The CORAS method for security risk analysis
|
|
|
- Myles Rogers
- 10 years ago
- Views:
Transcription
1 The CORAS method for security risk analysis ESSCaSS 2008 NODES Tutorial 28/8-08 Heidi E. I. Dahl SINTEF
2 Norwegian research group with 2000 employees from 55 different countries More than 90 percent of our earnings come from contracts for industry and the public sector, and from project grants from the Research Council of Norway Research divisions Health Research Technology and Society Materials and Chemistry Building and Infrastructure Marine Petroleum and Energy SINTEF Foundation Limited companies 2
3 SINTEF > Cooperative and Trusted Systems > Quality and Security Technology Model based security analysis Model driven security architecture Trust management Tools for analysis and documentation Empirical research on methods and tools to build secure systems Security risk analysis CORAS Method Language (textual syntax, semantics, calculus) Usability and Security 3
4 Outline Security risk analysis An example driven introduction to the CORAS method CORAS resources 4
5 The example A PhD student is worried about losing the work she has done on her thesis The Big Corporation funding her work is worried that sensitive business information will reach its competitors They decide to do a security risk analysis to determine whether the risk level is acceptable 5
6 Why do we analyse security risks? asset, something of value vulnerability reduced risk level threat constitutes a security risk we need to introduce security mechanisms 6
7 75 % of all sensitive data losses are caused by human error Taking Action to Protect Sensitive Data, IT Policy Compliance Group,
8 SINTEF researcher Analyst BC thesis advisor Ann Decision maker System user Security expert BC security expert System developer 8
9 The CORAS method Model based method for security risk analysis that provides a customized graphical language for threat and risk modelling a diagram editor detailed guidelines explaining how the language should be used to capture and model relevant information during the various stages of the security analysis CORAS has been developed through both empirical investigations and a series of industrial field studies (projects financed by the Norwegian Research Council and the EU) is based on international standards for risk management (e.g. AS/NZS 4360:2004) 9
10 The standard analysis process Establish the context Identify risks Analyse risks Evaluate risks Treat risks from the Australian Risk Management Standard AS/NZS 4360:
11 Elements of the analysis Vulnerability Analysis context Treatment Threat Target Asset Risk Unwanted incident Likelihood Consequence 11
12 The CORAS method 12
13 Introductory meeting Introduce the analysis method Gather information from the client about the target of analysis and the desired focus and scope. Decision makers Technical expertise (optional) 13
14 Introductory meeting Agenda A short introduction to CORAS The client presents the target of analysis A discussion of the focus and scope of the analysis 14
15 Client s presentation of target Ann Onymous PhD student in Computer Science Uses data from Big Corporation (BC) Works in her office at the university and at home At the university Shares an office with another PhD student Works on laptop in docking station Wired internet At home Lives with her boyfriend Brings her laptop home with her or uses shared computer Wireless internet 15
16 Focus and scope The focus of the analysis is data security, in terms of business sensitive data from BC and the PhD thesis itself. The scope is data security at home and at work. We do not consider risks involved in transporting the data. 16
17 Output from the introductory meeting Informal description of the target Necessary system documentation Contract between Ann and BC IT security guidelines at the university Security measures in place at home and at the university A sketch of Ann s work habits A short statement of the focus and scope of the analysis 17
18 High-level analysis Ensure that the analysts and the client have a common understanding of the target of analysis Determine the assets that will focus the analysis Get an overview of the client s initial concerns Decision makers Technical expertise 18
19 High-level analysis Agenda The analysts presents a description of the target of analysis The client corrects errors and misunderstandings Asset identification High-level analysis 19
20 System description Home computer Check Internet browsing Trying new software File sharing Boyfriend Ann Writing PhD thesis 20
21 Asset identification We use an asset diagram to model the parties involved in the analysis, which assets they want to protect, and whether harm to one asset may cause harm to any of the others. 21
22 Asset diagram 22
23 High-level analysis Who/what is the cause? Ann Laptop Hacker How? What may happen? What does it harm? Deletes the thesis by mistake Crashes and the last hours work is lost Gains access to business sensitive information and sells it to competitor What makes this possible? No backup Old laptop Lack of security at home 23
24 Output from the high-level analysis meeting Asset diagram Preliminary list of unwanted incidents 24
25 Approval Arrive at an approved target description Decide which risk levels are acceptable for each asset Decision makers (important) Technical expertise 25
26 Approval Agenda The target description and assets are approved by the client Consequence scales Likelihood scale Risk evaluation criteria 26
27 Likelihood scale Likelihood 1 rarely 2 sometimes 3 regularly 4 often 27
28 Consequence scale Consequence (PhD thesis and Business sensitive information) 1 harmless 2 moderate 3 serious 4 catastrophic 28
29 Risk matrix Risk matrix (PhD thesis and Business sensitive information) c \ l rarely sometimes regularly often harmless moderate serious catastrophic 29
30 Output from the approval meeting Approved target description Likelihood and consequence scales Risk matrices 30
31 Risk identification Create an overview of the risk picture, i.e. how threats may exploit vulnerabilities to cause unwanted incidents that cause damage to the assets. Technical expertise Users 31
32 Risk identification Agenda Model risks in threat diagrams 32
33 Modelling risks in threat diagrams We use threat diagrams to model threats, what we fear they may do to our assets, how it happens and which vulnerabilities makes this possible. Threat (deliberate) Threat scenario [likelihood] Threat (accidental) Threat (non-human) Unwanted incident [likelihood] Vulnerability Asset 33
34 What are the threats? Hacker Business sensitive information Ann PhD thesis Home computer 34
35 What do we fear will happen? Competitor uses business sensitive information strategically Hacker Business sensitive information is published in national newspaper Business sensitive information Ann Home computer All work on thesis is lost A day s worth of work on the thesis is lost PhD thesis 35
36 How does it happen? Ann s boyfriend Hacker Ann Home computer Boyfriend runs file sharing application on home computer Ann installs software that contains spyware on her laptop Boyfriend shares folder with business sensitive information Hacker gains access to Ann s laptop Computer components fails Spyware crashes computer Hacker copies all data from laptop Hacker deletes all files in My documents Competitor uses business sensitive information strategically Business sensitive information is published in national newspaper All work on thesis is lost A day s worth of work on the thesis is lost Business sensitive information PhD thesis 36
37 Which vulnerabilities makes this possible? 37
38 Risk estimation Estimate the current risk level Decision makers Technical expertise Users 38
39 Risk estimation Agenda Assign likelihoods to each unwanted incident Assign consequences to each impact relation 39
40 Assigning likelihoods and consequences Ann s boyfriend Hacker Ann Home computer Boyfriend runs file sharing application on home computer Unaware of spyware No firewall Old components Complicated file sharing preferences Ann installs software that contains spyware on her laptop Boyfriend shares folder with business sensitive information Hacker gains access to Ann s laptop Computer components fails Spyware crashes computer Hacker copies all data from laptop Hacker deletes all files in My documents No backup of thesis files Competitor uses business sensitive information strategically Business sensitive information is published in national newspaper All work on thesis is lost A day s worth of work on the thesis is lost Business sensitive information PhD thesis 40
41 Assigning likelihoods and consequences Hacker deletes all files in My documents [rarely] All work on thesis is lost [sometimes] 4 Spyware crashes computer [sometimes] No backup of thesis files A day s worth of work on the thesis is lost [sometimes] 2 PhD thesis Computer components fails [rarely] 41
42 Completed threat diagram 42
43 Risk evaluation Evaluating which risks are acceptable and which are not. Give an overview of the risks. Decision makers 43
44 Risk evaluation Agenda Enter the risks in the risk matrix Summarize the risk picture in risk diagrams 44
45 Are the risks acceptable? Risk matrix (PhD thesis and Business sensitive information) harmless c \ l rarely sometimes regularly often moderate serious BS info is published in national newspaper catastrophic Competitor uses BS info strategically A day s worth of work on the thesis is lost All work on thesis is lost 45
46 Summarizing the risk picture We use risk diagrams to show how threats pose risks to the assets. 46
47 Risk diagrams 47
48 Risk treatment Getting an overview of potential treatments of the unacceptable risks. Decision makers Technical expertise Users 48
49 Risk treatment Agenda Add treatments to the threat diagrams Add treatments to risk diagrams 49
50 Adding treatments to the threat diagrams Threat (deliberate) Threat (accidental) Threat (non-human) Vulnerability Asset Threat scenario [likelihood] Unwanted incident [likelihood] Risk Treatment scenario 50
51 What can we do to reduce the risks to an acceptable level? 51
52 Treatment overview diagram Install firewall Ann s boyfriend Hacker R1: Competitor uses business sensitive information strategically Business sensitive information Restrict sharing on home computer Ann Home computer Spyware awareness course R3: All work on thesis is lost PhD thesis Do regular backups of thesis files 52
53 Executive summary The focus of the security risk analysis is data security, in terms of business sensitive data from BC and the PhD thesis itself. The scope is data security at home and at work. We do not consider risks involved in transporting the data. The unacceptable risks that were uncovered were R1: Competitor uses business sensitive information strategically R3: All work on thesis is lost In order to reduce the risks to an acceptable level, the following treatments were suggested: Restrict sharing on home computer Install firewall Spyware awareness course Do regular backups of thesis files 53
54 Resources: Downloads The CORAS diagram editor The CORAS icons (Visio stencil, PNG, SVG) Publications: Folker den Braber, Ida Hogganvik, Mass Soldal Lund, Ketil Stølen, and Fredrik Vraalsen. Model-based security analysis in seven steps a guided tour to the CORAS method. BT Technology Journal, 25(1): , Ida Hogganvik. A graphical approach to security risk analysis. PhD thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Heidi E. I. Dahl and Ida Hogganvik and Ketil Stølen. Structured semantics for the CORAS security risk modelling language. Technical report STF07 A970, SINTEF Information and Communication Technology,
55 Questions? Heidi E. I. Dahl
The CORAS Model-based Method for Security Risk Analysis
The CORAS Model-based Method for Security Risk Analysis Folker den Braber, Gyrd Brændeland, Heidi E. I. Dahl, Iselin Engan, Ida Hogganvik, Mass S. Lund, Bjørnar Solhaug, Ketil Stølen, Fredrik Vraalsen
Risk-driven Security Testing versus Test-driven Security Risk Analysis
Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan 1,2 Supervised by: Ketil Stølen 1,2 1 Department of Informatics, University of Oslo, PO Box 1080 Blindern, N-0316 Oslo,
Security Analysis Part I: Basics
Security Analysis Part I: Basics Ketil Stølen, SINTEF & UiO October 2, 2015 1 Objectives for Lectures on Security Analysis Classify security concepts Introduce, motivate and explain a basic apparatus for
Effort-dependent technologies for multi-domain risk-based security testing (DIAMONDS 1 )
Page 1 27/09/2010 Effort-dependent technologies for multi-domain risk-based security testing (DIAMONDS 1 ) As computerized systems, services and infrastructures have become an important part of society,
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
INFORMATION SECURITY RISK ANALYSIS A MATRIX-BASED APPROACH
INFORMATION SECURITY RISK ANALYSIS A MATRIX-BASED APPROACH Sanjay Goel University at Albany, School of Business University at Albany, SUNY BA30b, 400 Washington Avenue Albany, NY 2222 Tel: (58) 442 4925,
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Working Practices for Protecting Electronic Information
Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that
THE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
System Administrator Guide
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
DOMAIN SPECIFIC SIMULATION LANGUAGE FOR IT RISK ASSESSMENT
DOMAIN SPECIFIC SIMULATION LANGUAGE FOR IT RISK ASSESSMENT Artis Teilans, Arnis Kleins, Ojars Krasts Exigen Services 29A Sergeja Eizensteina street LV 1079, Riga, Latvia E-mail: [email protected]
Personal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
Endpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
How to Justify Your Security Assessment Budget
2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients Network Test Labs Inc. Head Office 170 422 Richards Street, Vancouver BC, V6B 2Z4 E-mail: [email protected]
44-76 mix 2. Exam Code:MB5-705. Exam Name: Managing Microsoft Dynamics Implementations Exam
44-76 mix 2 Number: MB5-705 Passing Score: 800 Time Limit: 120 min File Version: 22.5 http://www.gratisexam.com/ Exam Code:MB5-705 Exam Name: Managing Microsoft Dynamics Implementations Exam Exam A QUESTION
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
Towards Definition of Secure Business Processes
Towards Definition of Secure Business Processes Olga Altuhhova, Raimundas Matulevičius and Naved Ahmed 1 Institute of Computer Science, University of Tartu J. Liivi 2, 50409 Tartu, Estonia [email protected],
ARCHITECTURE DESIGN OF SECURITY SYSTEM
Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO
E MARITIME SAFETY COMMITTEE 95th session Agenda item 4 MSC 95/4/1 5 March 2015 Original: ENGLISH MEASURES TO ENHANCE MARITIME SECURITY Industry guidelines on cyber security on board ships Submitted by
Workstation Management
Workstation Management Service Description Version 1.00 Effective Date: 07/01/2012 Purpose This Service Description is applicable to Workstation Management services offered by MN.IT Services and described
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
Computer Maintenance Guide
Computer Maintenance Guide Do you get days where you feel like tearing your hair out, because your Pc will not operate in the manner which it did when you first bought it. Believe me you are not alone,
Faculty/Fellows Computer Orientation at DCRI FREQUENTLY ASKED QUESTIONS
Faculty/Fellows Computer Orientation at DCRI FREUENTLY SKED UESTIONS Denotes a cost that will be charged to your departmental fund code. Why do I have to sign the DCRI Secure System Usage document and
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW
VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW Len Kleinman Director ATO Trusted Access Australian Taxation Office Session ID: DAS-W01 Session Classification: General Interest What
Connect Smart for Business SME TOOLKIT
Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New
Risk Management: Coordinated activities to direct and control an organisation with regard to risk.
POLICY CG01 RISK MANAGEMENT Document Control Statement This Policy is maintained by the Governance and Organisational Strategy. Any printed copy may not be up to date and you are advised to check the electronic
Penetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Combining Security Risk Assessment and Security Testing Based on Standards
Combining Security Risk Assessment and Security Testing Based on Standards Jürgen Großmann 1(&) and Fredrik Seehusen 2 1 Fraunhofer FOKUS, Berlin, Germany [email protected] 2 SINTEF
Temple university. Auditing a business continuity management BCM. November, 2015
Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
Design Authorization Systems Using SecureUML
Design Authorization Systems Using SecureUML By Rudolph Araujo & Shanit Gupta, Foundstone Professional Services February 2005 Overview This whitepaper describes the Foundstone SecureUML template, a Microsoft
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
An approach for evaluating methods for risk and vulnerability assessments
Risk, Reliability and Societal Safety Aven & Vinnem (eds) 2007 Taylor & Francis Group, London, ISBN 978-0-415-44786-7 An approach for evaluating methods for risk and vulnerability assessments E. Ford IRIS,
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
Security Alarm Systems
Security Alarm Systems Monitored alarm systems offer clients peace of mind as they activate on intrusion or tampering at the property and ensure any security alarm will have an appropriate response. However,
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations Golnaz Elahi 1, Eric Yu 2, and Nicola Zannone 3 1 Department of Computer Science, University of Toronto
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
Stellenbosch University. Information Security Regulations
Stellenbosch University Information Security Regulations 1. Preamble 1.1. Information Security is a component of the Risk structure and procedures of the University. 1.2. Stellenbosch University has an
Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4
Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4 Table of Contents Introduction... 3 What is a HotSpot Printer?... 3 Understanding the HotSpot System Architecture... 4 Reliability of HotSpot Service...
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Maintaining, Updating, and Protecting Windows 7
Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center
Dealing with risk. Why is risk management important?
Why is risk management important? Things don t always go according to plan: a company s sales manager changes employment in the middle of an important project, a packaging machine breaks down, a lathe
Oracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
Librarian. Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER
Librarian Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER Contents Overview 3 File Storage and Management 4 The Library 4 Folders, Files and File History 4
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Data Handling in University Business Impact Analysis ( BIA ) Agenda Overview Terminologies Performing
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
MEDICAL DEVICE Cybersecurity.
MEDICAL DEVICE Cybersecurity. 2 MEDICAL DEVICE CYBERSECURITY Introduction Wireless technology and the software in medical devices have greatly increased healthcare providers abilities to efficiently and
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
Preparing Your Personal Computer to Connect to the VPN
Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer
TDDC88 Lab 2 Unified Modeling Language (UML)
TDDC88 Lab 2 Unified Modeling Language (UML) Introduction What is UML? Unified Modeling Language (UML) is a collection of graphical notations, which are defined using a single meta-model. UML can be used
THREAT MODELLING FOR WEB SERVICES BASED WEB APPLICATIONS
THREAT MODELLING FOR WEB SERVICES BASED WEB APPLICATIONS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit Leuven, Celestijnenlaan 200A, 3001
PROTECTING YOUR DIGITAL LIFE
PROTECTING YOUR DIGITAL LIFE Table of Contents What is a Digital Life?... 1 Missing: Five Years of Photos... 2 Are Your Files Safe?... 3 Everyday Risks... 4 Real People, Real Loss... 5 Forgot to Back Up?
The Importance of a Data Backup and Disaster Recovery Plan
A The Importance of a Data Backup and Disaster Recovery Plan 1 There s just one thing as sickening to a business owner as experiencing a loss of data, which is knowing that loss was completely avoidable
Capstone Project Putting It All Together
Capstone Project Putting It All Together Objectives Understand the steps involved in planning and implementing a technical solution for a small business. Gather relevant information to help devise a technical
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
