Computer and Network Security in Higher Education
|
|
|
- Clement Carson
- 10 years ago
- Views:
Transcription
1 Chapter 3 Conducting a Risk Analysis Randy Marchany Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass, A Wiley Company. Reprinted by permission of John Wiley & Sons, Inc. For personal use only. Not for distribution.
2 3 Conducting a Risk Analysis Randy Marchany Acommon response to computer security professionals efforts to secure enterprise and desktop systems is I don t have anything on my computer that a hacker would want. This statement is true most of the time. Most hackers really don t want your data; rather, they want your computer. They want to use your system to attack other sites. The distributed denial-of-service (DDOS) attacks of the past years are an example of this strategy. Hackers often compromise systems not to steal the data that reside on them but to use the systems to attack other systems. An early DDOS attack involved close to 300 systems used to attack a single site. It s interesting to note that the hackers had complete access to any file on these systems and they could have modified or deleted any files, yet they didn t. How do the hackers get in despite efforts to keep them out? In 1998, the Internet Audit Project (Siri, 1998) scanned more than 36 million Internet hosts for common and publicized security vulnerabilities. The scan exposed large numbers of vulnerabilities (more than 700,000) to the most common security threats. These open points of penetration immediately threaten the security of their affiliated networks, putting many millions of systems in commercial, academic, government and military organizations at a high compromise risk (Siri, 1998, unnumbered). Every vulnerability discovered by the scan could have been eliminated by 31
3 32 COMPUTER AND NETWORK SECURITY IN HIGHER EDUCATION proper application of patches, or updates to the software that are typically supplied by the vendor. This little test, which took only twenty-one days to run and tested for only eighteen vulnerabilities, showed just how easy it would be to compromise systems in critical industries and the devastating effect that these compromises could have. Ensuring that a university s assets are not vulnerable becomes the primary role of the institution s security officer, system administrators, and internal audit group. Cooperation among the three groups is essential. Risk Analysis A critical activity for the security officer, auditor, and IT department to undertake is an institutional risk analysis. Conducting a risk analysis is a process of identifying assets, the risks to those assets, and procedures to mitigate the risks to the assets. Individual users and their institutions need to understand what risks exist in their information asset environment and how those risks can be reduced or even eliminated. Embarking on a process to complete such an analysis or self-assessment is critical in today s advanced technological world. The process is one that will benefit both the individual department and the institution as a whole. When conducted in partnership by IT and institutional auditors, a risk analysis can not only provide valuable information to the university but also will carry the weight of a united perspective when it comes time to make decisions about acceptable levels of risk and to secure funding and implement the plan for mitigating risks. Many good models are available that detail how to perform a risk management study, including how to classify information technology assets and risks. These models provide a foundation for doing more than just avoiding risk they all provide recommended approaches for identifying weaknesses in the systems, processes for making decisions about how to protect assets, and ways to help evaluate and answer the question, How much security is enough?
4 Conducting a Risk Analysis 33 Selected Models The National Infrastructure Protection Center (NIPC) released a document entitled Risk Management: An Essential Guide to Protecting Critical Assets in November This document discusses a fivestep risk assessment model: (1) asset assessment, (2) threat assessment, (3) vulnerability assessment, (4) risk assessment, and (5) identification of countermeasure options. The guide includes some examples in tabular format of each of the assessment phases. These examples are useful in helping an organization perform a risk management study. The model is discussed in detail in The Risk Assessment: Five Steps to Better Risk Management Decisions (Jopeck, 1997). Mohammad H. Qayoumi (2002) wrote an excellent guide on continuity planning titled Mission Continuity Planning: Strategically Assessing and Planning for Threats to Operations. This booklet was published by the National Association of College and Business Officers (NACUBO) and contains excellent information on risk management, disaster preparedness, business continuity planning, calculating system reliability, and addressing facilities-related risks. NACUBO also released a document called Developing a Strategy to Manage Enterprisewide Risk in Higher Education (Cassidy and others, 2001). This publication presents a definition of risk, the drivers of risk, advice on implementing a risk management plan, and how to advance the risk management agenda to management. The National Institute of Science and Technology (NIST) published Security Self-Assessment Guide for Information Technology Systems (Swanson, 2001). The guide contains a questionnaire template that can be adapted to your site s needs. The guide is most useful for federal government agencies, since it uses NIST s federal IT security assessment framework, which standardizes five levels of security criteria. Case Study: The Star Project In the late 1990s, a newspaper article about a cyberattack on a university in Virginia prompted a member of the Virginia Tech Board of
5 34 COMPUTER AND NETWORK SECURITY IN HIGHER EDUCATION Visitors to ask whether a similar attack could happen at Virginia Tech. How vulnerable were Virginia Tech s networks and systems to outside intrusion? This question led to a directive to form a committee to investigate and report on the status of the IT organization s assets. This became known as the STAR (Security Targeting and Analysis of Risks) process (security.vt.edu/playitsafe/index.phtml). The Information Security Committee was made up of department managers and system and network administrators. This blend of management and technical people was critical in balancing the contrasting viewpoints of security versus access. The prejudices and perspectives of the members resulted in a healthy exchange of viewpoints. The committee was charged with identifying and prioritizing information systems assets, associating risks with those assets, and listing controls that could be applied to mitigate the risks. Although the committee did not initially consider assets outside of the IT organization, in later iterations of the process departmental assets were evaluated. Identifying Assets The committee first compiled a list of division assets and categorized them as critical, essential, or normal assets. An asset was deemed critical if the loss of its function would result in the university ceasing to function as a business entity. An essential asset would cripple the university s capacity to function, but it could survive for a week or so without the asset. All effort would be made to restore the function within a week. An asset was deemed normal if its loss resulted in some inconvenience. The interesting result of this process was that no one wanted to classify his or her asset as normal. The committee avoided trying to classify which components of the network were critical, such as the routers, cable plant, hubs, and switches, by treating the entire network as a critical asset. (These individual network components would have been considered if this had been an audit of the network group.) A sample asset list and classifications are shown in Table 3.1.
6 Conducting a Risk Analysis 35 Table 3.1. Sample Classification System for Assets and Their Priority. Description of Asset Machine Name Priority a Authentication-authorization services host1.dept.edu C DNS name server host2.dept.edu C Physical plant, environmental servers host3.dept.edu C DNS name server (secondary) host4.dept.edu C Network (routers, servers, modems, etc.) host5.dept.edu C HR database server host6.dept.edu E Payroll server host7.dept.edu E Production control servers host8.dept.edu N Client systems (Win95/NT, Macs) host9.dept.edu N Database group crash-and-burn system host10.dept.edu N a C, critical element; E, essential; N, normal. Once a list of assets had been determined and categorized, the committee prioritized them by criticality to the division s operation. This was done by committee vote. Table 3.2 illustrates a weight matrix that was used to record votes for the assets. The committee votes are recorded in the individual cells, and the total votes for the asset are recorded in the bottom row. The example in Table 3.2 shows that the top three critical assets are the network, the physical plant and environmental servers, and the primary DNS server. Assets were prioritized by voting whether asset 1 was more critical than asset 2, and so forth. Determining Risk The committee followed a similar procedure for listing and categorizing the risks to the assets. Four criteria were used in determining a critical risk: (1) It would be extremely expensive to fix, (2) it would result in the loss of a critical service, (3) it would result in heavy, negative publicity, especially outside the organization, and (4) it had a high probability of occurring. Table 3.3 shows the critical risks as determined by the committee. A voting procedure similar to that used to prioritize the assets was used by the committee to prioritize
7 36 COMPUTER AND NETWORK SECURITY IN HIGHER EDUCATION Table 3.2. Sample Asset Weight Matrix to Prioritize IT Assets. A/A DNS(p) Plant DNS(s) Network HR Authentication authorization services DNS name server (primary) Physical plant, environmental servers DNS name server (secondary) Network (routers, servers, modems, etc.) HR database server TOTAL VOTES the risks. The end result of this entire process was an asset matrix listing every IT asset, an asset weight matrix rank ordering the criticality of the asset, a risk matrix listing every risk, and a risk weight matrix for the set of risks associated with the asset. Once a final list of assets and risks was developed, the team members mapped the rank-ordered assets and risks into a single matrix. This risk-asset matrix provided guidance as to the order in which each asset and risk were to be examined. Finally, the STAR team created a controls matrix that listed all of the possible controls that would mitigate the risks listed in the risk matrix. The team did not prioritize these controls; instead it created another risk-asset-controls matrix that listed the possible controls for a particular risk to a particular asset.
8 Conducting a Risk Analysis 37 Table 3.3. Sample Risk Classification Listing Critical Risks Only. Risk Clear text Description Clear text data moving among our systems and networks Client system access control Construction mistakes Key person dependency Natural disaster Passwords Physical security (IS internal) Physical security (IS external) Spoofing Data disclosure System administration practices Operational policies Control of access to distributed desktop client workstations Service interruptions during construction, renovations Too few staff to cover critical responsibilities Flood, earthquake, fire, etc. Selection, security, number of passwords, etc. IS private space (machine room, wire closets, offices, etc.) IS public space (laboratories, classrooms, library, etc.) and IP address forgery or circumvention Inappropriate acquisition or release of university data Adequacy of knowledge, skills, and procedures Appropriate strategies, directions, and policies
9 38 COMPUTER AND NETWORK SECURITY IN HIGHER EDUCATION Applying Controls Risk and asset matrices formed a blueprint for applying controls to the assets. The STAR team developed a set of compliance matrices that corresponds with the risks and assets listed earlier. This set of compliance matrices contains detailed line-item actions to verify that a particular task has been performed. A color-coding system is used to denote success or failure of a particular line item. This provides an auditor, security manager, or system administrator with a quick way to verify the compliance of an asset with the risk analysis process. Figure 3.1 shows a portion of the original overall compliance matrix, which is similar to the executive summary portion of an audit. It lists an overall rating for each critical asset. The risks are listed along the y-axis and the assets are listed along the x-axis. There is a corresponding set of matrices associated with each risk line item that contains more detailed information on the tests required to determine the vulnerability of an asset to the particular Figure 3.1. Summary Compliance Matrix Showing the Overall State of an Asset in Relation to Identified Risks. OVERALL IS ASSETS Site 1 Site 2 Site 3 Site 4 OK UNIX security risks System admin. practices Data disclosure Passwords Key person dependency Physical security OK FAIL OK OK OK CAUTION CAUTION OK OK FAIL FUTURE FUTURE CAUTION CAUTION OK FUTURE
10 Conducting a Risk Analysis 39 risk. A set of detailed commands needed to check the system is at the lowest level. The test procedure is as follows: 1. Use the detailed command list to perform the test. 2. Record the results in the detailed compliance matrix. 3. Compute an overall score for an asset (70 percent OK means an OK score at this level, for example) and record the score in the overall compliance matrix. The matrices allow Virginia Tech staff to track progress in addressing the risks over the long term. They provide a foundation on which to apply the scarce resources to perform a cost-benefit analysis of the assets and risks. After conducting analyses with the IT organization, the STAR team took the matrices and the process and made them available to every department in the university. STAR provided the common risks set to departments and encouraged each to add its own risks. The end result is that each department can now look at the risks it has in common with others and at its own unique risks about which it needs to be concerned. STAR Today The STAR methodology is still in use at Virginia Tech today, and it continues to be refined, even after seven years. It took the committee about one year of meeting once every two weeks to develop and refine the methodology. Subsequent risk analysis projects are much less time consuming, since the basic matrices now exist. In 2002 the STAR team completed the seventh iteration of the risk analysis process in one month. Support from university leadership has also been critical. Securing the approval of the top management at Virginia Tech ensured a 98 percent on-time return rate of the individual departmental risk analysis reports. This simply confirms
11 40 COMPUTER AND NETWORK SECURITY IN HIGHER EDUCATION what every security office has known: management buy-in of the process is critical to its success. Although STAR s main purpose is to provide a repeatable method for prioritizing assets and risks to those assets, one of the major modifications to the process during the last few years revolves around asset classification. Initially, computer systems or the network were identified as assets, but the team is now moving toward identifying business processes as assets. This, in turn, creates a layered approach to asset classification. For example, at the top level, student registration is identified as a business process and asset. It comprises (1) departments that manage the business process, that is, the registrar; (2) the software management group that manages the software that runs the student registration process, for example, SCT s Banner software; (3) the information systems group that manages the machines that run the Banner software; and finally, (4) the actual machines that run the Banner software. The STAR methodology can then be used to prioritize assets at any level of this tree. Virginia Tech is now using this layered approach to help identify key business processes, thereby in turn helping design a better disaster recovery procedure. An additional benefit to layering the assets is being able to see the dependencies that a particular asset needs to accomplish its mission. The checklists used to measure compliance have also changed, and Virginia Tech has adapted the STAR methodology to use the Center for Internet Security s (CIS) ( security benchmarks (replacing the colored matrices) to measure how a computer system complies with local security requirements. The CIS benchmarks are free and prove to be an excellent resource for various UNIX, Windows, and router platforms. The CIS benchmarks provide a straightforward method of configuring a system according to the STAR analysis. CIS benchmarks are applied to the critical assets. The CIS toolkit provides a scanning tool that rates the asset based on the benchmark. This score presents a target value for auditors.
12 Conducting a Risk Analysis 41 Figure 3.2 shows the output screen of the CIS Windows 2000 scanning tool. When the necessary services are enabled on a critical asset, the scanning tool reports a score for each service. This scoring method provides an auditor with a simple way of checking an asset for compliance. If the asset scores a 7.3 or higher, then its local policies have been set in compliance with the risk analysis. A lower score requires justification from the asset system administrators or owners. It does not mean the system is less secure; instead, it generally means that something required the system security policies to Figure 3.2. Sample CIS Scanning Tool Output.
13 42 COMPUTER AND NETWORK SECURITY IN HIGHER EDUCATION be relaxed. In most cases, vendor software requirements are the primary reason that system security policies are relaxed. Conclusion Performing a risk analysis is a necessary first step in assuring the security of campus technology resources. A partnership between IT and auditors on campus acknowledges the common goal of these two groups and can be effective in garnering support for implementing plans to mitigate risks. Many resources are available to help institutions perform a risk management study. Institutions should select a method to identify and categorize assets and the risks to those assets, and use a simple, replicable process, such as the STAR process, to prioritize assets and risks. The matrices and scoring tools described or referenced in this chapter provide a quick way for auditors to determine compliance with the institution s standards. The same matrices give systems administrators the status of security controls installed on a particular asset. As an example, the STAR technique simplifies standard risk analysis methods and makes it easier for all departments to provide meaningful information to the institution. As with other risk management activities, conducting a security risk analysis is not a one-time event. Audits should be performed regularly to ensure compliance with critical security measures and with plans for mitigating risk. Periodic evaluations of the entire IT security program are necessary to maintain agreed-on levels of security. References Cassidy, D., and others. Developing a Strategy to Manage Enterprisewide Risk in Higher Education. Washington, D.C.: National Association of College and Business Officers, Jopeck, E. The Risk Assessment: Five Steps to Better Risk Management Decisions. Security Awareness Bulletin, 1997, 3 97, 5 15.
14 Conducting a Risk Analysis 43 National Infrastructure Protection Center. Risk Management: An Essential Guide to Protecting Critical Assets. [ risk_management11-02.pdf]. Nov Qayoumi, M. H. Mission Continuity Planning: Strategically Assessing and Planning for Threats to Operations. Washington, D.C.: National Association of College and University Business Officers, Siri, L. Internet Audit Project. [ Swanson, M. Security Self-Assessment Guide for Information Technology Systems, NIST Special Publication Washington, DC. National Institute of Standards and Technology. [csrc.nist.gov/publications/nistpubs/800-26/ sp pdf]. Nov
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
[Insert Company Logo]
[Insert Company Logo] Business Continuity and Disaster Recovery Planning (BCDRP) Manual 1 Table of Contents Critical Business Information 4 Business Continuity and Disaster Recover Planning (BCDRP) Personnel
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY
ASSESSABLE UNIT: ENTER THE NAME OF YOUR ASSESSABLE UNIT HERE BUSINESS PROCESS: ENTER YOUR BUSINESS PROCESS HERE BANNER INDEX CODE: ENTER YOUR BANNER INDEX CODE HERE Risk: If you monitor the activity and
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
Department of Public Utilities Customer Information System (BANNER)
REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
External Penetration Assessment and Database Access Review
External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Continuity Planning and Disaster Recovery
Responsible Officer: AVP - Information Technology Services & UC Chief Information Officer Responsible Office: IT - Information Technology Services Issuance Date: 7/27/2007 Effective Date: 7/27/2007 Scope:
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Computer and Network Security in Higher Education
Daniel Updegrove and Gordon Wishon Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass,
IT Security Risks & Trends
IT Security Risks & Trends Key Threats to All Businesses 1 1 What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Business Continuity / Disaster Recovery Context
Capability Business Continuity / Disaster Recovery Context What is Business Continuity? The Business Continuity Program Life Cycle Copyright: Virtual Corporation, 1994 2006 Modified U.S. DoD Graphic Normal
Disaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
ASDI Full Audit Guideline Federal Aviation Administration
ASDI Full Audit Guideline Federal Aviation Administration Purpose of this Document This document is intended to provide guidance on the contents of the Aircraft Situation Display to Industry (ASDI) full
Management (CSM) Capability
CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Hengtian Information Security White Paper
Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1 Agenda The Proposed Rule
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives
AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
ISAAC Risk Assessment Training
ISAAC Risk Assessment Training v2013 Information Technology Risk Management 1 Agenda Why Assess? Information Security Standards Risk Assessment Process Using ISAAC Information Technology Risk Management
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Incident Response Plan for PCI-DSS Compliance
Incident Response Plan for PCI-DSS Compliance City of Monroe, Georgia Information Technology Division Finance Department I. Policy The City of Monroe Information Technology Administrator is responsible
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Corrective Actions to Address the Disaster Recovery Material Weakness Are Being Completed June 27, 2011 Report Number: 2011-20-060 This report has cleared
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
HIPAA Risk Analysis By: Matthew R. Johnson GIAC HIPAA Security Certificate (GHSC) Practical Assignment Version 1.0 Date: April 12, 2004
HIPAA Risk Analysis By: Matthew R. Johnson GIAC HIPAA Security Certificate (GHSC) Practical Assignment Version 1.0 Date: April 12, 2004 Table of Contents Abstract... 3 Assignment 1 Define the Environment...
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Information Security Office
Information Security Office SAMPLE Risk Assessment and Compliance Report Restricted Information (RI). Submitted to: SAMPLE CISO CIO CTO Submitted: SAMPLE DATE Prepared by: SAMPLE Appendices attached: Appendix
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
Footprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
