20
Information Systems Security Operations Security Domain #9

Information Systems Security Operations Security Domain #9

Embed Size (px)

Citation preview

Page 1: Information Systems Security Operations Security Domain #9

Information Systems Security

Operations Security

Domain #9

Page 2: Information Systems Security Operations Security Domain #9

Operations Security Objectives

Operations Responsibility & Personnel Configuration Management Media Access Protection System Recovery Facsimile Security Vulnerability and Penetration Testing Attack Types

Page 3: Information Systems Security Operations Security Domain #9

Computer Operations

Fixing Hardware and software issues Media Libraries Controlling Remote Access Contingency Planning Incident Handling Licensing Issues Input Controls Backup and Recovery

Page 4: Information Systems Security Operations Security Domain #9

Threats to Operations

Disclosure Destruction Loss of system and network capabilities Corruption and Modification Theft Espionage Hackers/Crackers Malicious Code

Page 5: Information Systems Security Operations Security Domain #9

Issues

Backup Maintenance Change workstation/location

– Used to improve security

Need to Know Required Least Privilege Principle Enforced Due Care Due Diligence

– U.S. Federal Sentencing Guidelines of 1991 Up to 290M for non-performance

Page 6: Information Systems Security Operations Security Domain #9

Security Control Types

Directive control– Used to guide the security implementation

Preventive control– Can deter or mitigate undesirable actions

Detective control– Verifies whether a control has been successful

Corrective control– Used to reverse the effects of an unwanted

activity

Page 7: Information Systems Security Operations Security Domain #9

Examples

Directive – policies, standards, laws Preventive – firewalls, authentication,

access controls, antivirus software Detective – audit trails, logs, CCTV, CRC Corrective – incident handling, fire

extingiuishers

Page 8: Information Systems Security Operations Security Domain #9

Vulnerability Testing

Things to agree upon– Goals of the assessment– Written agreement from management– Explaining testing ramifications– Understand results are just a ‘snapshot’

Page 9: Information Systems Security Operations Security Domain #9

Steps in Testing

Reconnaissance– Obtain info either passively or actively

Sniffing, eavesdropping, ARIN, Whois, etc.

Scanning– ID systems that are running and active services

Ping sweeps and port scans

Gaining Access– Exploiting vulnerabilities to gain access

Buffer overflow, brute force

Page 10: Information Systems Security Operations Security Domain #9

More Steps

Maintaining Access– Uploading software to ensure reentry

Trojan Horse, backdoor

Covering Tracks– Hide one’s malicious activities

Delete system and application logs

Page 11: Information Systems Security Operations Security Domain #9

Honeypots

Usually placed in DMZ– Should not be connected to internal network

Sacrificial lamb system Goal is that hackers will attack this system

instead of production system Leaves many ports open and services

running to be more ‘enticing’

Page 12: Information Systems Security Operations Security Domain #9

Sensitive Media Handling

Marking Handling Storing Destruction Declassification

Page 13: Information Systems Security Operations Security Domain #9

Continuity of Operations

Fault Tolerance– Software– Hardware

Data Protection– RAID 0, 1, 5, 10

Redundant Communications– Phone, Broadband, Wireless, Satellite

Redundant Power Supplies

Page 14: Information Systems Security Operations Security Domain #9

Auditing

Auditing Basics– Logs, monitors, and triggers

Accountability, Compliance Audit trails Sampling and clipping levels External auditors

Page 15: Information Systems Security Operations Security Domain #9

Monitoring Tools

Warning banners Keystroke monitoring Traffic analysis CCTV

Page 16: Information Systems Security Operations Security Domain #9

More Terms

Ethical Hacking War dialing Radiation monitoring Dumpster diving Social engineering

Page 17: Information Systems Security Operations Security Domain #9

Physical Security

Facility Location and construction Electrical Issues Perimeter Protection Physical Intrusion Detection Fire Prevention

Page 18: Information Systems Security Operations Security Domain #9

Threats

Physical Damage Theft of Assets Interruption of Service Disclosure of Proprietary Information Natural Disaster Vandalism Terrorism

Page 19: Information Systems Security Operations Security Domain #9

Administration Controls

Facility construction Site management Personnel controls Emergency procedures Awareness training

Page 20: Information Systems Security Operations Security Domain #9

Technical Controls

Access controls Alarms CCTV/Monitors HVAC Power Supplies Fire detection and suppression