How To Protect A Network From Attack From A Hacker (Hbss)



Similar documents
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

IDS / IPS. James E. Thiel S.W.A.T.

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

INTRUSION DETECTION SYSTEMS and Network Security

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

SANS Top 20 Critical Controls for Effective Cyber Defense

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Chapter 9 Firewalls and Intrusion Prevention Systems

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Host-based Intrusion Prevention System (HIPS)

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

CSCI 4250/6250 Fall 2015 Computer and Networks Security

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Network Incident Report

OWASP Logging Project - Roadmap

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

End-user Security Analytics Strengthens Protection with ArcSight

Intrusion Detection Systems

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

CMPT 471 Networking II

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Introduction of Intrusion Detection Systems

Modular Network Security. Tyler Carter, McAfee Network Security

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intro to Firewalls. Summary

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Defending Against Data Beaches: Internal Controls for Cybersecurity

CTS2134 Introduction to Networking. Module Network Security

Section 12 MUST BE COMPLETED BY: 4/22

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

How To Manage Security On A Networked Computer System

Best Practices For Department Server and Enterprise System Checklist

Security Management. Keeping the IT Security Administrator Busy

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Performance Evaluation of Intrusion Detection Systems

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

SURVEY OF INTRUSION DETECTION SYSTEM

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Name. Description. Rationale

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

USM IT Security Council Guide for Security Event Logging. Version 1.1

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Role of Anomaly IDS in Network

Uncover security risks on your enterprise network

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Ovation Security Center Data Sheet

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Log Management for the University of California: Issues and Recommendations

Common Cyber Threats. Common cyber threats include:

Firewalls, Tunnels, and Network Intrusion Detection

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

System Specification. Author: CMU Team

Unprecedented Malware Growth

Cisco Advanced Services for Network Security

THE ROLE OF IDS & ADS IN NETWORK SECURITY

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

Taxonomy of Intrusion Detection System

MANAGED SECURITY SERVICES

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Why The Security You Bought Yesterday, Won t Save You Today

Critical Security Controls

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Hardware and Software Security

INTRODUCTION TO FIREWALL SECURITY

RAVEN, Network Security and Health for the Enterprise

Chapter 1 The Principles of Auditing 1

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08

Data Management Policies. Sage ERP Online

FIREWALL POLICY DOCUMENT

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Transcription:

Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES

Assessment Planning Assessment Execution Assessment Evaluation Assessment Reporting Conclusion Agenda

Assessment Planning Determining Scope and Boundaries What authority do you have How far can you go CyberCom and DISA coordination needed External and/or Internal Network Assessment Obtaining Leadership Insight

Assessment Planning Data Gathering What is network architecture internal dmz public facing IP Is there an IDS and IPS Is HBSS installed Polices, processes, and procedures for: Network level security: FW, routers, IDS, IPS STIGS Server and application security: FW, proxy s STIGS What is event handling and incident response policy, processes, notification, triage, containment

DOD HBSS CLIENT COMPONENTS Asset Configuration Compliance Module (ACCM) Gathers detailed asset inventory on all hosts and provides nearreal time situational awareness of asset inventory Antivirus/Antispyware (AV/AS) Protect assets from SPAM and Malware (e.g. viruses, trojan horses, worms, bots, and rootkits) by filtering e mail. Identify unsafe websites during searches.

DOD HBSS CLIENT COMPONENTS McAfee Agent (MA) Provides local management of all HBSS products collocated on the host Runs silently in the background to gather information and events from managed systems Sends collected data to the epo server Manages modules and software updates of other HBSS products on the host system Enforces policies on the host machines Asset Baseline Monitor (ABM) Generates snapshots of asset configurations to facilitate detection of changes made to authorized baselines

DOD HBSS CLIENT COMPONENTS Device Control Module (DCM) Prevents unauthorized USB and flash media devices from being plugged into End Point systems Allows restrictions and/or exceptions based on specific hardware ids, vendor ids and serial numbers Host Intrusion Prevention System (HIPS) Enforces security policy Adds a robust layer of protection to the MA end point asset that includes known and unknown buffer overflow exploit protection, prevention of malicious code installation/execution, and identification of activities that deviate from DoD or organizational policy Firewall

DOD HBSS CLIENT COMPONENTS Rogue System Detection RSD Agents actively monitor the network for DHCP requests and send this information to its server Systems unknown to the server or that haven't checked in within a defined period of time are marked as "Rogue" Policy Auditor (PA) Scans remote computers to determine compliance with defined policies Identifies host vulnerabilities on the network

Intrusion Detection Ability to detect actions that attempt to compromise the confidentiality, integrity or availability of a system Common types of Intrusion Detection Network Based (Network IDS) Network based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior based solely on network traffic Network IDS, using either a network tap, span port, or hub collects packets that traverse a given network Captured data, the IDS system processes and flags any suspicious traffic Does not actively block network traffic Is passive, only gathering, identifying, logging and alerting SNORT example

Common types of Intrusion Detection Host Based (HIDS) Host based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior on a specific device Usually has an agent installed, monitors and alerts on local OS and application activity Agent uses a combination of signatures, rules, and heuristics to identify unauthorized activity IDS is passive, only gathering, identifying, logging, and alerting. Examples of HIDS: OSSEC Open Source Host based Intrusion Detection System Tripwire AIDE Advanced Intrusion Detection Environment Prelude Hybrid IDS

Intrusion Detection Techniques Misuse detection Catch the intrusions in terms of the characteristics of known attacks or system vulnerabilities Anomaly detection Detect any action that significantly deviates from the normal behavior

Misuse Detection Based on known attack actions Feature extract from known intrusions Integrate the Human knowledge. The rules are pre defined Disadvantage: Cannot detect novel or unknown attacks

Anomaly Detection Based on the normal behavior of a subject Significant deviation from the normal behavior is considered intrusion Anomaly Detection Dis Advantage Based on audit data collected over a period of normal operation. When a noise(intrusion) data in the training data, it will make a mis classification How to decide the features to be used. The features are usually decided by domain experts. It may be not completely

Intrusion Prevention Intrusion prevention gathers and identifies data and behavior, with the added ability to block (prevent) unwarranted activity Performed at the Network, Host, and Physical level

Assessment Execution External IP Perform low and slow first NOC Observation Have internal team onsite with network monitoring (NOC) while performing low and slow Is IDS and IPS working Is staff handling event or is it a non event

Assessment Execution Perform intense/insane NOC Observation Have internal team onsite with network monitoring (NOC) while performing low and slow Is IDS and IPS working Is staff handling event or is it a non event

Assessment Execution Internal Perform low and slow Perform intense NOC Observation Have internal team onsite with network monitoring (NOC) while performing low and slow Is IDS and IPS working Is staff handling event or is it a non event

Assessment Evaluation Review IDS and IPS logs for your activities Review HBSS events, logs, and alerts Assess responsiveness of staff to activities you executed Compare actions taken to policies and procedures, and notification thresholds

Identify what is working well Identify what needs improvement Assessment Reporting Plan for revisit and continuous improvement

Conclusion Risk Based Assessments vs. Gotcha You Questions