How To Secure Your Information Systems



Similar documents
INFORMATION SECURITY TRAINING CATALOG (2015)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Managing IT Security with Penetration Testing

e-discovery Forensics Incident Response

Penetration testing & Ethical Hacking. Security Week 2014

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

The Protection Mission a constant endeavor

Information Security Services

An Introduction to Network Vulnerability Testing

Case Study: Hiring a licensed Security Provider

White Paper. Information Security -- Network Assessment

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Basics of Internet Security

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Cisco Advanced Services for Network Security

Network & Information Security Policy

Critical Controls for Cyber Security.

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

IBX Business Network Platform Information Security Controls Document Classification [Public]

INCIDENT RESPONSE CHECKLIST

Protecting Critical Infrastructure

Penetration Testing Service. By Comsec Information Security Consulting

External Supplier Control Requirements

information security and its Describe what drives the need for information security.

NETWORK PENETRATION TESTING

Guideline on Auditing and Log Management

Chapter 7 Information System Security and Control

H.I.P.A.A. Compliance Made Easy Products and Services

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

IT Networking and Security

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Information Technology Security Review April 16, 2012

New PCI Standards Enhance Security of Cardholder Data

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SECURITY. Risk & Compliance Services

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

Network Security Administrator

Network Segmentation

Five keys to a more secure data environment

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Global Partner Management Notice

SANS Top 20 Critical Controls for Effective Cyber Defense

FORBIDDEN - Ethical Hacking Workshop Duration

California State University, Chico. Information Security Incident Management Plan

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Exam 1 - CSIS 3755 Information Assurance

2016 TÜBİTAK BİLGEM Cyber Security Institute

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2012 Risk Assessment Workshop

IT Security. Securing Your Business Investments

Security Management. Keeping the IT Security Administrator Busy

INFORMATION SECURITY TRAINING CATALOG (2016)

Table of Contents. Introduction. Audience. At Course Completion

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

TELEFÓNICA UK LTD. Introduction to Security Policy

Loophole+ with Ethical Hacking and Penetration Testing

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Certification Programs

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Cisco Security Optimization Service

Hackers are here. Where are you?

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

(Instructor-led; 3 Days)

RISK ASSESSMENT On IT Infrastructure Mr Pradhan P L & Prof P K Meher

Chapter 1 The Principles of Auditing 1

A Decision Maker s Guide to Securing an IT Infrastructure

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Security Overview. BlackBerry Corporate Infrastructure

2012 Data Breach Investigations Report

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Payment Card Industry Data Security Standard

Transcription:

isec Securing the Insecure Securing The Insecure

e Security Rapid development of information technology has increased the use of open systems spanning local and remote sites. Great effort has gone into making the systems interoperable, easy to access and easy to use. But this explosive growth has contributed to a situation where a huge amount of critical data is exchanged over a medium that has minimal protection. A little carelessness, a small loophole is all it takes to compromise the security of a system. A break-in from an undesirable source can cause irreparable damage to a business. isec has the skills and experience to detect when, where and how security lapses occur in applications, operating systems, networking design and the Internet. isec has the know-how to effectively secure information systems in real time. The approach, based on intensive research, thorough analysis, comprehensive design and systematic implementation, ensures total security for the most valuable assets of any organization in the present information driven economy - its data. isec can help secure your information systems by applying its advanced professional know-how in the various areas as under: Security Audit isec offers security audit services. These audits include applications, Operating systems, Networks and policy. Details of these audit processes are as below: Policy Audit: Policy Audit service are deals with auditing of security policies. With our experience in dealing with various diverse systems and policies, we offer a unique combination of audit as well as technology skills. Policy Audits helps clients to recognizes their weaknesses and strengths as formulated in their policies and take adequate measures to reach standards prevalent elsewhere in this area. Application Security: isec looks into applications and audits existing policies on applications keeping in view the objectives of the client organization in terms of security. We also help clients develop secure and state of art applications through our solutions which are indicated elsewhere on this site. Operating System Security: Operating system is the backbone which provides the platform on which applications are hosted. isec has extensive experience in plugging the known vulnerabilities and hardening the operating system for client use. Audit services also help the client in understanding the weaknesses which exist in the system. Network Security: Network security audit service audits the security of the network. This service looks into the areas of confidentiality, authentication and data integrity. isec solutions team is capable of building these features on any network using standard protocols. isec also helps clients in proper selection of network security appliances like Firewalls,

IDS's, Antivirus software and PKI solutions. Vulnerability Assessment Vulnerability Assessments are essential to find out the extent to which systems are exposed to threats from internal as well as external users. isec provides these tests using the best of breed tools. isec's Vulnerability Assessment Tests are built on Nessus and Nmap and include: TCP port scans of all 65,535 ports of an IP address using Nmap. 606 vulnerability tests using Nessus (or ALL Nessus plug-ins at the time of testing). isec will need the IP Address of the server for which the Vulnerability Assessment Test is to be done. The Vulnerability Assessment Test of the server will be done remotely by isec and the Vulnerability Assessment Report will be sent to you. isec conducts Vulnerability Assessment Onsite as well as remotely. Penetration Testing Penetration testing, or 'ethical hacking', concentrates on the security of the Information Technology Infrastructure of the organization to find any loopholes in the system. Penetration tests cover the servers installed, modems, routers and bridges. These tests include the following : Remote penetration from the Internet. Analysis of script from the UNIX systems and review of NT security and account settings. Tests on the client's telephone network. Penetrating the internal network as an insider with knowledge that a regular employee of the organization would have, had he been terminated, removed, etc. isec conducts Vulnerability Assessment Onsite as well as remotely Secure Managed Services isec helps you maintain the basic needs of security in your IT infrastructure. Monitor it continuously through expert advice on a periodic basis. The services Include; Base-lining Security devices (firewall(s), IDS(s), perimeter router(s) and proxies) This will include making standard operating procedures for the Security devices and software in use in the IT network. Evaluation of policies currently in use and making appropriate modifications. Ensuring logging of appropriate events and ensuring access control One time annual Vulnerability Assessment Prior to starting the service isec will conduct one time vulnerability assessment and close all known risks to ensure that risks are covered Hands on maintenance on site isec consultants will be onsite every month to make sure that the policies, logging levels and access control on devices is proper

For unexpected security incidents isec will depute its persons to make sure that the security outages are controlled. Forensic Services isec combines its criminal investigation skills along with the knowledge of computer peripherals to offer E-CRAFT (Evidence Collection, Recovery, Analysis & Forensic Training) to its clients. In the area of computer forensics, isec has following offerings: Evidence Collection & Seizure (EC&S) Forensic Analysis and Reporting (FAR) Controlled Recovery (CR) Forensic Training (ForT) EC&S: isec has standard methodologies using both open source as well as proprietary tools to ensure capture of electronic data. isec helps investigating agencies in storing seized electronic data so that it can be used by the prosecution in court cases. FAR: This practice of isec helps investigative agencies to analyze electronic data stored on floppies, hard disk, RAM, printers and other peripherals. The reports are generated based on the context of a criminal case. This analysis and reporting is done using both COTS as well as proprietary tools developed by isec for this specialized service. CR: This practice of isec helps in recovering deleted, erased, overwritten files from subject device. isec s experience in this area has helped central investigation agencies in India in some serious cases of electronic fraud and also terrorism. ForT: isec imparts training in all the above areas (ECS, FAR, CR). The training is imparted in both the classroom as well as lab settings. Investigators are trained hands-on in the above areas of recovery, seizure, analysis and reporting. Disaster Recovery Two out of five enterprises that experience a disaster - such as the World Trade Center attack - go out of business within five years. Business continuity plans and disaster recovery services ensure continuing viability. isec Disaster Recovery Services is dedicated to ensuring business continuity no matter what unanticipated events befall our client organizations. We do this through an integrated program of planning for technical infrastructure and business recovery. This planning methodology is proven through a rigorous program of on-site, local and remote technical rehearsals as well as simulated event rehearsals, which involve all levels of personnel. Rather than a little used insurance policy, the goal of our program is to make disaster recovery an integrated part of each organization's quality program. Prior to creation of the plan itself, it is essential to consider the potential impacts of disaster and to understand the underlying risks: these are the foundations upon

which a sound, business continuity plan or disaster recovery plan should be built. Following these activities the plan itself must be constructed. This must then be maintained, tested and audited to ensure that it remains appropriate to the needs of the organization. isec provides the following services in relation to Disaster Recovery: Business Impact Analysis(BIA) and Risk Analysis Business Continuity / Disaster Recovery Planning (BCP/DRP) Training Services Information Security is one area, which is being talked about in organizations with increasing frequency, as the organizations are realizing the importance of information per se. Today information, whether it is in paper form, electronic data or even the intellectual property, is treated as a vital asset of an organization. This realization can be attributed to the escalating number of attacks targeted at information -be it modifying the information, destroying it, or simply obtaining it. However, these malicious attacks are not the only source for compromising an organization s information. Statistics reveal that up to 70% of all security incidents are caused by human error or ignorance!! Do organizations realize this? Probably not; which is why in spite of the high-tech security controls, the organization is unable to protect its information. It is for the organizations to understand that once the technical controls are put in place, the next step for them is to make the management and the employees realize the significance of information and to explain them their role in securing the information. In other words, what an organization needs is a well-designed and implemented training and awareness programme. isec provides Information Security Education and Trainings, to concerned individuals and organizations, through its highly competent and professional consultants. isec provides the following trainings in the area of Information Security: IT Security Audit Training One-Day Roadmap to Information Security BS7799 Security Training CISSP Exam Training ForT (Forensic Training)

Our Clients Software companies S1 Corporation, USA Perot Systems, USA Syntel Inc, USA VMoksha Technologies, India Momentum Technologies, A Sopra Group Company Banks and Financial Institutions Societe Generale, Investment Banking, Mumbai Syntel Sourcing Pvt Ltd (Joint venture of Syntel and State Street, USA) Syntel Best Shores Services Pvt Ltd (Joint Venture of Syntel and ZC Sterling, USA) National Stock Exchange, India Security Exchange Board of India Utility Sector Bharat Heavy Electricals Ltd., India Saudi Electricity Company, K.S.A. Educational Sector US Library, India King Abdul Aziz City for Science & Technology (KACST), K.S.A.

About Us isec Services Pvt. Ltd. is engaged in ensuring security of information through a variety of security services and solutions, thus helping detect and prevent theft of information by both, outsiders and insiders USA Office: isec LLC 295 Windsor Street Suit 8, Cambridge, MA 02139 Tel No. : +1 617 4488 233 E-mail: contactus@isecllc.com Website : www.isecllc.com India Office: B-1/1810, Vasant Kunj, New Delhi 110070, India Tel/Fax.: (091) 11 26123369 Email: contactus@isec.co.in Website: www.isec.co.in isec endeavors to ensure that the information is correct and fairly stated, but does not accept liability for any error or omission. The development of isec s products and services is continuous and published information may not be up to date. It is important to check the current position with isec.