THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI



Similar documents
Cisco Advanced Services for Network Security

CISCO IOS NETWORK SECURITY (IINS)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Detailed Description about course module wise:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

How To Manage Security On A Networked Computer System

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Network Security: Introduction

Security and Access Control Lists (ACLs)

Chapter 1 The Principles of Auditing 1

Network Security Administrator

Fundamentals of Network Security - Theory and Practice-

74% 96 Action Items. Compliance

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ICANWK406A Install, configure and test network security

Best Practices For Department Server and Enterprise System Checklist

Introduction to Cyber Security / Information Security

Section 12 MUST BE COMPLETED BY: 4/22

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Consensus Policy Resource Community. Lab Security Policy

CCNA Security v1.0 Scope and Sequence

Networking: EC Council Network Security Administrator NSA

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Critical Controls for Cyber Security.

How are we keeping Hackers away from our UCD networks and computer systems?

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Cisco Security Optimization Service

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Defending Against Data Beaches: Internal Controls for Cybersecurity

Network and Host-based Vulnerability Assessment

IT Networking and Security

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

PART D NETWORK SERVICES

Global Partner Management Notice

Intelligent. Data Sheet

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Jort Kollerie SonicWALL

CompTIA Security+ (Exam SY0-410)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Office of Inspector General

INTRUSION DETECTION SYSTEMS and Network Security

Network Incident Report

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Introduction p. 2. Introduction to Information Security p. 1. Introduction

AASTMT Acceptable Use Policy

8 Steps for Network Security Protection

Developing Network Security Strategies

U.S. SECURITIES & EXCHANGE COMMISSION

8 Steps For Network Security Protection

Best Practices for Outdoor Wireless Security

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Cisco Certified Security Professional (CCSP)

A HELPING HAND TO PROTECT YOUR REPUTATION

Attachment A. Identification of Risks/Cybersecurity Governance

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

How To Ensure The C.E.A.S.A

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

SECURITY. Risk & Compliance Services

Network Access Security. Lesson 10

Four Top Emagined Security Services

Guideline on Auditing and Log Management

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

How To Protect A Network From Attack From A Hacker (Hbss)

SCP - Strategic Infrastructure Security

Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Security + Certification (ITSY 1076) Syllabus

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

BUY ONLINE FROM:

CONTENTS. PCI DSS Compliance Guide

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Security Practices for Online Collaboration and Social Media

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Transcription:

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI Introduction. I. VULNERABILITIES AND TECHNOLOGIES. 1. Hackers and Threats. Contending with Vulnerability Realizing Value in Security Audits Analyzing Hacking Assessing Vulnerability and Response Hackers: Motivation and Characteristics The Enemy Within: Maliciousness and Sloppiness Threats Classification The Future of Hacking and Security 2. Crucial Need for Security: Vulnerabilities and Attacks. Recognizing Vulnerabilities Design Vulnerabilities Issues Human Vulnerability Issues Implementation Vulnerability Issues Categories of Attacks The Human Component in Attacks Reconnaissance Attacks Access Attacks Denial of Service Attacks Additional Common Attacks Footprinting Scanning and System Detailing Eavesdropping Password Attacks Impersonating Trust Exploitation Software and Protocol Exploitation Worms Viruses Trojan Horses Attack Trends Wireless Intrusions Wireless Eavesdropping Man-in-the-Middle Wireless Attacks Walk-By Hacking Drive-By Spamming Wireless Denial of Service Frequency Jamming The Hapless Road Warrior Social Engineering Examples of Social Engineering Tactics of Attacks Cisco SAFE Axioms Routers Are Targets

Switches Are Targets Hosts Are Targets Networks Are Targets Applications Are Targets 3. Security Technology and Related Equipment. Virus Protection Traffic Filtering Basic Filtering Advanced Filtering Filtering Encryption Encrypted VPN SSL Encryption File Encryption Authentication, Authorization, and Accounting: AAA Authentication Authorization Accounting Public Key Infrastructure From Detection to Prevention: Intrusion-Detection Systems and Intrusion-Prevention Systems IDS Overview Network- and Host-Based IDS IPS Overview Target-Based IDS Content Filtering URL Filtering E-Mail Content Filtering Assessment and Audit Assessment Tools Audit Tools Additional Mitigation Methods Self-Defending Networks Stopping a Worm with Network-Based Application Recognition Automated Patch Management Notebook Privacy Filter 4. Putting It All Together: Threats and Security Equipment. Threats, Targets, and Trends Lowering Risk Exposure Security Topologies SAFE Blueprints SAFE Architecture Using SAFE II. HUMAN AND FINANCIAL ISSUES.

5. Policy, Personnel, and Equipment as Security Enablers. Securing the Organization: Equipment and Access Job Categories Departing Employees Password Sanctity Access Managing the Availability and Integrity of Operations Implementing New Software and Privacy Concerns Custom and Vendor-Supplied Software Sending Data: Privacy and Encryption Considerations Regulating Interactivity Through Information and Equipment Control Determining Levels of Confidentiality Inventory Control: Logging and Tagging Mobilizing the Human Element: Creating a Secure Culture Employee Involvement Management Involvement: Steering Committee Creating Guidelines Through the Establishment of Procedural Requirements Policy Fundamentals Determining Ownership Determining Rules and Defining Compliance Corporate Compliance User Compliance Securing the Future: Business Continuity Planning Ensuring a Successful Security Policy Approach Security Is a Learned Behavior Inviting the Unknown Avoiding a Fall into the Safety Trap Accounting for the Unaccountable Workflow Considerations Striving to Make Security Policies More Efficient Surveying IT Management The Need for Determining a Consensus on Risk Infosec Management Survey Infosec Management Quotient 6. A Matter of Governance: Taking Security to the Board. Security-A Governance Issue Directing Security Initiatives Steering Committee Leading the Way Establishing a Secure Culture Securing the Physical Business Securing Business Relationships Securing the Homeland Involving the Board Examining the Need for Executive Involvement Elements Requiring Executive Participation

7. Creating Demand for the Security Proposal: IT Management's Role. Delivering the Security Message to Executive Management Recognizing the Goals of the Corporation Knowing How the Organization Can Use ROP Understanding the Organization's Mandate and Directives Acknowledging the Organization's Imperatives and Required Deliverables Establishing an Appropriate Security Posture Outlining Methods IT Managers Can Use to Engage the Organization Lobbying Support Assessing Senior Business Management Security Requirements Every Question Counts: Delivering the Survey to Respondents Infosec Operational Survey Infosec Operational Quotient 8. Risk Aversion and Security Topologies. Risk Aversion The Notion of Risk Aversion Determining Risk Tolerance What Assets to Protect Short-Term and Long-Term Risks Risk-Aversion Quotient Calculating the Risk-Aversion Quotient Risk-Aversion Quotient and Risk Tolerance Using the Charts Security Modeling Topology Standards One Size Rarely Fits All Security Throughout the Network Diminishing Returns 9. Return on Prevention: Investing in Capital Assets. Examining Cost of Attacks Determining a Baseline Providing Alternatives Budgeting for Security Equipment Total Cost of Ownership Present Value Analyzing Returns on Security Capital Investments Net Present Value Internal Rate of Return Return on Investment Payback Period The Bottom Line Acknowledging Nonmathematical Security Fundamentals III. POLICIES AND FUTURE. 10. Essential Elements of Security Policy Development. Determining Required Policies Constructing Reliable and Sound Policies Reliability

Access Constancy Answerability Using Policy Tools and Policy Implementation Considerations Useful Policy Tools Policy Implementation Performing Comprehensive Monitoring Knowing Policy Types Physical Security Policies Access-Control Policies Dialup and Analog Policies Remote-Access Policies Remote Configuration Policies VPN and Encryption Policies Network Policies Data Sensitivity, Retention, and Ethics Policies Software Policies of Policy Types Handling Incidents 11. Security Is a Living Process. Security Wheel Secure Monitor Test Improve Scalability Jurisprudence Hacking Internal Issues Negligence Privacy Integrity Good Netizen Conduct SWOT: Strengths, Weaknesses, Opportunities, and Threats Strengths Weaknesses Opportunities Threats End Note IV. APPENDIXES. Appendix A. References. Appendix B. OSI Model, Internet Protocol, and Packets. Appendix C. Quick Guides to Security Technologies. Appendix D. Return on Prevention Calculations Reference Sheets. Glossary. Index.