FRAMEWORK for NATIONAL NETWORK & CYBER SECURITY



Similar documents
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

The Information Security Problem

Detailed Description about course module wise:

Description: Objective: Attending students will learn:

CYBERTRON NETWORK SOLUTIONS

Cyber Security and Critical Information Infrastructure

CEH Version8 Course Outline

Security aspects of e-tailing. Chapter 7

Fundamentals of Network Security - Theory and Practice-

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Security Goals Services

Content Teaching Academy at James Madison University

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Lesson 5: Network perimeter security

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Ethical Hacking Course Layout

ICANWK406A Install, configure and test network security

EC Council Certified Ethical Hacker V8

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

How are we keeping Hackers away from our UCD networks and computer systems?

Network Security: A Practical Approach. Jan L. Harrington

Section 12 MUST BE COMPLETED BY: 4/22

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Quarterly Report: Symantec Intelligence Quarterly

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Networking for Caribbean Development

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Higher National Unit specification: general information

Network Incident Report

CRYPTUS DIPLOMA IN IT SECURITY

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

IBM Protocol Analysis Module

Critical Controls for Cyber Security.


Developing Network Security Strategies

Security Management. Keeping the IT Security Administrator Busy

Cisco Advanced Services for Network Security

SECURE DATA CENTER DESIGN. Piotr Wojciechowski (CCIE #25543)

Symptoms Based Detection and Removal of Bot Processes

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

information security and its Describe what drives the need for information security.

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Defending Against Data Beaches: Internal Controls for Cybersecurity

Network Security Fundamentals

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Bellevue University Cybersecurity Programs & Courses

13 Ways Through A Firewall

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Gateway Security at Stateful Inspection/Application Proxy

Fortinet Solutions for Compliance Requirements

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

GE Measurement & Control. Cyber Security for NEI 08-09

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

A Cyber Security Integrator s perspective and approach

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Skoot Secure File Transfer

SECURITY. Risk & Compliance Services

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Introduction to Cyber Security / Information Security

Firewalls, Tunnels, and Network Intrusion Detection

Security + Certification (ITSY 1076) Syllabus

Common Cyber Threats. Common cyber threats include:

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

COSC 472 Network Security

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security and Challenges

NETWORK SECURITY ASPECTS & VULNERABILITIES

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

Web Hacking Incidents Revealed: Trends, Stats and How to Defend. Ryan Barnett Senior Security Researcher SpiderLabs Research

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

Information Security Basic Concepts

BlackRidge Technology Transport Access Control: Overview

IIABSC Spring Conference

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Network Security Administrator

Information Security Attack Tree Modeling for Enhancing Student Learning

form approved June/2006 revised Page 1 of 7

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

13 Ways Through A Firewall What you don t know will hurt you

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Transcription:

FRAMEWORK for NATIONAL NETWORK & CYBER SECURITY 23 September 2009 1 06-02-200906.02.2009 Ram Narain Email: ramnarain@hotmail.com

7 Tier Approach to Network & Cyber Security 5 levels of Security Tier 1 Facets of Security Tier 2 Issues in Facets Tier 3 Actions on Issues Tier Scaling & Measuring Tier 5 Recovery Mechanism Tier 6 Learning/Feedback Tier 7 2

Five Levels of Security International Level National Level Enterprise Level Local Network Level Device Level 3

Facets of Security Cyber Security Information Security Communication Assistance for Security Telecom Network Security

Overlapping in Facets of Security Information Security Cyber Security Network Security Communication Assistance for Security

Security Issues Matrix Information Security Cyber Security Telecom Network Security Communication Assistance for Security Standardization Confidentiality Integrity Availability Non-repudiation Access Control and Authentication De capacitating (DoS, DDoS) Website Compromise Network Scanning Probing Phishing Span Virus Steeling of info (Trojan etc.) Communication Monitoring Data Access -RA Network Decapacitating Maintenance capability Trapdoors, Trojans etc Interception Monitoring Analysis Speech Recognition Social Network analysis Trace ability of users 6

Action Table for Information Security Issues Standardization Confidential Integrity Availability Action Standard Formulation Awareness of Standard Use of standards Enactment of Regulations Organization & Structure Security of Media Encryption policy Protocol Standardization Digital Signature Distortionless Communication Intrusion detection Addressing Reliability of Media Media capacity Protection Access Control and Authentication Physical Access Password Management 7

Action Table for Cyber Security Issues Action 8 Decapacitating (DoS, DDoS, Botnets) Website Hacking Network Scanning Probing Phishing Spams Virus Steeling of info (Trojan etc.) Installing Honeypots Intrusion Detections System (IDS) Firewall Antivirus Hardening of Operating System software Port Management Use of Proxy servers Use of Safe Software Vulnerability Scan Identity Tracing National Regulations International Co-operation Monitoring & Tracking Organization and Structure Incident Reporting System Addressing BGP, DNS vulnerabilities

Action Table for Network Security Issues Communication Monitoring Data Access -RA Network De-capacitating Maintenance capability Trapdoors, Trojans etc Action Equipment Testing Equipment Purchase Procedure & Conditions RA Access Precautions Installing Sensors Maintenance Skills Development Enacting Laws Solution implementation Algorithm designs Regulation Operations Involvement of SPs Organization & Structure 9

Action Table for Communication Assistance for Security Issues Interception & Monitoring Speech Recognition Analysis Trace ability of users Action Legal framework Technical capability Structure Availability of Tools & Technology Development of Analytical Tools Users Verification Process CLI Restriction Identity Management Encryption Policy Decryption Capability 10

Scaling & Measuring What can t be quantified, can t be measured What can t be measured, can t be monitored What can t be monitored, can t be controlled & improved 11

Scaling & Measuring Information Security Issues Action Scale Score Standardization Standard Formulation 3 Awareness Standard 3 Use of standard equipment 2 Enactment of Regulations 2 Organization & Structure 1 Confidential Security of Media 5 Encryption policy 8 6 Protocol Standardization 7 Integrity Digital Signature 3 Distortion less Communication 2 Intrusion detection Addressing 6 6 3 Availability Reliability of Media 7 5 Media capacity 7 Protection of data 6 3 Access Control and Authentication Physical Access Password management 8 12 6 7 12 Total 100 62

Scaling & Measuring Cyber Security Action Issues Scale Score Installing Honeypots Intrusion Detections System (IDS) Firewall Decapacitating (DOS, DOSS, Botnets) Website Compromise 20 10 8 5 Antivirus Hardening of Operating System software Port Management Proxy servers Use of Safe Software National Regulations Network Scanning Probing Phishing Spams Virus Steeling of info (Trojan etc.) 15 10 10 10 10 15 6 5 7 8 5 International Co-operation Monitoring & Trading Total 100 8 13 Organization and Structure

Scaling & Measuring Network Security Action Issues Scale Score Equipment Testing Equipment Purchase Procedure & Conditions RA Access Precautions Installing Sensors Maintenance Skills Development Communication Monitoring Data Access -RA Network De-capacitating Maintenance capability Trapdoors, Trojans etc 20 20 0 20 20 10 12 15 5 12 Enacting Laws Solution implementation Total 100 5 Algorithm designs Blocking of sites International Regulation & Co-Operations Organization & Structure 1

Scaling & Measuring CAFS Action Issues Scale Score Legal framework Technical capability Structure Availability of Tools & Technology Development of Analytical Tools Subscriber Verification CLI Restriction Identity Management Interception & Monitoring Speech Recognition Analysis Trace ability of users Total 30 20 25 25 100 20 12 20 56 15

Grading Score Grade >80 Excellent 70-80 Very Good 60-70 Good 50-60 Average <50 Poor

Composite Score & Grade Composite Maximum Score: Total Max Score/ =00/= 100 Total Score: 220/= 5 Grade: Average

Recovery Mechanism Don t loose heart Activate Command & Control System Determine the Level of Problem Assess Damage Check for any Skill Gap Equipment and tool Availability and their working Condition Network Awareness Documentation of Network A short pencil is better than long memory Accessibility of Documentation 18

Feedback/Learning From every Success and Failure there are lessons Failure is not when you fall; failure is when you don t get up Feedback is the food of Champions 19

National Security Environment Capability Laws and Regulation Security Environment Structure 20

Enhancing Security Environment Capability High Level Laws and Regulation Structure International Co-operation Capability 21 Laws & Regulation Structure Low Level

Cyber Security S Structure E Experience C Capability U Undertaking R Regulation I - International T Technology Y - Youth

Cyber City Cyber Security

THANKS 2 06-02-200906.02.2009