Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems



Similar documents
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Security aspects of e-tailing. Chapter 7

How To Secure An Rsa Authentication Agent

Host-based Intrusion Prevention System (HIPS)

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Remote Deposit Terms of Use and Procedures

Best Practices For Department Server and Enterprise System Checklist

Introduction. PCI DSS Overview

Host/Platform Security. Module 11

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

What Do You Mean My Cloud Data Isn t Secure?

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

End-user Security Analytics Strengthens Protection with ArcSight

Data Management Policies. Sage ERP Online

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Zone Labs Integrity Smarter Enterprise Security

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Course: Information Security Management in e-governance

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Total Defense Endpoint Premium r12

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Top tips for improved network security

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Verve Security Center

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Simple Steps to Securing Your SSL VPN

Chapter 4 Application, Data and Host Security

Did you know your security solution can help with PCI compliance too?

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Cybersecurity Health Check At A Glance

Network Security Guidelines. e-governance

The Education Fellowship Finance Centralisation IT Security Strategy

THE BLUENOSE SECURITY FRAMEWORK

Web Plus Security Features and Recommendations

Common Cyber Threats. Common cyber threats include:

Endpoint Security Management

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Ovation Security Center Data Sheet

Managed Service Plans

Patch Management Policy

White Paper How Noah Mobile uses Microsoft Azure Core Services

Basics of Internet Security

Codes of Connection for Devices Connected to Newcastle University ICT Network

Implementing Security Update Management

BM482E Introduction to Computer Security

Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines. Regional Product Management Team Endpoint Security

A Decision Maker s Guide to Securing an IT Infrastructure

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

AVeS Cloud Security powered by SYMANTEC TM

Symantec Endpoint Protection Getting Started Guide

Mitigating Risks and Monitoring Activity for Database Security

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Security Best Practice

Global Partner Management Notice

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Endpoint protection for physical and virtual desktops

Medical Device Security Health Group Digital Output

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Best Practices for DanPac Express Cyber Security

VMware vcloud Air Security TECHNICAL WHITE PAPER

RL Solutions Hosting Service Level Agreement

External Supplier Control Requirements

Building a Business Case:

Endpoint protection for physical and virtual desktops

Managing internet security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Computer Viruses: How to Avoid Infection

Endpoint Protection Small Business Edition 2013?

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Small Business IT Risk Assessment

Patch and Vulnerability Management Program

Best Practices for DeltaV Cyber- Security

Integrated Protection for Systems. João Batista Territory Manager

Student Tech Security Training. ITS Security Office

IT Security Procedure

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

1 Introduction 2. 2 Document Disclaimer 2

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

PCI DSS Requirements - Security Controls and Processes

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Industrial Security for Process Automation

The Elephant in the Room

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

SonicWALL PCI 1.1 Implementation Guide

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Transcription:

Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems

Agenda Introduction to information, data and database systems Information security risks surrounding data and database systems Information security considerations and solutions for data and database systems

Database Systems Terms & Concepts : What is a Database? An organized collection of information - A database can also be defined as a collection of information represented in coded data elements and specific relationships between those data elements - Databases are cardinal components of any application which enables provision of dynamic content and is shared across users, uses and applications Usually in the form of - Fields: a single value / piece of information; like a cell in Excel - Records: a complete set of information; composed of fields (a row ) - File (or table): a set of records DBMS (Database Management System) - basically the software that manages your database Slide 3 Slide 3

Operating Systems What is an operating system? The operating system can be considered in various ways: an intermediary between the user software and the hardware an abstraction layer providing an idealized view of the computer hardware a virtual machine a set of services Slide 4 February Page 20074

The leading risks and threats Risks to your computer s security include: - Viruses - Worms - Trojans - Spyware Slide 5 Slide 5

Operating system security OS is responsible for ensuring that the users are securely authenticated and controlled Operating system comes with many security vulnerabilities Firewall stops most Internet based attacks, however, they cannot stop all outside attacks Firewalls are less effective for attacks within the corporation Operating system security is required to achieve the three basic objectives of security (CIA): Confidentiality, Integrity and Availability. Slide 6

Keep Your Operating System Updated Just keep your system up to date with the latest software available. Online criminals are constantly at work devising new ways to attack your computer and invade your privacy. Fortunately, software companies work even harder to counter those threats and to provide you with updated tools that you can use to protect your PC. You should regularly update your computer operating system with security updates provided by the manufacturer. The same goes for your Web browser and other important applications, including your antivirus and antispyware programs Slide 7

The Benefits of Automatic Security Updates As with human viruses, the best treatment for computer viruses is to avoid getting them in the first place. Having up-to-date security features already installed as part of your computer system helps to ensure that you have the highest level of protection available. And because security software is continually updated to anticipate and respond to new and evolving threats, the easiest way to ensure that you have the latest security enhancements is to schedule automatic updates for your computer. Slide 8

Install and Maintain Antivirus Software Antivirus software helps to protect your computer by scanning every e-mail, application or piece of content that enters your PC. Strong antivirus programs can detect and destroy thousands of specific viruses before they have a chance to damage your system. Online attackers are constantly creating new viruses and worms, and devising new ways to invade and damage your computer. To protect your PC from these threats, make sure you never let your antivirus program expire, and keep the software up to date with the latest updates from the manufacturer. Slide 9

Install and Maintain Antispyware Software Antispyware software can expose any spies already on your system, and help to keep your computer running smoothly and prevent further intrusion. As with your operating system and antivirus software, it is essential that you keep your antispyware software updated to make sure you have the highest level of protection for your PC. Slide 10

Need for Operating systems hardening Host hardening makes it difficult to attack on a host systems. A hardened OS is one in which the vendor has modified the kernel source code to provide for a mechanism, which provides a security perimeter between the non secure application software, the secure application software and network stack A kernel connects the application software to the hardware of a computer Slide 11

OS hardening fundamentals Following are the fundamental steps for OS hardening Do a disconnected install During installation of an OS, disconnect from any network, especially the internet Best practice suggest to download the necessary patches and then apply these downloaded patches to the machines Lock down the OS Install all applicable patches and updates (in the form of service packs or updated releases) Update the OS on regular basis Slide 12

OS hardening fundamentals Lock down the services: All services and third party programs on the computer should be checked to ensure that they are the most current versions Lock down the services which are not required on the machine Define a proper baseline Once the IT system is patched and locked down next step is to establish a baseline for IT systems This is mostly to ensure that a proper documentation of changes that were carried out on the IT system exists If any changes are made to the baselines, it can be verified and appropriate security measures can be taken Slide 13

Some other measures for Operating System Security Some of the measures are listed below - Provide physical security to the host - Install the OS with secure configuration options - Download and install patches for know vulnerabilities - Turn off unnecessary services and hardening all remaining applications - Manage users and groups - Manage access permission - Regular server backup Slide 14

Some of the measures for Host Hardening Patch and update the OS Identify vulnerabilities Mitigate if necessary Patch servers in isolation Test patches before applying (depends upon availability of test environment) Harden and configure the OS Disable and remove unnecessary services or applications Configure user authentication Configure resource controls Install and configure additional security controls Anti-malware End-point Security Host based firewalls to block unwanted open ports Host based intrusion detection (HIDS) system Patch management software Test the security of OS Slide 15

Additional operating system access controls Additional operating system access controls include the following actions: Ensure system administrators and security professionals have adequate expertise to securely configure and manage the operating system. Ensure effective authentication methods are used to restrict system access to both users and applications. Activate and utilize operating system security and logging capabilities and supplement with additional security software where supported by the risk assessment process. Restrict operating system access to specific terminals in physically secure and monitored locations. Slide 16

Additional operating system access controls (cont d) Lock or remove external drives from system consoles or terminals residing outside physically secure locations. Restrict and log access to system utilities, especially those with data altering capabilities. Restrict access to operating system parameters. Prohibit remote access to sensitive operating system functions, where feasible, and at a minimum require strong authentication and encrypted sessions before allowing remote support. Slide 17

Additional operating system access controls (cont d) Limit the number of employees with access to sensitive operating systems and grant only the minimum level of access required to perform routine responsibilities. Segregate operating system access, where possible, to limit full or root level access to the system. Monitor operating system access by user, terminal, date, and time of access. Update operating systems with security patches and using appropriate change control mechanisms. Slide 18

End of Session Slide 19