ASD CYBER SECURITY BULLETIN

Size: px
Start display at page:

Download "ASD CYBER SECURITY BULLETIN"

Transcription

1 ASD CYBER SECURITY BULLETIN Prevention is better than a Cure While I was enjoying my leave on a Queensland beach, it seemed that every time I picked up a newspaper or caught up on happenings online, there was coverage of a major compromise of personally identifiable information due to malicious cyber activity. These types of security breaches can not only result in loss of revenue, but a loss of trust among consumers, partners and suppliers, as well as damage to an organisation s reputation for years to come. The financial costs of a serious compromise can far outweigh any cyber security budget. With the move to bring more government services online, the need to secure personally identifiable information has never been more important. As organisations grapple with combating the expanding sophistication of malicious cyber activities, delivering resilience and adaptability is a challenge for many. Reflecting back on 2013, ASD s Top 4 mitigation strategies have continued to prove their effectiveness as the best option for your agency in mitigating targeted cyber intrusions, based on the incidents that the Cyber Security Operations Centre responds to. Issue #13 June 2014 achieved gradually, firstly on workstations of users who are most likely to be targeted by cyber intrusions, and then implementing them on all workstations and servers. Once this is achieved, organisations can selectively implement additional mitigation strategies to address security gaps until an acceptable level of residual risk is reached. Of course, not all networks are the same - but to help in ensuring that networks have strong, consistent and effective defences, ASD publishes a range of technical advisories for different audiences. The recent release of the ASD Protect The Top 4 in a Linux Environment is an excellent example of how ASD recognises the practicalities of implementing the mitigation strategies across different operating environments, and offers effective advice without compromising on security or offering a lite solution will be a big year for cyber security in Australia with the Australian Cyber Security Centre set to become operational by the end of the year. My staff and I look forward to partnering with you as we work together to defeat the cyber threat. I have recently been asked whether there is a softened, lite version of the Top 4. The simple answer to this is that there is no Diet Top 4. Based on ASD s technical and operational experience in cyber security, the Top 4 remain the most effective bang for buck defence when implemented as a package. This has been supported by research from Microsoft and the United States SANS Institute, which has published a revised version of the 20 Critical Controls following the release of ASD s updated 2014 Strategies to Mitigate Targeted Cyber Intrusions. Like all aspects of security, there is a cost - but agencies need to weigh up the risks and address their own security culture. The Top 4 should form an integral part of every agency s cyber security foundation. Implementing the Top 4 mitigation strategies can be Joe Franzi is the Assistant Secretary for Cyber Security at the Australian Signals Directorate. Inside this issue Prevention is better than a Cure...1 Days of Systems Past...2 Harder, Better, Stronger...3 Watch that Webmail...4 The Top 4 for Penguins...5 Issue #13 June 2014 Page 1

2 Days of Systems Past You know that when a product vendor wants you to stop using a version of their product, it s time to get out. On Tuesday 8 April 2014, support ended for Windows XP SP3 and Office ASD ranks application patching and operating system patching as the second and third most effective strategies to mitigate targeted cyber intrusions, as listed in ASD s Strategies to Mitigate Targeted Cyber Intrusions. These two patching strategies recommend using the latest versions of software, such as Microsoft Office, and operating systems, including timely patching for vulnerabilities. When a developer ceases to provide support for a product, updates and patches to address critical vulnerabilities are no longer made available. When new vulnerabilities are discovered, they can be easily exploited due to the lack of software support. After 8 April 2014, Microsoft will not be providing updates, security patches or technical support for Windows XP, Office 2003, Windows Server 2003, Exchange 2003 and Sharepoint It is recommended that any organisation still using any of these products should upgrade to supported software as soon as practically possible. Some Australian Government agencies will have been unable to fully migrate away from Windows XP prior to its end of support date. ASD has published guidance to OnSecure on mitigations and minimising the risk for XP. So while XP has served a lot of organisations well, it s time is now over and agencies need to upgrade sooner rather than later. Further Guidance ASD message and advice on minimising risk for end of support for XP: Advice from Microsoft on the end of support for XP: Issue #13 June 2014 Page 2

3 Harder, Better, Stronger Passwords. We all have them. Lots of them. Passphrases are common authentication techniques which enable an agency to verify the stated identity of a user. However, given the everincreasing processing power of home computers, the length and complexity requirements for passphrases will also continue to increase. This is necessary to provide agencies with adequate protection against basic techniques such as brute force attacks. A brute force attack involves the attacker systematically checking every possible passphrase until the correct one is found. A simple six-letter password can be brute forced in minutes by software freely available on the internet. The requirements for passphrase length and complexity have been increased in the current version of the Australian Government Information Security Manual (ISM), released in March What can be done? Continually increasing the length and complexity requirements for your system users can be cumbersome. Users tend to have difficulty remembering long, complex passphrases without writing them down. Agencies can consider implementing additional authentication measures, such as multi-factor authentication. This decreases the reliance on long, complex passphrases. Multi-factor authentication means choosing two or more of the following authentication methods: y something one knows, such as a passphrase or response to a challenge or question y something one has, such as a passport, physical token or identity card y something one is, such as biometric data, like a fingerprint or face geometry. The theft of user credentials can make breaking into the most well defended networks a walk in the park. Strengthening agency passphrase policy is critical to ensuring your agency is a hard target for malicious intruders. The ISM is available from the ASD website. Issue #13 June 2014 Page 3

4 Watch that Webmail Web-based , or webmail, is a convenient way to communicate from anywhere, at any time. Webmail is that is accessed through a web browser such as Windows Live Mail, Gmail, Yahoo or provided by Internet Service Providers. However, government agencies using webmail for business purposes should be aware of the security risks of this approach. Government agencies have their own security measures for handling and other sensitive communications. Employees using a webmail account for sensitive business information will not have these same protections for their communications. This increases the risk of unauthorised disclosure and in some cases, this may even breach legislative requirements. It is also important to note that agencies may not have full control over your data when using a webmail service. Service providers are subject to the laws and regulations of the country where they are based. This may involve a number of countries, depending on where the data is stored and processed and where it transits. Foreign governments may have the right to lawfully access the data held by the webmail service without user knowledge. It may also be difficult to sanitise or clean up data spills in the case of a data leak. ASD has seen malicious s that have been sent to government agencies also forwarded onto users personal webmail accounts, which can lead to the compromise of the device used to access the webmail such as a personal mobile phone or tablet. In some cases, the device may already be compromised (for example, if you are using a public terminal or a device running outdated and vulnerable software.) If you and your colleagues become accustomed to seeing webmail used for business, there is the danger that it will be more difficult to detect the commonly used intrusion technique of spoofing. This is where a webmail account is set up to appear as if it is a legitimate user, to trick the receiver into opening the and clicking on a malicious link or attachment. If your agency does allow webmail use, it is recommended that you: use your agency s service rather than webmail when accessing from your work network maintain separate accounts for work and personal purposes send only publicly available, unclassified government information over webmail never send sensitive or classified information ensure that your webmail software is up to date with anti-virus installed use a strong and unique password or multi-factor authentication to enhance the security of your account. More information is available at the ASD website in the Protect publication Implications of Using Webmail for Government Business. Issue #13 June 2014 Page 4

5 4 p o T e h 4 Top The T for Penguins s n i u g n e P r fo In today s environment, most organisation workstations use Microsoft Windows or Linux operating systems (or a combination of both). Implementation of the Top 4 in a Linux environment presents different challenges to a Windows operating system, particularly application whitelisting. ASD has released a new document to assist organisations in implementing the Top 4 on Linux. This advice complements ASD s previously published guidance document Implementing the Top 4 in a Windows Environment. continued on page 6 Issue #13 June 2014 Page 5

6 The Top 4 for Penguins Application whitelisting on Linux can be very difficult to implement due to the high amount of resources required for development and maintenance. While administrators can use the AppLocker or Software Restriction Policies on Windows-based workstations, equivalent mechanisms are not present in either the core Linux kernel or other popular Linux distributions. However, this does not mean that it can t be done. ASD is focussed on technical solutions that are achievable, effective and practical in the government environment. As a result, ASD s The Top 4 in a Linux Environment provides not only guidance on how to implement application whitelisting on Linux, but also technical advice on how to harden a Linux machine without it, while still ensuring a comparable level of security to a Top 4-hardened Windows machine. These include commercial solutions, SELinux or AppArmour policies, and the use of custom Linux security modules. The document also provides technical guidance on patching applications, patching the operating system and restricting the number of users with administrative privileges on Linux. The Top 4 in a Linux Environment is available on ASD s website asd.gov.au with a suite of publications designed to assist in implementation of the Top 4 strategies. The Top 4 Strategies to Mitigate Targeted Cyber Intrusions has been shown to prevent at least 85% of cyber intrusion techniques when implemented as a package. These strategies are based on those intrusion techniques which target the workstation. The Top 4 strategies are: 1. Application whitelisting 2. Patching applications 3. Patching operating systems 4. Restricting administrator privileges ASD Contact Details For non-urgent and general ICT security enquiries: asd.assist@defence.gov.au For urgent and operational government ICT security matters: Phone: 1300 CYBER1 ( , select 1 at any time, or Complete the cyber security incident report form at Issue #13 June 2014 Page 6

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Malicious Email Mitigation Strategy Guide

Malicious Email Mitigation Strategy Guide CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly

More information

Additional Security Considerations and Controls for Virtual Private Networks

Additional Security Considerations and Controls for Virtual Private Networks CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES

More information

Top 4 Strategies to Mitigate Targeted Cyber Intrusions

Top 4 Strategies to Mitigate Targeted Cyber Intrusions CYBER SECURITY OPERATIONS CENTRE JULY 2013 Top 4 Strategies to Mitigate Targeted Cyber Intrusions Mandatory Requirement Explained Including technical implementation advice for a Windows environment CONTENTS

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details CYBER SECURITY OPERATIONS CENTRE 13/2011 21 July 2011 Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details INTRODUCTION 1. This document provides further information regarding DSD s list

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work

More information

I will cover. Cyber Security and other recent performance audits. Report # 8 Why this audit? Background. Audit objective.

I will cover. Cyber Security and other recent performance audits. Report # 8 Why this audit? Background. Audit objective. I will cover. Report # 8 Security of information communications technology infrastructure Cyber Security and other recent performance audits Report # 9 TMAG: compliance with the National Standards for

More information

Cyber security the facts

Cyber security the facts Cyber security the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present and every business is at risk. Australia s security and intelligence agencies

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details CYBER SECURITY OPERATIONS CENTRE FEBRUARY 2014 Strategies to Mitigate Targeted Cyber Intrusions Details Table of Contents Introduction... 1 Stages of a Targeted Cyber Intrusion... 1 Sensitive Information...

More information

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits CYBER CRIME & SECURITY SURVEY REPORT 2013 Foreword Malicious cyber activity is on the increase and every business with an online presence is at risk. This may involve the loss of critical data and consumer

More information

Australian Government Information Security Manual EXECUTIVE COMPANION

Australian Government Information Security Manual EXECUTIVE COMPANION 2015 Australian Government Information Security Manual EXECUTIVE COMPANION 2015 Australian Government Information Security Manual EXECUTIVE COMPANION Commonwealth of Australia 2015 All material presented

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

V ISA SECURITY ALERT 13 November 2015

V ISA SECURITY ALERT 13 November 2015 V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,

More information

foresightconsulting.com.au

foresightconsulting.com.au Mr. James Kavanagh National Security Officer Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 02 March 2015 Microsoft Office 365 IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2014 All material presented in this publication

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION Financial fraud is a serious risk with damaging

More information

New Zealand National Cyber Security Centre

New Zealand National Cyber Security Centre Unclassified New Zealand National Cyber Security Centre Application Whitelisting With Microsoft Applocker June 2012 V1.0.5 Application Whitelisting with Microsoft Applocker Cyber Security Plan As outlined

More information

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors Microsoft Confidential for internal use only Wall Street Journal, JP Morgan, Lockheed, Bushehr nuclear

More information

How users bypass your security!

How users bypass your security! How users bypass your security! IT Days Security issues 20 th November 2014 Tom Leclerc, Security Consultant SAGS - Security Audits and Governance Services, a Telindus Security department Classification:

More information

Microsoft Office Macro Security

Microsoft Office Macro Security Microsoft Macro Security March 2016 Introduction 1. Microsoft applications can execute macros to automate routine tasks. However, macros can contain malicious code resulting in unauthorised access to sensitive

More information

t +61 2 6100 7714 a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e info@foresightconsulting.com.au foresightconsulting.com.

t +61 2 6100 7714 a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e info@foresightconsulting.com.au foresightconsulting.com. e info@ Mr. James Kavanagh Chief Security Advisor Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 17 September 2014 Microsoft Azure IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

The Defence Signals Directorate Top 4 Mitigations Against Cyber Intrusion. An Implementation Guide for Project Managers

The Defence Signals Directorate Top 4 Mitigations Against Cyber Intrusion. An Implementation Guide for Project Managers The Defence Signals Directorate Top 4 Mitigations Against Cyber Intrusion An Implementation Guide for Project Managers Contents Introduction 1 Understanding Cyber Intrusion 2 The DSD Top 35 Mitigations

More information

Information security management guidelines

Information security management guidelines Information security management guidelines Agency cyber security responsibilities when transacting online with the public Version 2.1 Approved July 2014 Amended April 2015 Commonwealth of Australia 2013

More information

Guide to Vulnerability Management for Small Companies

Guide to Vulnerability Management for Small Companies University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...

More information

End of Support Should Not End Your Business. Challenge of Legacy Systems

End of Support Should Not End Your Business. Challenge of Legacy Systems End of Support Should Not End Your Business When software vendors announce a product end-of-life (EOL), customers typically have 24 to 30 months to plan and execute their migration strategies. This period

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department

More information

Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats. Windows XP Support Has Ended Why It Concerns You

Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats. Windows XP Support Has Ended Why It Concerns You Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats Windows XP Support Has Ended Why It Concerns You Protect Detect Respond 1 02 Windows XP support has ended Windows XP support

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2015 All material presented in this publication

More information

CYBER SECURITY OPERATIONS CENTRE OCTOBER 2012. Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details

CYBER SECURITY OPERATIONS CENTRE OCTOBER 2012. Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details CYBER SECURITY OPERATIONS CENTRE OCTOBER 2012 Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details Introduction 1. This document provides further information regarding DSD s list of strategies

More information

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction

More information

Information System Audit Guide

Information System Audit Guide Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE

More information

Cyber Security in a Nuclear Context

Cyber Security in a Nuclear Context Cyber Security in a Nuclear Context Mitchell Hewes & Nick Howarth UNCLASSIFIED Who are we? Our Facilities Synchrotron Accelerators Cyclotron OPAL Lucas Heights Campus Some Considerations We have an interesting

More information

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Network Security Audit. Vulnerability Assessment (VA)

Network Security Audit. Vulnerability Assessment (VA) Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.

More information

Cybersecurity as a Risk Factor in doing business

Cybersecurity as a Risk Factor in doing business Cybersecurity as a Risk Factor in doing business 1 Data is the new raw material of business Economist UK, 2013. In trying to defend everything he defended nothing Frederick the Great, Prussia 1712-86.

More information

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.

More information

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Setting up Outgoing Mail (SMTP) Server of CS LoxInfo

Setting up Outgoing Mail (SMTP) Server of CS LoxInfo Setting up Outgoing Mail (SMTP) Server of CS LoxInfo Acknowledgement Blocking a direct connection from e mail client or server to mail server which located in foreign countries will cause you unable to

More information

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days) Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an

More information

Two-Factor Authentication and Swivel

Two-Factor Authentication and Swivel Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide

More information

Cyber Security Incident Reporting Scheme

Cyber Security Incident Reporting Scheme OCIO/G4.12a ISMF Guideline 12a Cyber Security Incident Reporting Scheme BACKGROUND Reporting cyber security incidents is a source of intelligence information that assists in the development of a greater

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

G-Cloud Definition of Services Security Penetration Testing

G-Cloud Definition of Services Security Penetration Testing G-Cloud Definition of Services Security Penetration Testing Commercial in Confidence G-Cloud Services An Overview Inner Security is a leading CREST registered information security services provider. We

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

ISMF Guideline 18. OCIO/G4.18 Government guideline on cyber security. Endpoint protection (incl. smartphones and portable devices) BACKGROUND

ISMF Guideline 18. OCIO/G4.18 Government guideline on cyber security. Endpoint protection (incl. smartphones and portable devices) BACKGROUND OCIO/G4.18 ISMF Guideline 18 Endpoint protection (incl. smartphones and portable devices) BACKGROUND The SA Government s ICT services environment is essential for delivering services within government

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations CYBER SECURITY OPERATIONS CENTRE APRIL 2011, UPDATED SEPTEMBER 2012 Cloud Computing Security Considerations Table of Contents Cloud Computing Security Considerations... 3 Overview of Cloud Computing...

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS BeyondTrust Solution Overview October 2014 Table of Contents Introduction... 3 BeyondTrust Solutions... 6 The BeyondInsight

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

Critical Security Controls

Critical Security Controls Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter The Critical Security Controls The Critical Security

More information

Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security

Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security 4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 Department

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

IT Compliance Volume II

IT Compliance Volume II The Essentials Series IT Compliance Volume II sponsored by by Rebecca Herold Addressing Web-Based Access and Authentication Challenges by Rebecca Herold, CISSP, CISM, CISA, FLMI February 2007 Incidents

More information

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e B e s t P r a c t i c e s G u i d e It s a fact of business today: because of the economy, most organizations are asking everyone, including the IT staff, to do more with less. But tight budgets and the

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense : Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Windows XP Support stops on 8. April 2014

Windows XP Support stops on 8. April 2014 Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats 1 Windows XP Support stops on 8. April 2014 Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats

More information

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Check Point and Security Best Practices. December 2013 Presented by David Rawle Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques

More information

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk VoiceTrust Whitepaper Employee Password Reset for the Enterprise IT Helpdesk Table of Contents Introduction: The State of the IT Helpdesk...3 Challenge #1: Password-Related Helpdesk Costs are Out of Control...

More information

The Protection and Security of Electronic Information Held by Australian Government Agencies

The Protection and Security of Electronic Information Held by Australian Government Agencies The Auditor-General Audit Report No.33 2010 11 Performance Audit The Protection and Security of Electronic Information Held by Australian Government Agencies Australian National Audit Office Commonwealth

More information

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Department of Employment Security Policy for External Service Providers and Users

Department of Employment Security Policy for External Service Providers and Users Department of Employment Security Policy for External Service Providers and Users employment.gov.au DOCUMENT PARTICULARS Document name Classification Department of Employment Security Policy for External

More information

Overview TECHIS60441. Carry out security testing activities

Overview TECHIS60441. Carry out security testing activities Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. 2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by

More information

Presented by: Mike Morris and Jim Rumph

Presented by: Mike Morris and Jim Rumph Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network

More information

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01 How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot

More information

Seven Strategies to Defend ICSs

Seven Strategies to Defend ICSs INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take

More information