Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals



Similar documents
2. From a control perspective, the PRIMARY objective of classifying information assets is to:

COSC 472 Network Security

Best Practices For Department Server and Enterprise System Checklist

Innovative Defense Strategies for Securing SCADA & Control Systems

A Decision Maker s Guide to Securing an IT Infrastructure

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Network Security: Introduction

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Security Management. Keeping the IT Security Administrator Busy

ICANWK406A Install, configure and test network security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

1. Thwart attacks on your network.

By David G. Holmberg, Ph.D., Member ASHRAE

Information Technology Cyber Security Policy

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Deploying Firewalls Throughout Your Organization

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Payment Card Industry (PCI) Data Security Standard

Common Cyber Threats. Common cyber threats include:

Critical Controls for Cyber Security.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Information Security Policy

Course: Information Security Management in e-governance

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Closing Wireless Loopholes for PCI Compliance and Security

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Understanding Security Testing

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

Enterprise Computing Solutions

How To Protect A Network From Attack From A Hacker (Hbss)

IT Networking and Security

OCR LEVEL 3 CAMBRIDGE TECHNICAL

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures

Best Practices for Securing IP Telephony

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

8 Steps for Network Security Protection

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

8 Steps For Network Security Protection

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Medical Device Security Health Group Digital Output

13 Ways Through A Firewall

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

13 Ways Through A Firewall What you don t know will hurt you

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

PCI Security Scan Procedures. Version 1.0 December 2004

Protection profile of an industrial firewall

Protecting Organizations from Cyber Attack

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

The Self-Hack Audit Stephen James Payoff

Principles of Information Assurance Syllabus

Infinity Acute Care System monitoring system

Best Practices for DanPac Express Cyber Security

Network and Host-based Vulnerability Assessment

OPC & Security Agenda

How To Protect Ais From Harm

Network Security Policy

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Unified Threat Management, Managed Security, and the Cloud Services Model

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Basics of Internet Security

The Protection Mission a constant endeavor

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Building A Secure Microsoft Exchange Continuity Appliance

Cisco Advanced Services for Network Security

Security and Access Control Lists (ACLs)

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Recommended IP Telephony Architecture

Security Solution Architecture for VDI

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

Using Ranch Networks for Internal LAN Security

Lessons from the DHS Cyber Test Bed Project

Security Assessment Report

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

1B1 SECURITY RESPONSIBILITY

Network Security Administrator

Cybersecurity: What CFO s Need to Know

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

Introduction to Cyber Security / Information Security

IBM Protocol Analysis Module

Industrial Communication. Securing Industrial Wireless

Industrial Security for Process Automation

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Security Issues with Integrated Smart Buildings

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

An Introduction to Network Vulnerability Testing

Odessa College Use of Computer Resources Policy Policy Date: November 2010

The following chart provides the breakdown of exam as to the weight of each section of the exam.

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Guide to Vulnerability Management for Small Companies

Transcription:

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Page 2

Key Concepts Confidentiality, integrity, and availability (CIA) concepts Layered security solutions implemented for the seven domains of a typical IT infrastructure Common threats for each of the seven domains IT security policy framework Impact of data classification standard on the seven domains Page 3

DISCOVER: CONCEPTS Page 4

Introducing ISS ISS Information Systems Information Page 5

The CIA Triad Availability Page 6

Confidentiality Personal Data and Information Credit card account numbers and bank account numbers Social Security numbers and address information Intellectual Property Copyrights, patents, and secret formulas Source code, customer databases, and technical specifications National Security Military intelligence Homeland security and government-related information Page 7

Integrity Maintain valid, uncorrupted, and accurate information. User names and passwords Patents and copyrights Source code Diplomatic information Financial data Page 8

Availability X X X Page 9

Conduct and Ethics in ISS ISS is a classic battle of good vs. evil. No global laws, rules, or regulations govern cyberspace. U.S. government and Internet Architecture Board (IAB) have developed joint Internet acceptable use policy (AUP). Security professionals are in high demand as the good guys. Page 10

Compliance Laws Driving ISS Health Insurance Portability and Accountability Act (HIPAA) Sarbanes-Oxley (SOX) Act Children s Internet Protection Act (CIPA) Page 11

IT Security Policy Framework POLICY Standard Procedure Guideline A short written statement that defines a course of action that applies to the entire organization A detailed written definition of how software and hardware are to be used Written instructions for how to use the policy and standard Suggested course of action for using the policy, standard, or procedure Page 12

Seven Domains of a Typical IT Infrastructure Page 13

Common Threats in the User Domain Lack of user awareness User apathy toward policies User violating security policy User inserting CD/DVD/USB with personal files Page 14

Common Threats in the User Domain (Continued) User downloading photos, music, or videos User destructing systems, applications, and data Disgruntled employee attacking organization or committing sabotage Employee blackmail or extortion Page 15

Common Threats in the Workstation Domain Unauthorized workstation access Unauthorized access to systems, applications, and data Desktop or laptop operating system vulnerabilities Desktop or laptop application software vulnerabilities or patches Page 16

Common Threats in the Workstation Domain (Continued) Viruses, malicious code, and other malware User inserting CD/DVD/USB with personal files User downloading photos, music, or videos Page 17

Common Threats in the LAN Domain Unauthorized physical access to LAN Unauthorized access to systems, applications, and data LAN server operating system vulnerabilities LAN server application software vulnerabilities and software patch updates Page 18

Common Threats in the LAN Domain (Continued) Rogue users on WLANs Confidentiality of data on WLANs LAN server configuration guidelines and standards Page 19

Common Threats in the LAN-to-WAN Domain Unauthorized probing and port scanning Unauthorized access Internet Protocol (IP) router, firewall, and network appliance operating system vulnerability Local users downloading unknown file types from unknown sources WAN Page 20

Common Threats in the WAN Domain Open, public, and accessible data Most of the traffic being sent as clear text Vulnerable to eavesdropping Vulnerable to malicious attacks Vulnerable to Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks WAN Page 21

Common Threats in the WAN Domain (Continued) Vulnerable to corruption of information and data Insecure Transmission Control Protocol/Internet Protocol (TCP/IP) applications Hackers and attackers e-mailing Trojans, worms, and malicious software freely and constantly WAN Page 22

Common Threats in the Remote Access Domain Brute force user ID and password attacks Multiple logon retries and access control attacks Unauthorized remote access to IT systems, applications, and data Confidential data compromised remotely Data leakage in violation of data classification standards Internet Page 23

Common Threats in the Systems/Applications Domain Unauthorized access to data centers, computer rooms, and wiring closets Difficult-to-manage servers that require high availability Server operating systems software vulnerability management Security required by cloud computing virtual environments Corrupt or lost data Cloud Computing Page 24

DISCOVER: PROCESSES Page 25

Implementing the CIA Triad AUP Confidentiality Security Awareness Policy Enhanced Access Control Page 26

(Continued) Integrity Implementing the CIA Triad AUP Threat Assessment and Monitoring Security Awareness Policy Vulnerability Assessment and Management Enhanced Access Control Asset Protection Policy Page 27

Implementing the CIA Triad (Continued) Data Classification Standard AUP Threat Assessment and Monitoring Security Awareness Policy Vulnerability Assessment and Management Enhanced Access Control Asset Protection Policy Availability Page 28

DISCOVER: ROLES Page 29

Who Implements the CIA Triad? Confidentiality Integrity User IT administrator Network administrator Human resources Senior management User IT administrator Network administrator Human resources Senior management Availability IT administrator Network administrator Third-party vendor, for example, telecommunication company Page 30

Summary Terms associated with ISS include risks, threats, and vulnerabilities. Layered security strategy protects an IT infrastructure s CIA. IT policy framework includes policies, standards, procedures, and guidelines. Data classification standard defines how data is to be handled within an IT infrastructure. Page 31