AN EXTENSIBLE FRAMEWORK FOR DATABASE SECURITY ASSESSMENT AND VISUALIZATION
|
|
|
- Meagan Stevenson
- 10 years ago
- Views:
Transcription
1 AN EXTENSIBLE FRAMEWORK FOR DATABASE SECURITY ASSESSMENT AND VISUALIZATION Tran Khanh Dang 1 ), Thieu Hoa Le 2 ), Duy Tin Truong 3 ) Abstract By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization and assessment method assists the administrators in holding a panoramic view of security over the database system as well as the detailed activity of each DBMS in the system. The present trend shows that it is obviously a new potential branch and this paper will introduce an extensible framework to build flexible database security measuring systems. The proposed framework allows metrics processing cores to be written in different programming languages and reside in various places of the system, the final result to be displayed on a variety of user-predefined reports and graphs, and it also provides a holistic view of accesses to the whole database systems. 1. Introduction The need for database security arising from the explosion of Web applications such as e-commerce, online-banking, etc. has been growing ceaselessly. The fact that core enterprise databases, the most valuable information assets of most enterprises, have been kept relatively safe for many years has now completely changed when the attackers realize they have a broad, accessible and available pipe through such applications into the databases. As a result, companies are urged to spend more budgets on improving database security mechanism by purchasing the newly-devised database protection products or by training the DBAs more advancedly. Unfortunately, those do not provide the final answer for the companies on their way seeking the safest shelter for their databases. The security managers instantly feel nervous when the board of directors ask them Are we more secure today than we were before? or How do we compare to our peers in this domain?. It is generally agreed that "You cannot control what you cannot measure and "To measure is to know" [2]. The answer to those questions might only be obtained if there is some system able to evaluate the security level of the running system and present the assessment clearly, concisely and, most importantly, visually to the administrators or the directors. Currently, there are some security products available on the market such as Guardium [5], SecureSphere [6], etc. and they do support in measuring the security level of a database management system (DBMS) within their specific standards. However they require the running system to be equipped with expensive specialized hardwares in order to operate properly. In this paper, we introduce a general extensible framework useful for implementing such a system but in the way as cheap as possible and using no specialized hardwares but the performance still remains reasonable and acceptable. That framework combines: 1,2,3 Faculty of Computer Science & Engineering, HCMC University of Technology, National University of Ho Chi Minh City, Vietnam, [email protected]
2 Database security visualization and assessment. Controlling and measuring simultaneously the security of many different DBMSs. Data auditing and analyzing. Flexibly configuring database security metrics. Complying with laws, namely data privacy acts and regulations such as SOX (Sarbanes-Oxley) [7], PCI (Payment Card Industry) [8], etc. The rest of this paper is organized as follows: Section 2 presents our proposed framework at both logical and physical layers and how the materialized system which is built on this framework will work. Section 3 elaborates on the most noticeable traits of the framework. In section 4, we discuss key points as building a system prototype with Oracle DBMS. Finally, section 5 presents concluding remarks and the future work. 2. Basic Functional Principle The framework will be discussed in more details later, but first of all, let s look at the operational principle of this-framework-based system. The system collects all necessary working information of various DBMSs from their log files, reports, etc., it then calculates the final score based on the set of database security metrics, and displays it to the user. Both the DBMSs and metrics set are identified and configured by the user beforehand. The final score is comprised of the metrics subscores. Each subscore will be multiplied by a predefined metric coefficient before being added up to the final score. The subscore, in turn, is a sum of values obtained when running its metric on the DBMSs alternately. Thus, if there are five DBMSs in figure 1, then the subscore of each metric will be the sum of five different values evaluated by multiplying the mark when performing that metric on each DBMS and the predefined DBMS s coefficient alternately. Fig. 1. Evaluate the risky level of many DBMSs When the user receives the fairly low final score which means his running system is not secured enough, he might want to find out which metric component contributes greatly to lessen the final score and hence would envisage what problem is happening. And if he is not satisfied, he will delve into that problematic metric to see which DBMS being in dangerous situation.the database security measuring system, in short, functions as a balance, putting a running system on one dish and scores on the other dish. The higher the score is, the more secure the running system is Logical Model There are four layers in figure 2, but the framework logically consists of only three upper layers. Raw data about DBMS activities are collected and confined gradually to yield the final score at the visualization module. Note that there is a Laws component in three upper layers, when laws compliance is enforced this component will ensure that the data transmitted through it to the upper layer will conform to the required laws. Figure 3 show three upper layers in more detail.
3 Fig. 2. Logical Model Fig. 3. Three upper layers in detail VISUALIZATION layer: interacts with users, receives user requests and selects suitable presentation to show the final score. Uuser utilizes Metrics Adapter to add, delete or edit metrics. Through User Request, user chooses which metrics to achieve his target of analyzing his current database environment. DB Security Evaluator then sends this request to Metric Parser to start processing and return the calculating result when completing and the former will show the final result in graphs or reports using Report-Graph Builder, to the user depends on his privilege and role identified by the laws. METRICS layer: performs user request passed from visualization layer and returns metrics calculation result to visualization layer. Metrics Parser receives user request from DB Security Evaluator and has Formatter got all the necessary data conforming to laws if required and starts performing the metrics calculation with metrics from Metrics Set and finally sends the result back to DB Security Evaluator. AUDITING layer: communicates with DBMS layer gets their raw data, refines and sends them to Metrics layer to carry out metrics calculation. The Logger will communicate with DBMSs to acquire the raw data which might have to go through Laws to ensure law compliance. When the raw data reaches Analyzer, it is refined and handed over to Formatter to reformat in some standards for Metrics layer to use later. DBMS layer is where the DBMSs reside Physical Model Seven main steps shown in figure 6 are explained thoroughly as follows. Each explanation is indexed corresponding to each step. (1) The user logs into the DB security measuring system, his identity as well as his role and privilege is verified by the system. When logging in successfully, he might use his privilege to add, delete or edit the metrics definition through a Metrics Adapter form (2) because the system s default metrics do not always satisfy user requests. Alternatively, the user enters his requests using a User Request form (3) and has the system sent his request to DB Security Evaluator module (4). This module, in turn, hands this request over to Metrics Parser(5) which will put all the coming requests into the Request Pool and process them in order of their priorities, in case it is busy performing some user request. To process one user request, Metrics Parser will first parse the request, identify the chosen metrics, the coefficient of each metric and each DBMS, the type of graph (pie chart, bar chart), the format of report, etc. On finishes parsing, it
4 will call Metrics Controller to get all the processing cores(*.dll files, web services) of those metrics. After that, it will fetch the metrics input data from Auditing Database and assure the data s laws compliance property if enforced. If such data are not available, it will have the Logger fetched them from the DBMSs (6). When all the data are ready, it will order the processing cores to perform calculating metrics and transmit the result back to the DB Security Evaluator and simultaneously save that result together with the user request in Request and Result database if he requires. This module then call Visualization module to show the final score to the user, based on his privilege and role, in the required type of graph and report (7). Note that depend on the system efficiency requirement in practice, Metrics Controller and Metrics Parser can be implemented in form of web services or modules. There might be one last question where should all these physical components reside? Our suggestion is to implement the following components: Metrics Adapter, Login, User Request, DB Security Evaluator, Visualization on the client side whilst putting Metrics Controller, Metrics Parser as well as all the database mentioned so far in one centralized server, also setting Logger, Analyzer, Formatter on the DBMSs side. 3. Prominent Features 3.1. Metrics Fig. 4 Physical Model According to Oxford s American Dictionary, a metric simply is a system or standard of measurement. Thus, it is accepted that security metrics are those measuring security or particularly how well security services are in the information system and database security metrics would be the security metrics applied in database area. Metric is the heart of the framework. From metrics comes the name database security measuring system. Without metrics, the system is defunct or no longer able to measure the security level of database environment. Detailed discussion about metrics is beyond this paper s cope. For any further metrics information, we recommend some literatures at the end of this paper. Now we will exemplify database security metric (DbSecMetric) with the metric SELECT statements for privacy sets. Privacy sets are collections of data values together forming an important privacy perspective. For example, a person s last name is not confidential, but it together with that person s driving license number and social security number is confidential. To use this metric, we must classify what kinds of data are crucial and define the corresponding privacy sets, then we calculate S - the overall number of users SELECT accesses to these privacy sets, based on the audit trails of SELECT statement and count N - the total number of database user. Let A and F be the the average frequency and final result.
5 A=S/N ; F = (Max(A, threshold) - threshold)/a Threshold might be set by the administrator s experience to imply all the acceptable frequencies falls below it. If the final result is close to 1, it indicates that the access frequency to sensitive data exceeds the frequency threshold unusually. The administrators, therefore, might consider putting effort to investigate further or take immediate preventive actions. It is not trivial to create a DbSecMetric that can truly reflect the present database state and risk level. DbSecMetric is still in its early stage and extensive research into this new area is really encouraged. Only after a long time testing the metrics on some practical DBMSs, can we assess their efficiency and effectiveness Metrics Parser The content of metrics is saved into the database using a script language. Users can create new metrics by programming with this script language. To perform metrics calculation, there needs a metrics parser which can parse the metric content to get all the essential data such as the input, output data type, where the metric processing cores are stored, etc. Besides, Metrics Parser is not directly in charge of calculating but it will call web services or.dll libraries at run time, so the metric processing cores may be written in many different programming languages and stored in many places (on web servers if they are web services). Thus, users are free to write complicated metric algorithms as well as take advantages of other system s power of calculating. Actually, this parser parses not only metric content but also user requests to get the required metrics. However the later s percentage is very small compared to the former s, hence the name Metrics Parser Visualization The system presents the final score in the most visual way, using many graphs and reports. There would be lots of types of graph such as pie chart, bar chart, line chart, etc. and lots of types of reports such as daily report, weekly report, monthly report or quarterly report and so on. The final result could also be compared with other results in a period of time if the user required as long as there are such results available in the database. 4. A System Prototype with Oracle We now present a system prototype based on such framework, and built with Oracle DBMS as an example. On Oracle side, three modules are set up. Logger communicates with Oracle to achieve log files saved by using Oracle's auditing function. Analyzer next refines those log files, taking only necessary data fields out for Metrics Core to calculate metrics. Formatter reforms data to meet XML standard, compresses and encrypts to improve the efficiency, and finally utilizes socket to transmit data to Auditing Database for later use. On the client side, five components are installed. Metrics Adapter, Login and User Request are user interactive forms, DB Security Evaluator a module and Visualization a graphical library containing many dll files. DB Security Evaluator receives user request and calls Metrics Parser to process it and Visualization library to show the final score. The library is updated automatically via network by regularly downloading dll files. Lastly, Metrics Controller and Metrics Parser are web applications set up on the same centralized server. So are all the database in figure 6. Metrics Controller receives metrics information from Metrics Adapter by webservices while Metrics Parser listens to DB Security Evaluator and gets its user request to perform. Additionally, Laws Compliance is dll files, called by Logger, Metrics Parser and DB Security Evaluator when needed. These files can also be updated via network.
6 Metrics Core is implemented as dll files on server side or web services on other computers. We are currently implementing and conducting performance evaluations of the system. 5. Conclusion and Future Work In this paper, we have introduced an extensible framework for developing a database security visually-measuring system. We started with presenting the basic functional principles of such framework then we showed the framework s tractability through the logical and physical models. Finally, we gave a system prototype with Oracle DBMS. The framework provides a practical way to build an extensible system which can evaluate simultaneously the risky levels of many different DBMSs visually through various graphs (line chart, bar char, pie chart) and flexible reports. In the future, we will take further research into solving some remaining problems: data explosion on centralized server, the impacts on DBMS s performance after installing logging components, secure and effective data transmission through compressing and encrypting. We will also add some more commonly-used metric templates to meet users demand in adapting or coordinating these templates to make a new desired metrics. References [1] T.H. Le, D.T. Truong: Database Security Visualization & Assessment, Graduation Thesis, CSE/HCMUT, 2007, (to appear). [2] A. Jaquith: Security Metrics: Replacing Fear, Uncertainty and Doubt, ISBN: , Addison-Wesley Professional, [3] R.B. Natan: Implementing Database Security and Auditing, ISBN: , Digital Press, [4] J.J. Champlain: Auditing Information Systems, 2 nd Edition, ISBN: , John Wiley & Sons, [5] Guardium web: [6] Securesphere product: [7] Sarbanes Oxley Law: [8] PCI Security Standards Council, [9] Community website for security practitioners: [10] D. Litchfield: The Database Hacker's Handbook: Defending Database Servers, ISBN: , John Wiley & Sons, [11] J.B.D. Cleman: Jeremy FairCloth. Security Log Management, ISBN: , Andrew Williams, [12] L.M. Olivia: Information Technology Security: Advice from Expert, ISBN: , Idea Group, [13] M.Bishop: Introduction to Computer Security, ISBN: , Prentice Hall PTR, [14] C. Lahti, S. Lanza, R. Peterson: Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools., ISBN-10: , Syngress, [15] D. Knox: Effective Oracle Database 10g Security by Design, ISBN-10: , McGraw-Hill Osborne Media, 2004.
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Client Overview. Engagement Situation. Key Requirements
Client Overview Our client is one of the leading providers of business intelligence systems for customers especially in BFSI space that needs intensive data analysis of huge amounts of data for their decision
Achieving Database Compliance with Sarbanes-Oxley Using Sentrigo Hedgehog
Sarbanes Oxley and Databases a Moving Target The Sarbanes-Oxley act (aka SOX ) was introduced in 2002, but for most IT organizations it is still a moving target. External auditors keep changing the methods
BUILDING OLAP TOOLS OVER LARGE DATABASES
BUILDING OLAP TOOLS OVER LARGE DATABASES Rui Oliveira, Jorge Bernardino ISEC Instituto Superior de Engenharia de Coimbra, Polytechnic Institute of Coimbra Quinta da Nora, Rua Pedro Nunes, P-3030-199 Coimbra,
White Paper. Managing Risk to Sensitive Data with SecureSphere
Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate
EMC Smarts Network Configuration Manager
EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009
Rapid Bottleneck Identification A Better Way to do Load Testing An Oracle White Paper June 2009 Rapid Bottleneck Identification A Better Way to do Load Testing. RBI combines a comprehensive understanding
MS Enterprise Library 5.0 (Logging Application Block)
International Journal of Scientific and Research Publications, Volume 4, Issue 8, August 2014 1 MS Enterprise Library 5.0 (Logging Application Block) Anubhav Tiwari * R&D Dept., Syscom Corporation Ltd.
GCE APPLIED ICT A2 COURSEWORK TIPS
GCE APPLIED ICT A2 COURSEWORK TIPS COURSEWORK TIPS A2 GCE APPLIED ICT If you are studying for the six-unit GCE Single Award or the twelve-unit Double Award, then you may study some of the following coursework
Implementing Database Security and Auditing
Implementing Database Security and Auditing A guide for DBAs, information security administrators and auditors Ron Ben Natan ELSEVIER DIGITAL PRESS Amsterdam Boston Heidelberg London New York Oxford P
The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform
The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform Technical Discussion David Churchill CEO DraftPoint Inc. The information contained in this document represents the current
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /
AlienVault for Regulatory Compliance
AlienVault for Regulatory Compliance Overview of Regulatory Compliance in Information Security As computers and networks have become more important in society they and the information they contain have
An Oracle White Paper February 2010. Rapid Bottleneck Identification - A Better Way to do Load Testing
An Oracle White Paper February 2010 Rapid Bottleneck Identification - A Better Way to do Load Testing Introduction You re ready to launch a critical Web application. Ensuring good application performance
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC
Paper 064-2014 Log entries, Events, Performance Measures, and SLAs: Understanding and Managing your SAS Deployment by Leveraging the SAS Environment Manager Data Mart ABSTRACT Robert Bonham, Gregory A.
whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance
Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance Table of Contents 3 10 Essential Steps 3 Understand the Requirements 4 Implement IT Controls that Affect your
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching
1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
Optimal Planning Software Platform Development with Cloud Computing Technology
Optimal Planning Software Platform Development with Cloud Computing Technology Anton Shabaev, Vladimir Kuznetsov, Dmitry Kositsyn Petrozavodsk State University (PetrSU) Petrozavodsk, Russia {ashabaev,
Enforcive / Enterprise Security
TM Enforcive / Enterprise Security End to End Security and Compliance Management for the IBM i Enterprise Enforcive / Enterprise Security is the single most comprehensive and easy to use security and compliance
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
Managing Special Authorities. for PCI Compliance. on the. System i
Managing Special Authorities for PCI Compliance on the System i Introduction What is a Powerful User? On IBM s System i platform, it is someone who can change objects, files and/or data, they can access
8070.S000 Application Security
8070.S000 Application Security Last Revised: 02/26/15 Final 02/26/15 REVISION CONTROL Document Title: Author: File Reference: Application Security Information Security 8070.S000_Application_Security.docx
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
System to System Interface Guide
System to System Interface Guide Overview What does this guide cover? This guide describes the interface definition to firms intending to submit their TRS Product Sales Data (PSD) or Securities Trades
Making Compliance Work for You
white paper Making Compliance Work for You with application lifecycle management Rocket bluezone.rocketsoftware.com Making Compliance Work for You with Application Lifecycle Management A White Paper by
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Educational Requirement Analysis for Information Security Professionals in Korea
Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]
What Should IS Majors Know About Regulatory Compliance?
What Should IS Majors Know About Regulatory Compliance? Working Paper Series 08-12 August 2008 Craig A. VanLengen Professor of Computer Information Systems/Accounting Northern Arizona University The W.
What s New in Centrify Server Suite 2013 Update 2
CENTRIFY SERVER SUITE 2013.2 DATA SHEET What s New in Centrify Server Suite 2013 Update 2 The new Centrify Server Suite 2013 Update 2 (2013.2) builds on the core enhancements Centrify introduced in Server
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
Online Lead Generation: Data Security Best Practices
Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Perceptive Content Security
Perceptive Content Security Best Practices Perceptive Content, Version: 7.1.x Written by: Product Knowledge, R&D Date: June 2015 2015 Perceptive Software. All rights reserved. Perceptive Software is a
Using Assurance Models in IT Audit Engagements
Using Assurance Models in IT Audit Engagements Adrian Baldwin, Yolanta Beres, Simon Shiu Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-148R1 January 29, 2008* audit, assurance, compliance,
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
The Requirements Compliance Matrix columns are defined as follows:
1 DETAILED REQUIREMENTS AND REQUIREMENTS COMPLIANCE The following s Compliance Matrices present the detailed requirements for the P&I System. Completion of all matrices is required; proposals submitted
CARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO [email protected] @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
Backup and Recovery in Laserfiche 8. White Paper
Backup and Recovery in Laserfiche 8 White Paper July 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues discussed as of the date
Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles
Oracle Health Sciences Network Security Guide Release 2.0.0.0 E50290-02 September 2015 1 Introduction The main challenge sponsors face in clinical trials is the elapsed time from the start of the protocol
Controlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
REQUIREMENTS SPECIFICATION AND MANAGEMENT. Requirements Analysis and Specification
REQUIREMENTS SPECIFICATION AND MANAGEMENT In this note we give the requirements process in a software organization, a template for the requirements document, and the process to manage changes to the requirements.
How to Improve Database Connectivity With the Data Tools Platform. John Graham (Sybase Data Tooling) Brian Payton (IBM Information Management)
How to Improve Database Connectivity With the Data Tools Platform John Graham (Sybase Data Tooling) Brian Payton (IBM Information Management) 1 Agenda DTP Overview Creating a Driver Template Creating a
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit
5 Key Questions Auditors Ask During a Database Compliance Audit White Paper Regulatory legislation is increasingly driving the expansion of formal enterprise audit processes to include information technology
Electronic Document and Record Compliance for the Life Sciences
Electronic Document and Record Compliance for the Life Sciences Kiran Thakrar, SoluSoft Inc. SoluSoft, Inc. 300 Willow Street South North Andover, MA 01845 Website: www.solu-soft.com Email: [email protected]
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
HealthCare Management system
HealthCare Management system Another Quality Solution by: Tel : (+962) 6 5515155 Fax: (+962) 6 5515156 Amman P.O. Box 926785 Jordan 11190 [email protected] www.fact.com.jo Past, Present & FACT It is no
Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc.
Database Auditing and Compliance in a Mainframe Environment Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc. Table of Contents Introduction................................................................................
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Quality Management. Lecture 12 Software quality management
Quality Management Lecture 12 Software quality management doc.dr.sc. Marko Jurčević prof.dr.sc. Roman Malarić University of Zagreb Faculty of Electrical Engineering and Computing Department of Fundamentals
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Audit Logging. Overall Goals
Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing
Bitrix Intranet Portal. Business Process Guide
Bitrix Intranet Portal Business Process Guide Introduction Bitrix Intranet Portal includes modules providing teamwork functions enabling to handle documents in the context of an intranet portal. The Business
Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600
Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle
Defense In-Depth to Achieve Unbreakable Database Security
Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Netwrix Auditor for Windows Server
Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
