security Hierarchy Material elaborat dupa: CISCO Security Curriculum Kenny Paterson s Lectures for: M.Sc. in Information Security, Royal Holloway, University of London 1 Objectives
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations
HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards
FIDO Trust Requirements
FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
An expert s tips for cracking tough CISSP exam
35 / 83 Chapter 6 An expert s tips for cracking tough CISSP exam Rahul Kokcha, an experienced instructor for CISSP explains how to prepare for the CISSP exam, what are important topics, and what you do
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Information Security for the Rest of Us
Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
INF3510 Information Security University of Oslo Spring 2012. Lecture 8 Identity and Access Management. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2012 Lecture 8 Identity and Access Management Audun Jøsang Outline Identity and access management concepts Identity management models Access control
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
Tenzing Security Services and Best Practices
Tenzing Security Services and Best Practices OVERVIEW Security is about managing risks and threats to your environment. The most basic security protection is achieved by pro-actively monitoring and intercepting
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
