CYBER SECURITY CONTROLS CHECKLIST
|
|
|
- Alexandrina Hopkins
- 10 years ago
- Views:
Transcription
1 CYBER SECURITY CONTROLS CHECKLIST This is a simple checklist designed to identify and document the existence and status for a recommended basic set of cyber security controls (policies, standards, and procedures) for an organization. Security controls are designed to reduce and/or eliminate the identified threat/vulnerabilities that place an organization at risk. PERSONELL SECURITY Yes No 1. Does your staff wear ID badges? 2. Is a current picture part of the ID badge? 3. Are authorized access levels and type (employee, contractor, visitor) identified on the Badge? 4. Do you check the credentials of external contractors? 5. Do you have policies addressing background checks for employees and contractors? 6. Do you have a process for effectively cutting off access to facilities and information systems when an employee/contractor terminates employment? PHYSICAL SECURITY Yes No 7. Do you have policies and procedures that address allowing authorized and limiting unauthorized physical access to electronic information systems and the facilities in which they are housed? 8. Do your policies and procedures specify the methods used to control physical access to your secure areas, such as door locks, access control systems, security officers, or video monitoring? 9. Is access to your computing area controlled (single point, reception or security desk, sign-in/sign-out log, temporary/visitor badges)?
2 10. Are visitors escorted into and out of controlled areas? 11. Are your PCs inaccessible to unauthorized users (e.g. located away from public areas)? 12. Is your computing area and equipment physically secured? 13. Are there procedures in place to prevent computers from being left in a loggedon state, however briefly? 14. Are screens automatically locked after 10 minutes idle? 15. Are modems set to Auto-Answer OFF (not to accept incoming calls)? 16. Do you have procedures for protecting data during equipment repairs? 17. Do you have policies covering laptop security (e.g. cable lock or secure storage)? 18. Do you have an emergency evacuation plan and is it current? 19. Does your plan identify areas and facilities that need to be sealed off immediately in case of an emergency? 20. Are key personnel aware of which areas and facilities need to be sealed off and how? ACCOUNT AND PASSWORD MANAGEMENT Yes No 21. Do you have policies and standards covering electronic authentication, authorization, and access control of personnel and resources to your information systems, applications and data? 22. Do you ensure that only authorized personnel have access to your computers? 23. Do you require and enforce appropriate passwords? 24. Are your passwords secure (not easy to guess, regularly changed, no use of temporary or default passwords)? 25. Are you computers set up so others cannot view staff entering passwords? CONFIDENTIALITY OF SENSITIVE DATA Yes No 26. Do you classify your data, identifying sensitive data versus non sensitive?
3 27. Are you exercising responsibilities to protect sensitive data under your control? 28. Is the most valuable or sensitive data encrypted? 29. Do you have a policy for identifying the retention of information (both hard and soft copies)? 30. Do you have procedures in place to deal with credit card information? 31. Do you have procedures covering the management of personal private information? 32. Is there a process for creating retrievable back up and archival copies of critical information? 33. Do you have procedures for disposing of waste material? 34. Is waste paper binned or shredded? 35. Is your shred bin locked at all times? 36. Do your policies for disposing of old computer equipment protect against loss of data (e.g.. by reading old disks and hard drives)? 37. Do your disposal procedures identify appropriate technologies and methods for making hardware and electronic media unusable and inaccessible (such as shredding CDs and DVDs, electronically wiping drives, burning tapes) etc.)? DISASTER RECOVERY Yes No 38. Do you have a current business continuity plan? 39. Is there a process for creating retrievable back up and archival copies of critical information? 40. Do you have an emergency/incident management communications plan? 41. Do you have a procedure for notifying authorities in the case of a disaster or security incident? 42. Does your procedure identify who should be contacted, including contact information? 43. Is the contact information sorted and identified by incident type? 44. Does your procedure identify who should make the contacts?
4 45. Have you identified who will speak to the press/public in the case of an emergency or an incident? 46. Does your communications plan cover internal communications with your employees and their families? 47. Can emergency procedures be appropriately implemented, as needed, by those responsible? SECURITY AWARENESS AND EDUCATION Yes No 48. Are you providing information about computer security to your staff? 49. Do you provide training on a regular recurring basis? 50. Are employees taught to be alert to possible security breaches? 51. Are your employees taught about keeping their passwords secure? 52. Are your employees able to identify and protect classified data, including paper documents, removable media, and electronic documents? 53. Does your awareness and education plan teach proper methods for managing credit card data (PCI standards) and personal private information (Social security numbers, names, addresses, phone numbers, etc.)? COMPLIANCE AND AUDIT Yes No 54. Do you review and revise your security documents, such as: policies, standards, procedures, and guidelines, on a regular basis? 55. Do you audit your processes and procedures for compliance with established policies and standards? 56. Do you test your disaster plans on a regular basis? 57. Does management regularly review lists of individuals with physical access to sensitive facilities or electronic access to information systems? Checklist Response Analysis For each question that is marked No, carefully review its applicability to your organization. Implementing or improving controls decreases potential exposure to threats/vulnerabilities that may seriously impact the ability to successfully operate.
5 CYBER SECURITY THREAT/VULNERABILITY ASSESSMENT A threat is the potential for a person or a thing to exercise (accidentally trigger or intentionally exploit) a flaw or weaknesses (vulnerability) within an organization. There are several types of threats that my occur within an information system or operating environment Threats are usually grouped into general categories such as natural, human, and environmental, for example: NATURAL THREATS Storm damage (e.g., flood) Fire Lightning strikes Tornado HUMAN THREATS Computer abuse Unauthorized access to Privacy Act and proprietary information Terrorism Sabotage or vandalism System tampering Spoofing Fraud Negligence or human error ENVIRONMENTAL THREATS Impersonation and social engineering Theft Hacking Falsified data Long-term power failure Chemical leakage Pollution The desired outcome of identifying and reviewing (assessing) threats and vulnerabilities is determining potential and actual risks to the organization. Risk is a combination of factors or events (threats and vulnerabilities) that, if they occur, may have an adverse impact on the organizations. Risk is established by considering the potential impact and likelihood of a vulnerability being exploited by a threat. Risk only exists when threats have the capability of triggering or exploiting vulnerabilities. The following formula is used to determine a risk score: Risk = x Likelihood For this assessment, numeric rating scales are used to establish impact potential and likelihood probability. IMPACT SCALE LIKELIHOOD SCALE 1. is negligible 0. Unlikely to occur 2. Effect is minor, major agency operations are not affected 3. Organization operations are unavailable for a certain amount of time, costs are incurred. Public/customer confidence is minimally affected 4. Significant loss of operations, significant impact on pubic/customer confidence 1. Likely to occur less than once per year 2. Likely to occur once per year 3. Likely to occur once per month
6 IMPACT SCALE 5. Effect is disastrous, systems are down for an extended period of time, systems need to be rebuilt and data replaced 6. Effect is catastrophic, critical systems are offline for an extended period; data are lost or irreparably corrupted; public health and safety are affected LIKELIHOOD SCALE 4. Likely to occur once per week 5. Likely to occur daily When determining impact, consider the value of the resources at risk, both in terms of inherent (replacement) value and the importance of the resources (criticality) to the organization s successful operation. Factors influencing likelihood include: threat capability, frequency of threat occurrence, and effectiveness of current countermeasures (security controls). Threats caused by humans are capable of significantly impairing the ability for an organization to operate effectively. Human threats sources include: SOURCE Insiders: General contractors and subcontractors Former employees: Unauthorized users: SOURCE DESCRIPTION Employees, owners, stock holders, etc. Cleaning crew, developers, technical support personnel, and computer and telephone service repair crew Employees who have retired, resigned, or were terminated Computer criminals, terrorists, and intruders (hackers and crackers) who attempt to access agency/enterprise resources. Finally, use the following table to determine and understand the potential criticality (risk level) of each threat/vulnerability based on the calculated risk value. SCORE RISK LEVEL RISK OCCURRENCE RESULT Risk Occurrence may result in significant loss of major tangible assets, information, or information resources. May significantly disrupt the organization s operations or seriously harm its reputation Medium Risk Occurrence may result in some loss of tangible assets, information, or information resources. May disrupt or harm the organization s operation or reputation. For example, authorized users aren t able to access supportive data for several days Low Risk Occurrence may result in minimal loss of tangible assets, information, or information resources. May adversely affect the organization s operation or reputation. For example, authorized users aren t granted access to supportive data for an hour.
7 CYBER SECURITY THREAT/VULNERABILITY ASSESSMENT HUMAN THREATS ( x ) 1. Human Error Accidental destruction, modification, disclosure, or incorrect classification of information Ignorance: inadequate security awareness, lack of security guidelines, lack of proper documentation, lack of knowledge Workload: Too many or too few system administrators, highly pressured users Users may inadvertently give information on security weaknesses to attackers Incorrect system configuration Security policy not adequate Security policy not enforced Security analysis may have omitted something important or be wrong. 2. Dishonesty: Fraud, theft, embezzlement, selling of confidential agency information 3. Attacks by social engineering Attackers may use telephone to impersonate employees to persuade users/administrators to give user name/passwords/modem numbers, etc. Attackers may persuade users to execute Trojan Horse programs 4. Abuse of privileges/trust GENERAL THREATS 1. Unauthorized use of open computers/laptops 2. Mixing of test and production data or environments 3. Introduction of unauthorized software or hardware ( x )
8 4. Time bombs: Software programmed to damage a system on a certain date 5. Operating system design errors: Certain systems were not designed to be highly secure 6. Protocol design errors: Certain protocols were not designed to be highly secure. Protocol weaknesses in TCP/IP can result in: Source routing, DNS spoofing, TCP sequence guessing, unauthorized access Hijacked sessions and authentication session/transaction replay, data is changed or copied during transmission Denial of service, due to ICMP bombing, TCP-SYN flooding, large PING packets, etc. 7. Logic bomb: Software programmed to damage a system under certain conditions 8. Viruses in programs, documents, attachments IDENTIFICATION AUTHORIZATION THREATS ( x ) 1. Attack programs masquerading as normal programs (Trojan horses). 2. Attack hardware masquerading as normal commercial hardware 3. External attackers masquerading as valid users or customers 4. Internal attackers masquerading as valid users or customers 5. Attackers masquerading as helpdesk/support personnel PRIVACY THREATS 1. Eavesdropping ( x ) Electromagnetic eavesdropping / Ban Eck radiation Telephone/fax eavesdropping (via clip-on telephone bugs, inductive sensors, or hacking the public telephone exchanges Network eavesdropping. Unauthorized monitoring of sensitive data crossing the internal network, unknown to the data owner Subversion of ONS to redirect or other traffic
9 Subversion of routing protocols to redirect or other traffic Radio signal eavesdropping, Rubbish eavesdropping (analyzing waste for confidential documents, etc.) INTEGRITY / ACCURACY THREATS ( x ) 1. Malicious, deliberate damage of information or information processing functions from external sources 2. Malicious, deliberate damage of information or information processing functions from internal sources 3. Deliberate modification of information ACCESS CONTROL THREATS ( x ) 1. Password cracking (access to password files, use of bad blank, default, rarely changed passwords) 2. External access to password files, and sniffing of the networks 3. Attack programs allowing external access to systems (back doors visible to external networks) 4. Attack programs allowing internal access to systems (back doors visible to internal networks) 5. Unsecured maintenance modes, developer backdoors 6. Modems easily connected, allowing uncontrollable extension of the internal network 7. Bugs in network soft are which can open unknown/unexpected security holes (holes can be exploited from external networks to gain access. This threat grows as software becomes increasingly complex) 8. Unauthorized physical access to system REPUDIATION THREAT ( x ) 1. Receivers of confidential information may refuse to acknowledge receipt 2. Senders of confidential information may refuse to acknowledge source
10 LEGAL THREATS ( x ) 1. Failure to comply with regulatory or legal requirements (ie, to protect confidentiality of employee data) 2. Liability for acts of internal users or attackers who abuse the system to perpetrate unlawful acts (ie, incitement to racism, gambling, money laundering, distribution of pornographic or violent material) 3. Liability for damages if an internal user attacks other sites. RELIABILITY OF SERVICE THREATS Total ( x ) 1. Major natural disasters, fire, smoke, water, earthquake, storms/hurricanes/tornadoes, power outages, etc 2. Minor natural disasters, of short duration, or causing little damage 3. Major human-caused disasters: war, terrorist incidents, bombs, civil disturbance, dangerous chemicals, radiological accidents, etc. 4. Equipment failure from defective hardware, cabling, or communications system. 5. Equipment failure from airborne dust, electromagnetic interference, or static electricity 6. Denial of Service: Network abuse: Misuse of routing protocols to confuse and mislead systems Server overloading (processes, swap space, memory, tmp directories, overloading services) bombing Downloading or receipt of malicious Applets, Active X controls, macros, PostScript files, etc 7. Sabotage: Malicious, deliberate damage of information or information processing functions. Physical destruction of network interface devices, cables Physical destruction of computing devices or media Destruction of electronic devices and media by electromagnetic radiation weapons (HERF Gun, EMP/T Gun)
11 Deliberate electrical overloads or shutting off electrical power Viruses and/or worms. Deletion of critical systems files Next Steps After completing a review of current security controls and along with a review and rating of potential threats/vulnerabilities, a series of actions should be determined to reduce risk (threats exploiting vulnerabilities) to and acceptable level. These actions should include putting into place missing security controls, and/or increasing the strength of existing controls. Security controls should ideally reduce and/or eliminate vulnerabilities and meet the needs of the business. Cost must be balanced against expected security benefit and risk reduction. Typically, security remediation efforts and actions will be focused on addressing identified high risk threat/vulnerabilities The following table identifies a set of remediation activities designed to focus on the commonly identified risk threats and vulnerabilities. Actions are ranked in priority order of effectiveness. Example Recommended Security Risk Remediation Actions No. Remediation Action Cost Benefit Risk 1 Develop a foundation of Security Policies, Practices and Procedures, especially in the area of Change Control 2 Establish and enforce a globally-accepted password policy 3 Address vulnerability results in order of high risk to low risk 4 Establish an Operations group facilitated discussion to improve processes and communications, and to eliminate any misunderstandings 5 Establish router configuration security standards, forming baseline practices Low Low Low Low Low 6 Harden servers on the internal network Low No. Remediation Action Cost Benefit Risk 7 More closely integrate worker termination activities between HR and IT. Incorporate newhire orientation and annual security refresher for all employees. Low to Moderate
12 No. Remediation Action Cost Benefit Risk 8 Redesign the internet perimeter, incorporating concepts of N-tier architecture and defense in depth into the redesign of the Internet perimeter and Enterprise Architecture 9 Migrate to a more centralized and integrated model of operations management, including centralized logging, event correlation, and alerting Low to Moderate Low to Moderate 10 Complete the intrusion detection infrastructure Moderate 11 Install encryption on mobile computers to protect the confidentiality and integrity of data. 12 Perform data classification to determine security levels to protect that data 13 Institute vulnerability scanning as a regular scheduled maintenance task 14 Reclassify as a mission critical application 15 Complete security staffing for the ISO Security Group 16 Complete Computer Security Incident Response Team (CSIRT) capability Moderate to Expensive Moderate to Expensive Moderate to Expensive Low Moderate Medium Expensive Moderate to Expensive
1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services
1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system
Risk Assessment Guide
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS DA-1
PUBLIC POWER CORPORATION S.A. INFORMATION TECHNOLOGY DIVISION CENTRAL SYSTEMS SUPPORT SECTION IT SYSTEMS SECURITY SUBSECTION PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:[email protected] Outline of Information Security Introduction Impact of information Need
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Data Management & Protection: Common Definitions
Data Management & Protection: Common Definitions Document Version: 5.5 Effective Date: April 4, 2007 Original Issue Date: April 4, 2007 Most Recent Revision Date: November 29, 2011 Responsible: Alan Levy,
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
CHAPTER 10: COMPUTER SECURITY AND RISKS
CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Physical Security of Remote Pilot Stations and Aircrafts (when On Ground)
Physical Security of Remote Pilot Stations and Aircrafts (when On Ground) Airbus Defence and Space / Military Aircraft / INFOSEC Juan Domingo Airbus Defence and Space INFOSEC Expert IF-G-MES84-15002 Table
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
RISK ASSESSMENT GUIDELINES
RISK ASSESSMENT GUIDELINES A Risk Assessment is a business tool used to gauge risks to the business and to assist in safeguarding against that risk by developing countermeasures and mitigation strategies.
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
PII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
Network Security and the Small Business
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Overview of computer and communications security
Overview of computer and communications security 2 1 Basic security concepts Assets Threats Security services Security mechanisms 2 Assets Logical resources Information Money (electronic) Personal data
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
