Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
103 Cards in this Set
- Front
- Back
Security Awareness
|
To be effective, security policies must be supported by top management:
A security charter. A management document explaining general security rules. Don’t treat users as the enemy: users have to understand that they protect their own assets. Security awareness programs should be part of the general security strategy. Not every member in an organisation has to become a security expert, but all members should know: Why security is important for themselves and for the organisation. What is expected of each member. Which good practices they should follow. |
|
Computer Security
|
protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).
|
|
Computer Security Challenges
|
1.not simple
2.must consider potential attacks 3.procedures used counter-intuitive 4.involve algorithms and secret info 5.must decide where to deploy mechanisms 6.battle of wits between attacker / admin 7.not perceived on benefit until fails 8.requires regular monitoring 9.too often an after-thought 10.regarded as impediment to using system |
|
Vulnerabilities and Attacks
|
system resource vulnerabilities may
be corrupted (loss of integrity) become leaky (loss of confidentiality) become unavailable (loss of availability) attacks are threats carried out and may be passive active insider outsider |
|
Threat Consequences
|
unauthorized disclosure
exposure, interception, inference, intrusion deception masquerade, falsification, repudiation disruption incapacitation, corruption, obstruction usurpation misappropriation, misuse |
|
Network Security Attacks
|
classify as passive or active
passive attacks are eavesdropping release of message contents traffic analysis are hard to detect so aim to prevent active attacks modify/fake data masquerade replay modification denial of service hard to prevent so aim to detect |
|
X.800 Security Architecture
|
X.800, Security Architecture for OSI
systematic way of defining requirements for security and characterizing approaches to satisfying them defines: security attacks -compromise security security mechanism -act to detect, prevent, recover from attack security service -counter security attacks |
|
ISO 17799 (27001)
|
1.Establishing organisational security policy
2.Organizational security infrastructure 3.Asset classification and control 4.Physical and environmental security 5.Personnel security 6.Communications and operations management 7.Access control 8.Systems development and maintenance 9.Business continuity planning 10.Compliance |
|
Organizational Security Infrastructure
|
Responsibilities for security within an enterprise have to be properly organized.
Qualifications of chief security officer? Formerly: ex-police, ex-military Today: increasingly lawyers, IT experts Management has to get an accurate view of the state of security within an enterprise. |
|
Physical and Environmental Security
|
Physical security measures (fences, locked doors, …) protect access to premises or to sensitive areas (rooms) within a building.
E.g., only authorized personnel gets access to server rooms. Environmental factors can influence the likelihood of natural disasters. E.g., is the area subject to flooding? |
|
Communications and Operations Management
|
The day-to-day management of IT systems and of business processes has to ensure that security is maintained.
|
|
Systems Development and Maintenance
|
Security issues should be considered when an IT system is being developed.
Operational security depends on proper maintenance (e.g., patching vulnerable code, updating virus scanners). IT projects have to be managed with security in mind. (Who is writing sensitive applications, who gets access to sensitive data?) |
|
Compliance
|
Organisations have to comply with legal, regulatory, and contractual obligations, as well as with standards and their own organisational security policy.
The auditing process should be put to efficient use while trying to minimize its interference with business processes. In practice, compliance often poses a greater challenge than fielding technical security measures. |
|
Means of User Authentication
|
four means of authenticating user's identity
based one something the individual knows -e.g. password, PIN possesses -e.g. key, token, smartcard is (static biometrics) -e.g. fingerprint, retina does (dynamic biometrics) -e.g. voice, sign can use alone or combined all can provide user authentication all have issues |
|
Password Vulnerabilities
|
offline dictionary attack
specific account attack popular password attack password guessing against single user workstation hijacking exploiting user mistakes exploiting multiple password use electronic monitoring |
|
Improved Implementations
|
have other, stronger, hash/salt variants
many systems now use MD5 with 48-bit salt password length is unlimited is hashed with 1000 times inner loop produces 128-bit hash OpenBSD uses Blowfish block cipher based hash algorithm called Bcrypt uses 128-bit salt to create 192-bit hash value |
|
Password Choices
|
users may pick short passwords
e.g. 3% were 3 chars or less, easily guessed system can reject choices that are too short users may pick guessable passwords so crackers use lists of likely passwords e.g. one study of 14000 encrypted passwords guessed nearly 1/4 of them would take about 1 hour on fastest systems to compute all variants, and only need 1 break! |
|
Using Better Passwords
|
clearly have problems with passwords
goal to eliminate guessable passwords whilst still easy for user to remember techniques: user education computer-generated passwords reactive password checking proactive password checking |
|
Token Authentication
|
object user possesses to authenticate, e.g.
embossed card magnetic stripe card memory card smartcard |
|
Smartcard
|
credit-card like
has own processor, memory, I/O ports wired or wireless access by reader may have crypto co-processor ROM, EEPROM, RAM memory executes protocol to authenticate with reader/computer also have USB dongles |
|
Biometric Authentication
|
Iris
Fingerprint Face Recognition |
|
Biometric Accuracy
|
never get identical templates
problems of false match / false non-match |
|
Remote User Authentication
|
authentication over network more complex
problems of eavesdropping, replay generally use challenge-response user sends identity host responds with random number user computes f(r,h(P)) and sends back host compares value from user with own computed value, if match user authenticated protects against a number of attacks |
|
Access Control Function
|
Authentication:Verification that the claimed identity of a user or other system entity is valid.
Authorization:The granting of a right or permission to a system entity to access a system resource. This function determines who is trusted for a given purposes. |
|
Access Control Requirements
|
reliable input
fine and coarse specifications least privilege separation of duty open and closed policies policy combinations, conflict resolution administrative policies |
|
Discretionary Access Control
|
often provided using an access matrix
lists subjects in one dimension (rows) lists objects in the other dimension (columns) each entry specifies access rights of the specified subject to that object access matrix is often sparse can decompose by either row or column |
|
What is the ITU-T Recommendation X.800?
|
The ITU-T Recommendation X.800 is a series of end-to-end security recommendations defined by the ITU
The ITU Telecommunication Standardization Sector(ITU-T) coordinates standards for telecommunicationson behalf of the International Telecommunication Union (ITU) |
|
Origin of the ITU-T Recommendation X.805
|
ITU-T Recommendation X.805 Security architecture for systems providing end-to-end communicationshad been developed by ITU-T SG 17 (ITU-T Lead Study Group on Telecommunication Security) and was published in October 2003.
•The group has developed a set of the well-recognized Recommendations on security. Among them are X.800 Series of recommendations on security |
|
ITU-T X.800 Threat Model
|
1 -Destruction(an attack on availability):
–Destruction of information and/or network resources 2 -Corruption(an attack on integrity): –Unauthorized tampering with an asset 3 -Removal(an attack on availability): –Theft, removal or loss of information and/or other resources 4 -Disclosure(an attack on confidentiality): –Unauthorized access to an asset 5 -Interruption(an attack on availability): –Interruption of services. Network becomes unavailable or unusable |
|
Security25Three Security Layers
|
Layer1 -Infrastructure Security Layer:
•Fundamental building blocks of networks services and applications •Examples: –Individual routers, switches, servers –Point-to-point WAN links –Ethernet links links2 -Services Security Layer: •Services Provided to End-Users •Examples: –Frame Relay, ATM, IP –Cellular, Wi-Fi, –VoIP, QoS, IM, Location services –Toll free call services services 3 -Applications Security Layer: •Network-based applications accessed by end-users •Examples: –Web browsing –Directory assistance –E-commerce |
|
Security Planes
|
•Concept of Security Planes could be instrumental for ensuring that essential network activities are protected independently (e.g. compromise of security at the End-user Security Plane does not affect functions associated with the Management Security Plane).
•Concept of Security Planes allows identification of potential network vulnerabilities that may occur when distinct network activities depend on the same security measures for protection. |
|
Examples of Intrusion
|
remote root compromise
web server defacement guessing / cracking passwords copying viewing sensitive data / databases running a packet sniffer distributing pirated software using an unsecured modem to access net impersonating a user to reset password using an unattended workstation |
|
Hackers
|
motivated by thrill of access and status
hacking community a strong meritocracy status is determined by level of competence benign intruders might be tolerable do consume resources and may slow performance can’t know in advance whether benign or malign IDS / IPS / VPNs can help counter awareness led to establishment of CERTs collect / disseminate vulnerability info / responses |
|
Insider Attacks
|
among most difficult to detect and prevent
employees have access & systems knowledge may be motivated by revenge / entitlement when employment terminated taking customer data when move to competitor IDS / IPS may help but also need: least privilege, monitor logs, strong authentication, termination process to block access & mirror data |
|
IDS Principles
|
assume intruder behavior differs from legitimate users
expect overlap as shown observe deviations from past history problems of: false positives false negatives must compromise |
|
Host-Based IDS
|
specialized software to monitor system activity to detect suspicious behavior
primary purpose is to detect intrusions, log suspicious events, and send alerts can detect both external and internal intrusions two approaches, often used in combination: anomaly detection -defines normal/expected behavior threshold detection profile based signature detection -defines proper behavior |
|
Anomaly Detection
|
threshold detection
checks excessive event occurrences over time alone a crude and ineffective intruder detector must determine both thresholds and time intervals profile based characterize past behavior of users / groups then detect significant deviations based on analysis of audit records gather metrics: counter, guage, interval timer, resource utilization analyze: mean and standard deviation, multivariate, markov process, time series, operational model |
|
Network-Based IDS
|
network-based IDS (NIDS)
monitor traffic at selected points on a network in (near) real time to detect intrusion patterns may examine network, transport and/or application level protocol activity directed toward systems comprises a number of sensors inline (possibly as part of other net device) passive (monitors copy of traffic) |
|
Intrusion Detection Techniques
|
signature detection
at application, transport, network layers; unexpected application services, policy violations anomaly detection of denial of service attacks, scanning, worms when potential violation detected sensor sends an alert and logs information used by analysis module to refine intrusion detection parameters and algorithms by security admin to improve protection |
|
SNORT Rules
|
use a simple, flexible rule definition language
with fixed header and zero or more options header includes: action, protocol, source IP, source port, direction, dest IP, dest port many options example rule to detect TCP SYN-FIN attack: Alert tcp $EXTERNAL_NET any -> $HOME_NET any \ (msg: "SCAN SYN FIN"; flags: SF, 12; \ reference: arachnids, 198; classtype: attempted-recon;) |
|
Malware Terminology
|
Virus
Worm Logic bomb Trojan horse Backdoor (trapdoor) Mobile code Auto-rooter Kit (virus generator) Spammer and Flooder programs Keyloggers Rootkit Zombie, bot |
|
Virus Structure
|
components:
infection mechanism -enables replication trigger -event that makes payload activate payload -what it does, malicious or benign prepended / postpended / embedded when infected program invoked, executes virus code then original program code can block initial infection (difficult) or propogation (with access controls) |
|
Macro Virus
|
became very common in mid-1990s since
platform independent infect documents easily spread exploit macro capability of office apps executable program embedded in office doc often a form of Basic more recent releases include protection recognized by many anti-virus programs |
|
Virus Countermeasures
|
prevention -ideal solution but difficult
realistically need: detection identification removal if detect but can’t identify or remove, must discard and replace infected program |
|
Generic Decryption
|
runs executable files through GD scanner:
CPU emulator to interpret instructions virus scanner to check known virus signatures emulation control module to manage process lets virus decrypt itself in interpreter periodically scan for virus signatures issue is long to interpret and scan tradeoff chance of detection vs time delay |
|
Morris Worm
|
one of best know worms
released by Robert Morris in 1988 various attacks on UNIX systems cracking password file to use login/password to logon to other systems exploiting a bug in the finger protocol exploiting a bug in sendmail if succeed have remote shell access sent bootstrap program to copy worm over |
|
Recent Worm Attacks
|
Code Red
July 2001 exploiting MS IIS bug probes random IP address, does DDoS attack consumes significant net capacity when active Code Red II variant includes backdoor SQL Slammer early 2003, attacks MS SQL Server compact and very rapid spread Mydoom mass-mailing e-mail worm that appeared in 2004 installed remote access backdoor in infected systems |
|
Worm Countermeasures
|
overlaps with anti-virus techniques
once worm on system A/V can detect worms also cause significant net activity worm defense approaches include: signature-based worm scan filtering filter-based worm containment payload-classification-based worm containment threshold random walk scan detection rate limiting and rate halting |
|
Rootkits
|
set of programs installed for admin access
malicious and stealthy changes to host O/S may hide its existence subverting report mechanisms on processes, files, registry entries etc may be: persisitent or memory-based user or kernel mode installed by user via trojan or intruder on system range of countermeasures needed |
|
Classic Denial of Service Attacks
|
can use simple flooding ping
from higher capacity link to lower causing loss of traffic source of flood traffic easily identified |
|
Source Address Spoofing
|
use forged source addresses
given sufficient privilege to “raw sockets” easy to create generate large volumes of packets directed at target with different, random, source addresses cause same congestion responses are scattered across Internet real source is much harder to identify |
|
SYN Spoofing Attack
|
attacker often uses either
random source addresses or that of an overloaded server to block return of (most) reset packets has much lower traffic volume attacker can be on a much lower capacity link |
|
UDP Flood
|
UDP Flood
alternative uses UDP packets to some port User Datagram Protocol UDP is part of the Internet Protocol suite, programs running on different computers on a network can send short messages known as Datagram's to one another. Unlike TCP, it does not guarantee reliability or the right sequencing of data. Datagram's may go missing without notice, or arrive in a different order from the one in which they were sent. |
|
Distributed Denial of Service Attacks
|
have limited volume if single source used
multiple systems allow much higher traffic volumes to form a Distributed Denial of Service (DDoS) Attack often compromised PC’s / workstations zombies with backdoor programs installed forming a botnet e.g. Tribe Flood Network (TFN), TFN2K |
|
Reflection Attacks
|
use normal behavior of network
attacker sends packet with spoofed source address being that of target to a server server response is directed at target if send many requests to multiple servers, response can flood target various protocols e.g. UDP or TCP/SYN ideally want response larger than request prevent if block source spoofed packets |
|
DoS Attack Defenses
|
high traffic volumes may be legitimate
result of high publicity, e.g. “slash-dotted” or to a very popular site, e.g. Olympics etc or legitimate traffic created by an attacker three lines of defense against (D)DoS: attack prevention and preemption attack detection and filtering attack source traceback and identification |
|
Attack Prevention
|
block IP directed broadcasts
block suspicious services & combinations manage application attacks with “puzzles” to distinguish legitimate human requests good general system security practices use mirrored and replicated servers when high-performance and reliability required |
|
Responding to Attacks
|
identify type of attack
capture and analyze packets design filters to block attack traffic upstream or identify and correct system/application bug have ISP trace packet flow back to source may be difficult and time consuming necessary if legal action desired implement contingency plan update incident response plan |
|
Firewall Capabilities & Limits
|
capabilities:
defines a single choke point provides a location for monitoring security events convenient platform for some Internet functions such as NAT, usage monitoring, IPSEC VPNs limitations: cannot protect against attacks bypassing firewall may not protect fully against internal threats improperly secure wireless LAN laptop, PDA, portable storage device infected outside then used inside |
|
Packet Filtering Firewall
|
applies rules to packets in/out of firewall
based on information in packet header src/dest IP addr & port, IP protocol, interface typically a list of rules of matches on fields if match rule says if forward or discard packet two default policies: discard -prohibit unless expressly permitted more conservative, controlled, visible to users forward -permit unless expressly prohibited easier to manage/use but less secure |
|
Packet Filter Weaknesses
|
weaknesses
cannot prevent attack on application bugs limited logging functionality do not support advanced user authentication vulnerable to attacks on TCP/IP protocol bugs improper configuration can lead to breaches attacks IP address spoofing, source route attacks, tiny fragment attacks |
|
Application-Level Gateway
|
acts as a relay of application-level traffic
user contacts gateway with remote host name authenticates themselves gateway contacts application on remote host and relays TCP segments between server and user must have proxy code for each application may restrict application features supported more secure than packet filters but have higher overheads |
|
SOCKS Circuit-Level Gateway
|
SOCKS v5 defined as RFC1928 to allow TCP/UDP applications to use firewall
components: SOCKS server on firewall SOCKS client library on all internal hosts SOCKS-ified client applications client app contacts SOCKS server, authenticates, sends relay request server evaluates & establishes relay connection UDP handled with parallel TCP control channel |
|
Bastion Hosts
|
critical strongpoint in network
hosts application/circuit-level gateways common characteristics: runs secure O/S, only essential services may require user auth to access proxy or host each proxy can restrict features, hosts accessed each proxy small, simple, checked for security each proxy is independent, non-privileged limited disk use, hence read-only code |
|
Personal Firewall
|
controls traffic flow to/from PC/workstation
for both home or corporate use may be software module on PC or in home cable/DSL router/gateway typically much less complex primary role to deny unauthorized access may also monitor outgoing traffic to detect/block worm/malware activity |
|
Firewall Topologies
|
host-resident firewall
screening router single bastion inline single bastion T double bastion inline double bastion T distributed firewall configuration |
|
Host-Based IPS
|
identifies attacksusing both:
signature techniques malicious application packets anomaly detection techniques behavior patterns that indicate malware can be tailored to the specific platform e.g. general purpose, web/database server specific can also sandbox applets to monitor behavior may give desktop file, registry, I/O protection |
|
Formal Model for Computer Security
|
two fundamental computer security facts:
all complex software systems have flaw/bugs It is extraordinarily difficult to build computer hardware/software not vulnerable to attack hence desire to prove design and implementation satisfy security requirements led to development of formal security models initially funded by US DoD Bell-LaPadula (BLP) model very influential |
|
BLP Rules
|
1.get access
2.release access 3.change object level 4.change current level 5.give access permission 6.rescind access permission 7.create an object 8.delete a group of objects |
|
MLS Security for Role-Based Access Control
|
rule based access control (RBAC) can implement BLP MLS rules given:
security constraints on users constraints on read/write permissions read and write level role access definitions constraint on user-role assignments |
|
Trusted Platform Module (TPM)
|
concept from Trusted Computing Group
hardware module at heart of hardware / software approach to trusted computing uses a TPM chip on motherboard, smart card, processor working with approved hardware / software generating and using crypto keys has 3 basic services: authenticated boot, certification, encryption |
|
Certification Service
|
once have authenticated boot
TPM can certify configuration to others with a digital certificate of configuration info giving another user confidence in it include challenge value in certificate to also ensure it is timely provides hierarchical certification approach trust TPM then O/S then applications |
|
Trusted Systems
|
security models aimed at enhancing trust
work started in early 1970’s leading to: Trusted Computer System Evaluation Criteria (TCSEC), Orange Book, in early 1980s further work by other countries resulting in Common Criteria in late 1990s also Computer Security Center in NSA with Commercial Product Evaluation Program evaluates commercially available products required for Defense use, freely published |
|
CC Requirements
|
have a common set of potential security requirements for use in evaluation
target of evaluation (TOE) refers product / system subject to evaluation functional requirements define desired security behavior assurance requirements that security measures effective correct have classes of families of components |
|
Smartcard PP
|
simple PP example
describes IT security requirements for smart card use by sensitive applications lists threats PP requirements: 42 TOE security functional requirements 24 TOE security assurance requirements IT environment security requirements with rationale for selection |
|
CC Assurance Levels
|
EAL 1 -functionally tested
EAL 2: structurally tested EAL 3: methodically tested and checked EAL 4: methodically designed, tested, and reviewed EAL 5: semiformally designed and tested EAL 6: semiformally verified design and tested EAL 7: formally verified design and tested |
|
Evaluation Parties & Phases
|
evaluation parties:
sponsor -customer or vendor developer -provides evidence for evaluation evaluator -confirms requirements satisfied) certifier -agency monitoring evaluation process phases: preparation, conduct of evaluation, conclusion government agency regulates, e.g. US CCEVS have peering agreements between countries saving time / expense by sharing results |
|
Physical Security
|
protect physical assets that support the storage and processing of information
involves two complementary requirements: prevent damage to physical infrastructure information system hardware physical facility supporting facilities personnel prevent physical infrastructure misuse leading to misuse / damage of protected information |
|
Physical Security Threats
|
look at physical situations / occurrences that threaten information systems:
environmental threats (incl. natural disasters) technical threats human-caused threats first consider natural disasters |
|
Environmental Threats
|
inappropriate temperature and humidity
fire and smoke water chemical, radiological, biological hazards dust infestation |
|
Human-Caused Threats
|
less predictable, may be targeted, harder to deal with
include: unauthorized physical access leading to other threats theft of equipment / data vandalism of equipment / data misuse of resources |
|
Mitigation MeasuresTechnical Threats
|
electrical power for critical equipment use
use uninterruptible power supply (UPS) emergency power generator electromagnetic interference (EMI) filters and shielding |
|
Recovery from Physical Security Breaches
|
redundancy
to provide recovery from loss of data ideally off-site, updated as often as feasible can use batch encrypted remote backup extreme is remote hot-site with live data physical equipment damage recovery depends on nature of damage and cleanup may need disaster recovery specialists |
|
Planning and Implementation
|
after assessment then develop a plan for threat prevention, mitigation, recovery
typical steps: 1.assess internal and external resources 2.identify challenges and prioritize activities 3.develop a plan 4.implement the plan |
|
Physical / Logical Security Integration
|
have many detection / prevention devices
more effective if have central control hence desire to integrate physical and logical security, esp access control need standards in this area FIPS 201-1 “Personal Identity Verification (PIV) of Federal Employees and Contractors” |
|
IT Security Management
|
IT Security Management:a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity and reliability. IT security management functions include:
organizational IT security objectives, strategies and policies determining organizational IT security requirements identifying and analyzing security threats to IT assets identifying and analyzing risks specifying appropriate safeguards monitoring the implementation and operation of safeguards developing and implement a security awareness program detecting and reacting to incidents |
|
Organizational Context and Security Policy
|
first examine organization’s IT security:
objectives -wanted IT security outcomes strategies -how to meet objectives policies -identify what needs to be done maintained and updated regularly using periodic security reviews reflect changing technical / risk environments examine role of IT systems in organization |
|
Management Support
|
IT security policy must be supported by senior management
need IT security officer to provide consistent overall supervision manage process handle incidents large organizations needs IT security officers on major projects / teams manage process within their areas |
|
Baseline Approach
|
use “industry best practice”
easy, cheap, can be replicated but gives no special consideration to org may give too much or too little security implement safeguards against most common threats baseline recommendations and checklist documents available from various bodies alone only suitable for small organizations |
|
Detailed Risk Analysis
|
most comprehensive alternative
assess using formal structured process with a number of stages identify likelihood of risk and consequences hence have confidence controls appropriate costly and slow, requires expert analysts may be a legal requirement to use suitable for large organizations with IT systems critical to their business objectives |
|
Asset Identification
|
identify assets
“anything which needs to be protected” of value to organization to meet its objectives tangible or intangible in practice try to identify significant assets draw on expertise of people in relevant areas of organization to identify key assets identify and interview such personnel see checklists in various standards |
|
Threat Identification
|
to identify threats or risks to assets ask
1.who or what could cause it harm? 2.how could this occur? threats are anything that hinders or prevents an asset providing appropriate levels of the key security services: confidentiality, integrity, availability, accountability, authenticity and reliability assets may have multiple threats |
|
Threat Identification
|
depends on risk assessors experience
uses variety of sources natural threat chance from insurance stats lists of potential threats in standards, IT security surveys, info from governments tailored to organization’s environment and any vulnerabilities in its IT systems |
|
Analyze Risks
|
specify likelihood of occurrence of each identified threat to asset given existing controls
management, operational, technical processes and procedures to reduce exposure of org to some risks specify consequence should threat occur hence derive overall risk rating for each threat risk = probability threat occurs x cost to organization in practice very hard to determine exactly use qualitative not quantitative, ratings for each aim to order resulting risks in order to treat them |
|
Risk Treatment Alternatives
|
risk acceptance
risk avoidance risk transferal reduce consequence reduce likelihood |
|
Controls or Safeguards
|
controls or safeguards are
practices, procedures or mechanisms which may protect against a threat, reduce a vulnerability, limit the impact of an unwanted incident, detect unwanted incidents and facilitate recover classes of controls: management operational technical |
|
Cost-Benefit Analysis
|
conduct to determine appropriate controls
greatest benefit given resources available qualitative or quantitative show cost justified by reduction in risk contrast impact of implementing it or not management chooses selection of controls considers if it reduces risk too much or not enough, is too costly or appropriate fundamentally a business decision |
|
Security Training / Awareness
|
responsible personnel need training
on details of design and implementation awareness of operational procedures also need general awareness for all spanning all levels in organization essential to meet security objectives lack leads to poor practices reducing security aim to convince personnel that risks exist and breaches may have significant consequences |
|
Implementation Follow-up
|
security management is cyclic, repeated
need to monitor implemented controls evaluate changes for security implications otherwise increase chance of security breach have a number of aspects which may indicate need for changes in previous stages of process |
|
Security Compliance
|
audit process to review security processes
to verify compliance with security plan using internal or external personnel usually based on checklists to check suitable policies and plans were created suitable selection of controls were chosen that they are maintained and used correctly often as part of wider general audit |
|
Incident Handling
|
need procedures specifying how to respond to a security incident
given will most likely occur sometime reflect range of consequences on org codify action to avoid panic e.g. mass email worm exploiting vulnerabilities in common apps propagating via email in high volumes should disconnect from Internet or not? |
|
Responding to Incidents
|
need documented response procedures
how to identify cause of the security incident describe action taken to recover from it procedures should identify typical categories of incidents and approach taken to respond identify management personnel responsible for making critical decisions and their contacts whether to report incident to police / CERT etc |
|
Case Study: Silver Star Mines
|
given risk assessment, identify controls
clearly many categories not in use general issue of systems not being patched or upgraded plus need for contingency plans SCADA: add intrusion detection system info integrity: better centralize storage email: provide backup system |