SlideShare ist ein Scribd-Unternehmen logo
1 von 79
Security Threats and Controls
Cryptography and Access Control
CCSD SECURITY
ESSENTIAL
Trainer Profile
LEO LOURDES
(MBA IT Management, BoM Hons. HRM)
Implementer of ISO 20000-1:2011
Certified in COBIT® 5
Certified in ISO 9001 Auditor (PECB)
Certified in PRINCE2® in Project Management
Certified in ITIL® Practitioner
Certified in ITIL® Intermediate Certificate in IT Service Operation
Certified in ITIL Information Security based on ISO/IEC 27002
Certified in ITIL for Cloud Computing
Certified in ITIL IT Service Management
Certified in Coaching and Calibration Skills for Call Center
Certified in Delivering Learning / Teaching by City & Guilds, United Kingdom
wecare@thinkleosolutions.com
+6012-311 6457 / +6016-349 1793
Experience:
Management Representative (MR) ISO 20000-1: 2011
IT Service Management (Incident, Problem, Change) Manager
Security, Compliance & Risk Management
Senior CRM Delivery Analyst
Certified Trainer
Certified IT Auditor & Consultant
The CIA Triad
Availability
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Confidentiality Terms
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Term Definition
Sensitivity The level of damage or harm that could occur if the asset is revealed or
disclosed.
Discretion The ability for a person to control the level of access to, or disclosure of,
an asset.
Criticality The level of importance of an asset to the mission or objective.
Concealment The act of hiding or preventing disclosure of an asset.
Secrecy The practice of preventing or limiting information disclosure.
Privacy The protection of confidential or personal information.
Seclusion The act of storing something in a location that is out of the way, and thus
not easily observed or found.
Isolation The act of keeping something separate from other things that are similar
in nature.
Integrity Terms
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Term Definition
Accuracy The degree to which the data is correct and precise.
Truthfulness The quality of a source of information being factual and realistic.
Validity The quality of an asset being factually or logically sound.
Authenticity The quality of an asset being genuine.
Accountability The condition of a person or entity being held responsible for their
actions.
Responsibility The obligation of a person or entity to take ownership of their actions.
Completeness The quality of an asset that has all its necessary parts or components.
Comprehensiveness The quality of an asset being complete in scope, and fully inclusive of all
relevant elements.
Availability Terms
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Term Definition
Usability The degree to which an asset can be easily learned, understood, utilized,
or controlled by a subject.
Accessibility The assurance that an asset can, under the widest range of circumstances,
be used by a subject, regardless of their capabilities or limitations.
Timeliness The quality of an asset, particularly information, being prompt and
available within a reasonable time frame, and with low latency.
Common Security Terms (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Term Definition
Asset Anything of value that could be compromised, stolen, or harmed, including
information, systems, personnel, physical resources, and reputation.
Threat Any event or action that could potentially cause damage to an asset or an
interruption of services.
Threat actor A person, group, or other entity that could potentially attack, damage, or
otherwise compromise a system or resource.
Vulnerability A condition that leaves the system and its assets open to harm—including
such things as software bugs, insecure passwords, inadequate physical
security, poorly designed networks, or insufficient user training and
awareness.
Exploit A technique that takes advantage of a vulnerability to perform an attack.
Risk The likelihood of a threat occurring, as well as its potential damage to
assets.
Control A countermeasure that you put in place to avoid, mitigate, or counteract
security risks due to threats or attacks; also known as a safeguard.
Common Security Terms (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Term Definition
Attack The active attempt by a threat actor to break into and exploit a vulnerable
system, data, or other resource.
Breach The result of a successful attack. Can include theft, destruction, or loss of
availability of data, a system, or other resources.
Exposure The level, usually expressed in percentage, to which a resource is at direct
risk of attack.
Social engineering The practice of using deception and trickery against human beings as a
method of attack.
Defense in depth The practice of providing security in multiple layers for more
comprehensive protection against attack.
• Methods of exercising control and management over an organization.
• Seeks to mitigate security risk.
• Turns a reactionary security culture into a proactive one.
• Supports business objectives to minimize cost and disruption.
• A major objective is compliance.
• Compliance assures that the organization operates within regulatory requirements.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Security Governance
Organizational Governance Structure
Board of Directors/CEO
CISO
Security Department
Management
Staff
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Structure of an organization can impact its security.
• Who is responsible for what? Who do they report to?
• Different levels responsible for different security requirements and tasks.
The Organizational Culture's Impact on Security
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Security professionals must advise decision makers based on risk.
• Cost prohibits 100% security.
• Tosupport business constraints:
• Assess risk and determine needs.
• Implement policies and controls to mitigate risk.
• Promote awareness of expectations.
• Monitor and evaluate effectiveness of the controls.
• Use as input in next risk assessment.
• IT is the business, and the business is IT.
• Not separate function; integral to the business.
• Business makes money from IT platform.
• Recognize mutual nature of security and business.
Security and Business Alignment
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Roles and Responsibilities (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Role Responsibility
End Users • Protect information on a daily basis.
• Adhere to security policies.
• Be mindful of everything they do.
• Report security issues.
Administrative Assistants • First line of defense against social engineering.
• Screen phone calls for executives.
Help Desk/Service Desk
Administrators
• Answer user questions about system problems.
• Help desk calls may indicate security issues.
Physical Security • First line of defense regarding physical location of assets.
• Can work with external law enforcement.
• Role may be integrated with information systems security.
Information Systems/IT
Professionals
• Design security controls into information systems.
Information Systems
Security Professionals
• Inform executive management of security concerns and suggest solutions.
Roles and Responsibilities (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Role Responsibility
Information Systems
Auditors
• Determine whether systems and personnel are in compliance.
• Check configuration and design, implementation and operation of systems.
Business Continuity
Planners
• Develop contingency plans to prepare for incidents.
Data/Information
Custodians
• Implement access control levels based on data owner’s specifications.
• Back up data to ensure recovery after loss or corruption.
Data/Information/
Business Owners
• Classify data.
• Determine level of access to data.
Security Administrators • Manage access to information systems.
• Keep logs of all requests for access.
• Provide logs to auditor.
Network/Systems
Administrators
• Keep network infrastructure running to ensure availability.
• Physically implement access controls to data.
Executive Management • Protect information assets of organization.
• May include Chief Information Officer (CIO).
• May also include Chief Information Security Officer (CISO)
• Protects all business information from loss and disclosure.
• Works with individuals to ensure policies, procedures, and other documents are
implemented.
• May also run the organization’s incident response team.
• Supports governance activities.
• Develops programs to review security from several viewpoints.
• Must balance security needs with business objectives, especially when limited by
cost or time.
CISO Role
Copyright © 2019 Logical Operations, Inc. All rights reserved.
CISO Responsibilities (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Role Responsibility
Understand the business • Become knowledgeable about business operation and goals.
• Understand vision and mission, and how IT security helps to meet goals.
• Be a member of the management team.
• Provide security guidance to entire organization.
Stay informed • Be up to date on changing threat environment.
• Be aware of emerging technologies that provide security solutions.
Budget • Develop and justify security budget.
• Communicate budget needs to senior management to ensure approval.
• Ask for needs rather than wants.
Develop • Develop security policies, procedures, baselines, standards, and guidelines.
• Develop organization-wide security awareness programs.
• Develop security management skills within the security organization.
Train • Ensure user and management training in information security protection.
• Train security staff in new threats, new safeguards, and current operations.
CISO Responsibilities (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Role Responsibility
Ensure compliance • Ensure compliance to laws, regulations, and policies within areas controlled by
information security.
• Coordinate with legal department as necessary.
Promote awareness • Promote an organization-wide climate of security awareness.
• Communicate importance of business continuity and disaster recovery
planning.
Inform • Be conduit for security information in the organization.
• Provide frequent status updates on security environment.
• Provide advance information about pending changes to help plan training.
Measure • Measure security effectiveness by conducting penetration testing and other
similar activities.
• Work with auditors to determine weaknesses.
Assist • Assist senior management in understanding information security requirements.
• Assist application designers and developers to provide security in new and
existing systems.
Report • Report security accomplishments and limitations to senior management.
• Provide details regarding security violations.
Security Goal Categories
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Goal Description
Strategic • Align with business and information technology goals.
• Long horizon (3-5 years or more).
• Ex: establish security policies and ensure all users understand
responsibilities.
Tactical • Provide broad initiatives necessary to support goals of strategic plan.
• May consist of multiple projects.
• Usually 6-18 month time period.
• Ex: implement disaster recovery programs and customer relationship
management.
Operational • Specific short-term goals.
• Put tactical plan into practice.
• Ensure that individual projects are completed with milestones.
• Ex: perform project-wise risk assessment and development of security
policies.
Control Frameworks
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Minimizes risk in an organization by creating a structure for security controls.
• Meet the following criteria:
• Consistent
• Measurable
• Standardized
• Comprehensive
• Modular
• Awareness of and adherence to contractual obligations, relevant laws, and/or
regulations.
• Can be:
• Set forth by governments and other private organizations.
• Internal and self-imposed.
• Consult with legal department to determine how laws and regulations impact
security operations.
• A well-rounded compliance program helps with overlapping or confusing regulatory
requirements
• Compliance may be required for an Authorization to Operate.
• U.S. Federal government agencies
• Formal acceptance of risk and approval to use a product
Compliance
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Security professionals must understand all laws that apply to their organization.
• Specific conditions must be met in certain cases.
• Identify any safe harbors that could help the organization avoid penalties.
• Safe harbors are practices or actions that are deemed not to be in violation of the law.
• Policies and other documentation should be consistent with applicable laws and
regulations.
• There are different types of laws; not all laws are regulatory in nature.
Legislative and Regulatory Compliance
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Computer Crime
Government
Database
Classified Information
Attack
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Breach
• An incident that results in release or potential
exposure of secure information.
• Can be true test of legal compliance.
• If organization performs due care to comply with laws,
breach’s effects may be mitigated.
• Organization can also avoid severe legal penalties.
• Especially a concern with privacy laws, as many
breaches expose customer PII.
• Consequences for compliance failure are magnified
under a breach.
• Most laws require timely notification in the event of a
breach.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Industry Standards (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
IT/Information Security Standard Description
PCI DSS • Specifies how organizations handle information security for major
card brands.
• Compliance validated on annual basis.
• Organizations or merchants that accept, transmit, or store
cardholder data from these brands must comply.
NIST SP 800 series • Various publications establish computer security standards,
including:
• SP 800-12: An Introduction to Computer Security: The NIST
Handbook
• SP 800-14: Generally Accepted Principles and Practices for
Securing Information Technology Systems
• SP 800-33: Underlying Technical Models for Information
Technology Security
• SP 800-53: Security and Privacy Controls in Federal Information
Systems and Organizations
Industry Standards (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
IT/Information Security Standard Description
COBIT 5 Standards for IT management and governance, promoting five
principles:
• Meeting stakeholder needs.
• Covering the enterprise end-to-end.
• Applying a single, integrated framework.
• Enabling a holistic approach.
• Separating governance from management.
ISO/IEC 27001 Focuses on topics in information security management:
• Responsibilities and procedures.
• Reporting information security events.
• Reporting information security weaknesses.
• Assessment of and decision on information security events.
• Response to information security incidents.
• Learning from information security incidents.
• Collection of evidence.
• Lack of documentation creates organizational chaos.
• Documentation provides a framework for people to work together in achieving
organizational goals.
• Security documentation can also act as a road map to governance.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
The Value of Security Documentation
Security Document Types
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Security Document Type Description
Policy High-level statement of management intentions. Contains purpose, scope, and
compliance expected of every employee.
Example: Information security will ensure the protection of information by
implementing security best practices.
Standard Required implementation or use of tools.
Example: The corporation must implement 802.1x security for all wireless
networks.
Guideline Recommended or suggested action or best practice.
Example: When travelling with laptops, users should use safety precautions to
prevent laptop theft, damage, or data loss.
Procedure Step-by-step description of how to implement a system or process.
Example: Toimplement Secure Shell (SSH) on the router, enter the enable mode
and then enter the appropriate commands for the router.
Baseline Minimum security required for a system or process.
Example: Trivial File Transfer Protocol (TFTP) must be disabled in all servers except
for those specifically used for the TFTP service.
Security Planning
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Security Planning Effort Description
Strategic planning • Long-term (three- to five-year) planning process.
• Focuses on major security changes in an organization.
• Processes such as mergers and acquisitions could trigger a plan review.
Tactical planning • Mid-term process (6 to 18 months).
• For example, a move to RADIUS for authentication could take a year to
complete.
Operational and project
planning
• Near-term, per-project basis.
• Supports milestones and completion dates that are communicated
regularly.
• For example, planning for a penetration test in three months.
• Objectives that security policies can fulfill:
• Inform employees about their security-related duties and responsibilities.
• Define an organization’s security goals.
• Outline a computer system's security requirements.
• Objectives depend on the organization’s specific requirements.
• Policies should be long enough to explain but short enough to be understood.
• All employees should have access to the policy.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Security Policy Objectives
Security Policy Types
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Security Policy Type Description
Advisory • Indicates certain types of actions as being more appropriate or effective
than others.
• Includes consequences and reprimands that may occur if actions are not
as indicated.
• Commonly indicate how to handle private documentation and money.
Informative • Provides data to employees on a specified subject.
• Includes no ramifications.
• Often used as instructional instruments.
Regulatory • Addresses industry regulations regarding the conduct of organizations.
• Commonly used for health care and financial organizations.
The Relationship Between Security Document Types
Laws and Requirements
Strategic
Tactical
Operational
Standards
Mandatory
implementation
Guidelines
Recommended actions
Procedures
Step-by-step
instructions
Baselines
Consistent comparison
points
Policies
Statement of management
intentions
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Policy Types:
• Advisory
• Informative
• Regulatory
• Comprehensively identify all assets in the organization.
• Waiting until it’s too late will make it harder to recover an asset.
• If you don’t identify an asset, you may not even know when it’s compromised.
• Describe assets in terms of:
• Basic characteristics.
• Value to the company.
• Use on a daily basis.
• Replaceability.
Asset Identification
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• What effort was required to develop or obtain it?
• What does it cost to maintain and protect it?
• How much will we lose in operational functionality if the asset is misplaced or
damaged?
• What would it cost to replace it?
• What enemies might pay for it?
• What liability penalties might occur if the asset is compromised?
Asset Valuation
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Asset Valuation Methods
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Asset Valuation Method Description
Asset management system Contains a detailed record of corporate property and similar assets,
including facilities, furniture, computers, and other real property.
Accounting system Contains additional financial information about assets, such as
expensing the cost to develop software packages.
Insurance valuation Good source of asset valuation due to rigorous analysis of risk of
loss.
Qualitative valuation Narrative descriptions capture expert judgement about asset value.
Areas of Vulnerability
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Vulnerability Area Example Threat and Risk
Physical structure Window accessibility in a room where secure information is stored can
expose vulnerabilities and create a venue for sudden intrusion threats.
Electrical Failure of a vulnerable electrical feed can threaten system data.
Software Worms, viruses, and Trojans threaten systems.
Network Unencrypted data on network can be vulnerable to interception and exploit.
Personnel Key trained personnel must be available to deal with critical events to avoid
corporate-wide vulnerabilities.
Hardware Losses due to theft and physical damage generate costs for replacement and
lost productivity.
Documentation If poorly written, can cause confusion and impair decision making.
Organization must protect integrity and confidentiality of sensitive
documentation.
Process Outdated or inefficient processes can impair business operations; poor
security processes weaken defenses and increase risk.
Identify Threats
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Threat Type Description
Natural disasters • Earthquakes
• Wildfires
• Flooding
• Excessive snowfalls
• Tsunamis
• Hurricanes
• Tornados
• Landslides
Man-made disasters Intentional:
• Arson
• Terrorist attacks
• Political unrest
• Break-ins
• Theft of equipment and/or data
• Equipment damage
• File destruction
•Information disclosure
Unintentional:
• Employee mistakes
• Power outages
• Excessive employee illnesses or epidemics
• Information disclosure
Control Selection Criteria
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Selection criteria:
• Cost effectiveness
• Risk reduction
• Practicality
• Additional details to consider:
• Can the control be audited?
• Is the control from a trusted source?
• Can the control be consistently applied?
• Is the control reliable?
• Is the control independent from other controls?
• Is the control easy to use?
• Can the control be automated?
• Is the control sustainable?
Safeguard Cost/Benefit Analysis
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Determine if the safeguard is worth the money.
• Also be confident that the solution meets requirements.
• Be sure to consider total cost:
• Initial purchase price and installation and configuration costs.
• Annual maintenance and licensing costs.
• Internal soft costs for configuration, management, and maintenance.
• Percentage of risk coverage.
• Scalability, upgradeability of solution.
• Most solutions do not completely remediate a risk.
• Administrative
• Covers personnel security, risk management, training, permissions, etc.
• Physical
• Limit a person’s physical access to assets or facilities, using locks, doors, fences, etc.
• Example: Infrared monitoring system can detect the presence of an intruder.
• Technical
• Also known as logical controls.
• Implemented in computing environments like operating systems, applications, databases,
network devices, etc.
• Prefer physical or technical controls, as administrative controls require manual
enforcement.
Control Types
User
***
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Administrative Physical Technical
• Not just simple pass-fail results or generating paperwork for an audit.
• Well-executed assessment determines validity and effectiveness of controls.
• Can expose strengths and weaknesses of current systems.
• Helps identify a plan for correcting weaknesses.
Monitoring and Measuring
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Ongoing effort to optimize policies and processes.
• A function of risk management.
• Includes best practices:
• Continuously seek to discover new vulnerabilities.
• Be context aware in your risk analysis.
• Prioritize your efforts to vulnerabilities
that actually pose a significant risk.
• Determine patchability.
Continuous Improvement
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Threat Types (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Threat Type Description
Cryptojacking • Unauthorized use of someone else's computing device to mine cryptocurrency.
• Devices can include computers, phones, routers, IoT devices.
Advanced Persistent Threat
(APT)
• Stealthy attack.
• Intruder remains undetected for a lengthy period of time.
• Usually sponsored by nation states or organizations that have considerable
resources.
Phishing and social
engineering
• Attackers use psychological tactics to manipulate victims into disclosing
information or performing an action that they shouldn’t.
• Phishing is the most common form.
• Uses email with malicious attachments or links.
Insider threat • Disgruntled employees and others with internal access.
• Use their access privilege or knowledge to steal data or damage systems.
• Can also be accidental/unintentional.
Malware • Any software intended to damage a computer system.
• Can be distributed through email, websites, file sharing, social media, even
legitimate published software.
• Includes viruses, worms, Trojans, keyloggers, rootkits, bootkits, ransomware,
spyware, etc.
Threat Types (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Threat Type Description
Denial of service • Any attack that consumes computer or network resources so the system
cannot service legitimate client requests.
• Can be conducted against:
• Network
• CPU
• RAM
• Disk space
• Maximum allowed connections
Unauthorized network
access
• Deliberate or accidental.
• Normal security controls are bypassed.
Injection and Cross-Site
commands
• Malicious commands hide inside normal browser activity.
• Includes command and SQL injection, XSS, and XSRF.
Session Hijacking/
Man-in-the-Middle
• Attacker takes over legitimate network connection, often after user has
authenticated.
• Employees are the weakest link in security.
• Help employees understand:
• Risks
• Impact for company and themselves
• Security policies and procedures
• Focus on attitude, motivation, and attention.
Security Awareness
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Security Training
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• A clearly defined target audience.
• Training objectives mapped to desired increases in on-the-job
security practices.
• Training outcomes that can be quantified and measured.
• Variations and customizations for different job roles and levels.
• Provisions for updates and refresher training sessions.
• Process of allowing only authorized entities to observe/modify/take possession of a
computer system or physical property.
• Subject – entity requesting access:
• Person.
• System.
• Process.
Access Control
• Object – entity being accessed – any resource.
• Limits subject’s access to object using predefined rules/roles/labels.
Subjects Objects
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Types of Access Control Services
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Access Control Service Description
Identification and
Authentication (I&A)
• Provides unique identifier for each authorized subject attempting to access
the object.
• Includes method or methods to ensure identity of subject (authentication).
• Typically administered with Identity Management System and support of a
directory.
Authorization • Determines the capabilities or rights of the subject when accessing the
object.
Audit • Creates a log or record of system activities.
Accountability • Reports and reviews the contents of log files.
• Each subject identifier must be unique to relate activities to one subject.
Identity and Access Provisioning Lifecycle
Provisioning
Review
Revocation/
Deprovisioning
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Facilities Access
Logical Access Concern Mitigation
Electronic intrusion into network. • Establish logical perimeter.
Hijacking networked utilities/industrial control
system.
• Harden network utilities with strong
authentication/authorization.
Remote tampering of networked physical access
mechanisms.
• Continuous monitoring of access granted by
networked mechanisms.
Physical Access Concern Mitigation
Unauthorized people entering facility. • Establish physical perimeter.
• Use guards, entrance/exit checkpoints.
Unauthorized people attempting to enter facility. • Security cameras.
Unrestricted access to all areas within facility. • Create physical security zones within building.
• Use guards or doors requiring ID card.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Systems Access
Logical Access Concern Mitigation
Attacker access to configuration consoles. • Administrator configuration of systems.
• Change default administrator password.
Remote access to a critical system by an attacker. • Establish authentication and authorization in
remote services.
Physical Access Concern Mitigation
Physical damage to server. • Segment servers behind closely guarded rooms.
Physical damage to networking equipment. • Equipment lockers.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Device Access
Logical Access Concern Mitigation
Attacker accessing the configuration console. • Strong user name/passwords.
• Change default passwords.
Unrestricted access to workstations. • Require authentication/authorization
mechanisms.
Age of device mobility and BYOD (often pass
beyond perimeter).
• Implement mobile device management.
• Require PIN use.
Physical Access Concern Mitigation
Device theft. • Physical locks on devices.
Device loss. • Locking up phones/tablets.
• Require PIN use.
Unmonitored access to background wireless
connections.
• Turn off Bluetooth, NFC, geo-locating unless
required.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Information Access
Logical Access Concern Mitigation
Databases with sensitive information are prime
targets.
• Isolate database from rest of network.
• Use authentication/authorization mechanisms.
Inability to determine who is using remote
connections.
• Implement remote authentication protocols.
All accounts allow full access to data. • Set up varied levels of access permissions.
Physical Access Concern Mitigation
Attackers simply walking out with a bunch of
servers.
• Lock and monitor server rooms/data centers.
Hard copies of sensitive information. • Keep hard copies in locked file cabinets/safes.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Or “authentication by possession.”
• Device that must be physically present to be used for access.
• Theft of device:
• Prevents access for authorized user.
• May allow access by unauthorized user.
• Often used together with a PIN/password for two-factor authentication.
Something You Have
PIN
Password
User Information
Unique Value
Two-factor authentication
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Or “authentication by characteristic.”
• Uses personal attributes:
• Fingerprints.
• Hand geometry.
• Retina scans.
• Iris scans.
• Facial recognition
• Voiceprints.
Something You Are
Fingerprint Scanner
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• A single instance of identification and authentication applied to resources.
• Permissions won’t change for duration of session.
• Lock session:
• Timeouts.
• Screensavers.
Session Management
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Federated Identity
Single identity linked across many different identity management systems.
Microsoft
Account
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Centralized authentication system.
• Provides consistent/scalable mechanism to control access:
• Applications.
• Services.
• Systems.
• Common examples:
• X.500.
• LDAP.
• Active Directory.
Directory Services
Authentication
Centralized
Administration
Copyright © 2019 Logical Operations, Inc. All rights reserved.
LDAP
LDAP Client
LDAP Server
LDAP Client
Signed certificate
Trusted session
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Microsoft’s LDAP-compatible directory implementation.
• Structures objects within an organization into a hierarchy.
• Allows administrators to centrally manage access using access control lists.
• Can subdivide the domain into organizational units.
Active Directory
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Kerberos
Ticket
Ticket
User passes credentials to
an authentication server
Copyright © 2019 Logical Operations, Inc. All rights reserved.
The Kerberos Process
1. I (user) need to authenticate and I need a ticket.
2. Here is a TGT.
3. Here is my TGT; now I need an ST.
4. Here is your ST.
5. Here is my ST secure connection to the File Server.
6. Resource authenticates user and allows access via a secure connection.
File Server
Key Distribution
Server
Authentication Server
Ticket Granting Server
1 2
3
4
5
6
User
Copyright © 2019 Logical Operations, Inc. All rights reserved.
SSO
• Allows a user to authenticate once and receive access to a number of related but
independent software systems.
• SSO often considered a subset of Identity Federation.
• Benefits:
• Compromised credentials quickly regained by single action.
• Central server minimizes burden of logging in and monitoring user logins.
• Easy to use because only have to remember one password.
• Security considerations:
• Compromise of single set of credentials allows access to multiple systems.
• If authentication servicer becomes unavailable, the entire system might become
unavailable.
• Need multiple levels of authentication to ensure secure SSO system.
Email
File Server
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cryptography
Unprotected
Data
Encryption
Protected
Data
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Encryption and Decryption
Encryption Ciphertext
Plaintext
Ciphertext Decryption Plaintext
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Rule/system/mechanism used to encrypt data.
• Also known as an encryption algorithm.
• Stronger, more complex algorithm = more difficult to break.
Ciphers
Original
Information
Cipher
Encrypted
Information
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Key Clustering
Original Information
Cipher
U@5 U@5
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Steganographic techniques include:
• Hiding information in blocks.
• Hiding information within images.
• Invisibly altering structure of a digital image.
Steganography
Vessel Image
Secret Data
Steganographic
Image
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Symmetric Encryption
Encrypts Data Decrypts Data
Same Key on Both Sides
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Data Encryption Standard (DES)
• Triple DES (3DES)
• Advanced Encryption Standard (AES)
• Blowfish
• Twofish
• IDEA
• Skipjack
• Rivest Cipher (RC) 4, 5, and 6
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Symmetric Encryption Algorithms
Symmetric Algorithm Comparison Chart
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Algorithm Block Size (bits) Key Size (bits) Rounds
AES 128 128, 192, 256 10, 12, 14
Rijndael Variable (multiples of 32) 128, 192, 256 9, 11, or 13 depending on
key/block size
Blowfish 64 32 - 448 16
DES 64 56 (+ 8 parity bits) 16
3DES 64 112 or 168 48
IDEA 64 128 8
RC2 64 128 18
RC4 n/a 40 - 2048 (typically 40 - 128) 1
RC5 32, 64, 128 0 - 2040 0 - 255
RC6 128 128 - 2040 Variable (20 recommended)
Skipjack 64 80 32
Twofish 128 128, 192, 256 16
• Symmetric encryption benefits:
• Good performance
• Well suited to encrypt both data at rest and data in transit.
• The greatest challenge is key management.
• Both parties must agree upon the key ahead of time.
• If the key gets compromised, all files and communications encrypted with that key have
also been compromised.
• A new key must be issued, with both parties again communicating ahead of time to agree
upon the key.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Symmetric Encryption Considerations
Asymmetric Encryption
Public Key Encrypts Private Key Decrypts
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Rivest Shamir Adelman (RSA)
• Diffie-Hellman (DH)
• Elliptic Curve Cryptography (ECC)
• Diffie-Hellman Ephemeral (DHE)
• Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)
• ElGamal
• Digital Signature Algorithm (DSA)
• Knapsack
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Asymmetric Encryption Techniques
Asymmetric Algorithm Comparison Chart
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Asymmetric
Algorithm
Based On Common Use
RSA Factors (products of large prime numbers) Digital certificates, digital signatures
DH Handshake Key exchange
ECC Elliptic curves Smart cards, wireless, realtime
communications
ElGamal DH OpenPGP, GnuGPG
DSA Modular exponentiation and the discrete
logarithmic problem
FIPS-compliant digital signatures
Knapsack Mathematical knapsack problem Early public key-based encryption
• Asymmetric encryption is generally stronger than symmetric encryption.
• More flexible key management.
• Asymmetric algorithms have significantly lower performance than symmetric
algorithms.
• Asymmetric algorithms are used to encrypt only short amounts of data such as
another encryption key.
• It is very common to use a combination of both methods.
• The biggest issue, besides performance, is the liability a person incurs if they lose
their private key.
• The private key should never be exposed.
• It is always stored in a non-paged part of kernel memory.
• If you put it on a smart card or other removable media, you must encrypt it (typically with a
password or other symmetric key).
• If someone steals your private key, they could impersonate you, getting you into legal
trouble.
• Compromised keys should immediately be revoked and reissued.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Asymmetric Encryption Considerations
Hashing
Message
This is a secret
Hash
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Hash Function
Hashing is one-way encryption
508FF7A91DB0A80A1
3151F786FBB6E43
• MD2
• MD4
• MD5
• HAVAL
• SHA
• NTLM versions 1 and 2
• RIPEMD
• HMAC
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Hashing Algorithms
Salting the Hash
• Adding a random number to the input of a hashing function to create unique hash
values.
Message
Secret
Hash
Hash Function
1
Copyright © 2019 Logical Operations, Inc. All rights reserved.
END

Weitere ähnliche Inhalte

Was ist angesagt?

CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1Hamed Moghaddam
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgEric Vanderburg
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset SecurityHamed Moghaddam
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 

Was ist angesagt? (20)

CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Information Security
Information SecurityInformation Security
Information Security
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Information Security
Information SecurityInformation Security
Information Security
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
Lesson 1 - Introduction
Lesson 1 - Introduction Lesson 1 - Introduction
Lesson 1 - Introduction
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 

Ähnlich wie )k

Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 
Case Study
Case StudyCase Study
Case Studylneut03
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general attSHIVA101531
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance EyesOpen Association
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 

Ähnlich wie )k (20)

Topic11
Topic11Topic11
Topic11
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
Case Study
Case StudyCase Study
Case Study
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 

Mehr von Anne Starr

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020Anne Starr
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020Anne Starr
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)Anne Starr
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Anne Starr
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400Anne Starr
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00Anne Starr
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
CloudhnologysstecociatAnne Starr
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
CmbysantocsddshAnne Starr
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
CddmbysantcsoshAnne Starr
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh Anne Starr
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodmsAnne Starr
 
Serskmanagvicedeement
SerskmanagvicedeementSerskmanagvicedeement
SerskmanagvicedeementAnne Starr
 
foundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigilefoundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigileAnne Starr
 

Mehr von Anne Starr (20)

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020
 
Ccsddm5days
Ccsddm5daysCcsddm5days
Ccsddm5days
 
Dayblic
DayblicDayblic
Dayblic
 
Day1cspbeblic
Day1cspbeblicDay1cspbeblic
Day1cspbeblic
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)
 
Sec4
Sec4Sec4
Sec4
 
Securityic2
Securityic2Securityic2
Securityic2
 
inte
inteinte
inte
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
Cmbysantocsddsh
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
Cddmbysantcsosh
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodms
 
Serskmanagvicedeement
SerskmanagvicedeementSerskmanagvicedeement
Serskmanagvicedeement
 
foundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigilefoundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigile
 

Kürzlich hochgeladen

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Kürzlich hochgeladen (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

)k

  • 1. Security Threats and Controls Cryptography and Access Control CCSD SECURITY ESSENTIAL
  • 2. Trainer Profile LEO LOURDES (MBA IT Management, BoM Hons. HRM) Implementer of ISO 20000-1:2011 Certified in COBIT® 5 Certified in ISO 9001 Auditor (PECB) Certified in PRINCE2® in Project Management Certified in ITIL® Practitioner Certified in ITIL® Intermediate Certificate in IT Service Operation Certified in ITIL Information Security based on ISO/IEC 27002 Certified in ITIL for Cloud Computing Certified in ITIL IT Service Management Certified in Coaching and Calibration Skills for Call Center Certified in Delivering Learning / Teaching by City & Guilds, United Kingdom wecare@thinkleosolutions.com +6012-311 6457 / +6016-349 1793 Experience: Management Representative (MR) ISO 20000-1: 2011 IT Service Management (Incident, Problem, Change) Manager Security, Compliance & Risk Management Senior CRM Delivery Analyst Certified Trainer Certified IT Auditor & Consultant
  • 3. The CIA Triad Availability Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 4. Confidentiality Terms Copyright © 2019 Logical Operations, Inc. All rights reserved. Term Definition Sensitivity The level of damage or harm that could occur if the asset is revealed or disclosed. Discretion The ability for a person to control the level of access to, or disclosure of, an asset. Criticality The level of importance of an asset to the mission or objective. Concealment The act of hiding or preventing disclosure of an asset. Secrecy The practice of preventing or limiting information disclosure. Privacy The protection of confidential or personal information. Seclusion The act of storing something in a location that is out of the way, and thus not easily observed or found. Isolation The act of keeping something separate from other things that are similar in nature.
  • 5. Integrity Terms Copyright © 2019 Logical Operations, Inc. All rights reserved. Term Definition Accuracy The degree to which the data is correct and precise. Truthfulness The quality of a source of information being factual and realistic. Validity The quality of an asset being factually or logically sound. Authenticity The quality of an asset being genuine. Accountability The condition of a person or entity being held responsible for their actions. Responsibility The obligation of a person or entity to take ownership of their actions. Completeness The quality of an asset that has all its necessary parts or components. Comprehensiveness The quality of an asset being complete in scope, and fully inclusive of all relevant elements.
  • 6. Availability Terms Copyright © 2019 Logical Operations, Inc. All rights reserved. Term Definition Usability The degree to which an asset can be easily learned, understood, utilized, or controlled by a subject. Accessibility The assurance that an asset can, under the widest range of circumstances, be used by a subject, regardless of their capabilities or limitations. Timeliness The quality of an asset, particularly information, being prompt and available within a reasonable time frame, and with low latency.
  • 7. Common Security Terms (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Term Definition Asset Anything of value that could be compromised, stolen, or harmed, including information, systems, personnel, physical resources, and reputation. Threat Any event or action that could potentially cause damage to an asset or an interruption of services. Threat actor A person, group, or other entity that could potentially attack, damage, or otherwise compromise a system or resource. Vulnerability A condition that leaves the system and its assets open to harm—including such things as software bugs, insecure passwords, inadequate physical security, poorly designed networks, or insufficient user training and awareness. Exploit A technique that takes advantage of a vulnerability to perform an attack. Risk The likelihood of a threat occurring, as well as its potential damage to assets. Control A countermeasure that you put in place to avoid, mitigate, or counteract security risks due to threats or attacks; also known as a safeguard.
  • 8. Common Security Terms (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Term Definition Attack The active attempt by a threat actor to break into and exploit a vulnerable system, data, or other resource. Breach The result of a successful attack. Can include theft, destruction, or loss of availability of data, a system, or other resources. Exposure The level, usually expressed in percentage, to which a resource is at direct risk of attack. Social engineering The practice of using deception and trickery against human beings as a method of attack. Defense in depth The practice of providing security in multiple layers for more comprehensive protection against attack.
  • 9. • Methods of exercising control and management over an organization. • Seeks to mitigate security risk. • Turns a reactionary security culture into a proactive one. • Supports business objectives to minimize cost and disruption. • A major objective is compliance. • Compliance assures that the organization operates within regulatory requirements. Copyright © 2019 Logical Operations, Inc. All rights reserved. Security Governance
  • 10. Organizational Governance Structure Board of Directors/CEO CISO Security Department Management Staff Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 11. • Structure of an organization can impact its security. • Who is responsible for what? Who do they report to? • Different levels responsible for different security requirements and tasks. The Organizational Culture's Impact on Security Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 12. • Security professionals must advise decision makers based on risk. • Cost prohibits 100% security. • Tosupport business constraints: • Assess risk and determine needs. • Implement policies and controls to mitigate risk. • Promote awareness of expectations. • Monitor and evaluate effectiveness of the controls. • Use as input in next risk assessment. • IT is the business, and the business is IT. • Not separate function; integral to the business. • Business makes money from IT platform. • Recognize mutual nature of security and business. Security and Business Alignment Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 13. Roles and Responsibilities (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Role Responsibility End Users • Protect information on a daily basis. • Adhere to security policies. • Be mindful of everything they do. • Report security issues. Administrative Assistants • First line of defense against social engineering. • Screen phone calls for executives. Help Desk/Service Desk Administrators • Answer user questions about system problems. • Help desk calls may indicate security issues. Physical Security • First line of defense regarding physical location of assets. • Can work with external law enforcement. • Role may be integrated with information systems security. Information Systems/IT Professionals • Design security controls into information systems. Information Systems Security Professionals • Inform executive management of security concerns and suggest solutions.
  • 14. Roles and Responsibilities (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Role Responsibility Information Systems Auditors • Determine whether systems and personnel are in compliance. • Check configuration and design, implementation and operation of systems. Business Continuity Planners • Develop contingency plans to prepare for incidents. Data/Information Custodians • Implement access control levels based on data owner’s specifications. • Back up data to ensure recovery after loss or corruption. Data/Information/ Business Owners • Classify data. • Determine level of access to data. Security Administrators • Manage access to information systems. • Keep logs of all requests for access. • Provide logs to auditor. Network/Systems Administrators • Keep network infrastructure running to ensure availability. • Physically implement access controls to data. Executive Management • Protect information assets of organization. • May include Chief Information Officer (CIO). • May also include Chief Information Security Officer (CISO)
  • 15. • Protects all business information from loss and disclosure. • Works with individuals to ensure policies, procedures, and other documents are implemented. • May also run the organization’s incident response team. • Supports governance activities. • Develops programs to review security from several viewpoints. • Must balance security needs with business objectives, especially when limited by cost or time. CISO Role Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 16. CISO Responsibilities (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Role Responsibility Understand the business • Become knowledgeable about business operation and goals. • Understand vision and mission, and how IT security helps to meet goals. • Be a member of the management team. • Provide security guidance to entire organization. Stay informed • Be up to date on changing threat environment. • Be aware of emerging technologies that provide security solutions. Budget • Develop and justify security budget. • Communicate budget needs to senior management to ensure approval. • Ask for needs rather than wants. Develop • Develop security policies, procedures, baselines, standards, and guidelines. • Develop organization-wide security awareness programs. • Develop security management skills within the security organization. Train • Ensure user and management training in information security protection. • Train security staff in new threats, new safeguards, and current operations.
  • 17. CISO Responsibilities (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Role Responsibility Ensure compliance • Ensure compliance to laws, regulations, and policies within areas controlled by information security. • Coordinate with legal department as necessary. Promote awareness • Promote an organization-wide climate of security awareness. • Communicate importance of business continuity and disaster recovery planning. Inform • Be conduit for security information in the organization. • Provide frequent status updates on security environment. • Provide advance information about pending changes to help plan training. Measure • Measure security effectiveness by conducting penetration testing and other similar activities. • Work with auditors to determine weaknesses. Assist • Assist senior management in understanding information security requirements. • Assist application designers and developers to provide security in new and existing systems. Report • Report security accomplishments and limitations to senior management. • Provide details regarding security violations.
  • 18. Security Goal Categories Copyright © 2019 Logical Operations, Inc. All rights reserved. Goal Description Strategic • Align with business and information technology goals. • Long horizon (3-5 years or more). • Ex: establish security policies and ensure all users understand responsibilities. Tactical • Provide broad initiatives necessary to support goals of strategic plan. • May consist of multiple projects. • Usually 6-18 month time period. • Ex: implement disaster recovery programs and customer relationship management. Operational • Specific short-term goals. • Put tactical plan into practice. • Ensure that individual projects are completed with milestones. • Ex: perform project-wise risk assessment and development of security policies.
  • 19. Control Frameworks Copyright © 2019 Logical Operations, Inc. All rights reserved. • Minimizes risk in an organization by creating a structure for security controls. • Meet the following criteria: • Consistent • Measurable • Standardized • Comprehensive • Modular
  • 20. • Awareness of and adherence to contractual obligations, relevant laws, and/or regulations. • Can be: • Set forth by governments and other private organizations. • Internal and self-imposed. • Consult with legal department to determine how laws and regulations impact security operations. • A well-rounded compliance program helps with overlapping or confusing regulatory requirements • Compliance may be required for an Authorization to Operate. • U.S. Federal government agencies • Formal acceptance of risk and approval to use a product Compliance Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 21. • Security professionals must understand all laws that apply to their organization. • Specific conditions must be met in certain cases. • Identify any safe harbors that could help the organization avoid penalties. • Safe harbors are practices or actions that are deemed not to be in violation of the law. • Policies and other documentation should be consistent with applicable laws and regulations. • There are different types of laws; not all laws are regulatory in nature. Legislative and Regulatory Compliance Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 22. Computer Crime Government Database Classified Information Attack Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 23. Data Breach • An incident that results in release or potential exposure of secure information. • Can be true test of legal compliance. • If organization performs due care to comply with laws, breach’s effects may be mitigated. • Organization can also avoid severe legal penalties. • Especially a concern with privacy laws, as many breaches expose customer PII. • Consequences for compliance failure are magnified under a breach. • Most laws require timely notification in the event of a breach. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 24. Industry Standards (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. IT/Information Security Standard Description PCI DSS • Specifies how organizations handle information security for major card brands. • Compliance validated on annual basis. • Organizations or merchants that accept, transmit, or store cardholder data from these brands must comply. NIST SP 800 series • Various publications establish computer security standards, including: • SP 800-12: An Introduction to Computer Security: The NIST Handbook • SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems • SP 800-33: Underlying Technical Models for Information Technology Security • SP 800-53: Security and Privacy Controls in Federal Information Systems and Organizations
  • 25. Industry Standards (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. IT/Information Security Standard Description COBIT 5 Standards for IT management and governance, promoting five principles: • Meeting stakeholder needs. • Covering the enterprise end-to-end. • Applying a single, integrated framework. • Enabling a holistic approach. • Separating governance from management. ISO/IEC 27001 Focuses on topics in information security management: • Responsibilities and procedures. • Reporting information security events. • Reporting information security weaknesses. • Assessment of and decision on information security events. • Response to information security incidents. • Learning from information security incidents. • Collection of evidence.
  • 26. • Lack of documentation creates organizational chaos. • Documentation provides a framework for people to work together in achieving organizational goals. • Security documentation can also act as a road map to governance. Copyright © 2019 Logical Operations, Inc. All rights reserved. The Value of Security Documentation
  • 27. Security Document Types Copyright © 2019 Logical Operations, Inc. All rights reserved. Security Document Type Description Policy High-level statement of management intentions. Contains purpose, scope, and compliance expected of every employee. Example: Information security will ensure the protection of information by implementing security best practices. Standard Required implementation or use of tools. Example: The corporation must implement 802.1x security for all wireless networks. Guideline Recommended or suggested action or best practice. Example: When travelling with laptops, users should use safety precautions to prevent laptop theft, damage, or data loss. Procedure Step-by-step description of how to implement a system or process. Example: Toimplement Secure Shell (SSH) on the router, enter the enable mode and then enter the appropriate commands for the router. Baseline Minimum security required for a system or process. Example: Trivial File Transfer Protocol (TFTP) must be disabled in all servers except for those specifically used for the TFTP service.
  • 28. Security Planning Copyright © 2019 Logical Operations, Inc. All rights reserved. Security Planning Effort Description Strategic planning • Long-term (three- to five-year) planning process. • Focuses on major security changes in an organization. • Processes such as mergers and acquisitions could trigger a plan review. Tactical planning • Mid-term process (6 to 18 months). • For example, a move to RADIUS for authentication could take a year to complete. Operational and project planning • Near-term, per-project basis. • Supports milestones and completion dates that are communicated regularly. • For example, planning for a penetration test in three months.
  • 29. • Objectives that security policies can fulfill: • Inform employees about their security-related duties and responsibilities. • Define an organization’s security goals. • Outline a computer system's security requirements. • Objectives depend on the organization’s specific requirements. • Policies should be long enough to explain but short enough to be understood. • All employees should have access to the policy. Copyright © 2019 Logical Operations, Inc. All rights reserved. Security Policy Objectives
  • 30. Security Policy Types Copyright © 2019 Logical Operations, Inc. All rights reserved. Security Policy Type Description Advisory • Indicates certain types of actions as being more appropriate or effective than others. • Includes consequences and reprimands that may occur if actions are not as indicated. • Commonly indicate how to handle private documentation and money. Informative • Provides data to employees on a specified subject. • Includes no ramifications. • Often used as instructional instruments. Regulatory • Addresses industry regulations regarding the conduct of organizations. • Commonly used for health care and financial organizations.
  • 31. The Relationship Between Security Document Types Laws and Requirements Strategic Tactical Operational Standards Mandatory implementation Guidelines Recommended actions Procedures Step-by-step instructions Baselines Consistent comparison points Policies Statement of management intentions Copyright © 2019 Logical Operations, Inc. All rights reserved. Policy Types: • Advisory • Informative • Regulatory
  • 32. • Comprehensively identify all assets in the organization. • Waiting until it’s too late will make it harder to recover an asset. • If you don’t identify an asset, you may not even know when it’s compromised. • Describe assets in terms of: • Basic characteristics. • Value to the company. • Use on a daily basis. • Replaceability. Asset Identification Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 33. • What effort was required to develop or obtain it? • What does it cost to maintain and protect it? • How much will we lose in operational functionality if the asset is misplaced or damaged? • What would it cost to replace it? • What enemies might pay for it? • What liability penalties might occur if the asset is compromised? Asset Valuation Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 34. Asset Valuation Methods Copyright © 2019 Logical Operations, Inc. All rights reserved. Asset Valuation Method Description Asset management system Contains a detailed record of corporate property and similar assets, including facilities, furniture, computers, and other real property. Accounting system Contains additional financial information about assets, such as expensing the cost to develop software packages. Insurance valuation Good source of asset valuation due to rigorous analysis of risk of loss. Qualitative valuation Narrative descriptions capture expert judgement about asset value.
  • 35. Areas of Vulnerability Copyright © 2019 Logical Operations, Inc. All rights reserved. Vulnerability Area Example Threat and Risk Physical structure Window accessibility in a room where secure information is stored can expose vulnerabilities and create a venue for sudden intrusion threats. Electrical Failure of a vulnerable electrical feed can threaten system data. Software Worms, viruses, and Trojans threaten systems. Network Unencrypted data on network can be vulnerable to interception and exploit. Personnel Key trained personnel must be available to deal with critical events to avoid corporate-wide vulnerabilities. Hardware Losses due to theft and physical damage generate costs for replacement and lost productivity. Documentation If poorly written, can cause confusion and impair decision making. Organization must protect integrity and confidentiality of sensitive documentation. Process Outdated or inefficient processes can impair business operations; poor security processes weaken defenses and increase risk.
  • 36. Identify Threats Copyright © 2019 Logical Operations, Inc. All rights reserved. Threat Type Description Natural disasters • Earthquakes • Wildfires • Flooding • Excessive snowfalls • Tsunamis • Hurricanes • Tornados • Landslides Man-made disasters Intentional: • Arson • Terrorist attacks • Political unrest • Break-ins • Theft of equipment and/or data • Equipment damage • File destruction •Information disclosure Unintentional: • Employee mistakes • Power outages • Excessive employee illnesses or epidemics • Information disclosure
  • 37. Control Selection Criteria Copyright © 2019 Logical Operations, Inc. All rights reserved. • Selection criteria: • Cost effectiveness • Risk reduction • Practicality • Additional details to consider: • Can the control be audited? • Is the control from a trusted source? • Can the control be consistently applied? • Is the control reliable? • Is the control independent from other controls? • Is the control easy to use? • Can the control be automated? • Is the control sustainable?
  • 38. Safeguard Cost/Benefit Analysis Copyright © 2019 Logical Operations, Inc. All rights reserved. • Determine if the safeguard is worth the money. • Also be confident that the solution meets requirements. • Be sure to consider total cost: • Initial purchase price and installation and configuration costs. • Annual maintenance and licensing costs. • Internal soft costs for configuration, management, and maintenance. • Percentage of risk coverage. • Scalability, upgradeability of solution. • Most solutions do not completely remediate a risk.
  • 39. • Administrative • Covers personnel security, risk management, training, permissions, etc. • Physical • Limit a person’s physical access to assets or facilities, using locks, doors, fences, etc. • Example: Infrared monitoring system can detect the presence of an intruder. • Technical • Also known as logical controls. • Implemented in computing environments like operating systems, applications, databases, network devices, etc. • Prefer physical or technical controls, as administrative controls require manual enforcement. Control Types User *** Copyright © 2019 Logical Operations, Inc. All rights reserved. Administrative Physical Technical
  • 40. • Not just simple pass-fail results or generating paperwork for an audit. • Well-executed assessment determines validity and effectiveness of controls. • Can expose strengths and weaknesses of current systems. • Helps identify a plan for correcting weaknesses. Monitoring and Measuring Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 41. • Ongoing effort to optimize policies and processes. • A function of risk management. • Includes best practices: • Continuously seek to discover new vulnerabilities. • Be context aware in your risk analysis. • Prioritize your efforts to vulnerabilities that actually pose a significant risk. • Determine patchability. Continuous Improvement Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 42. Threat Types (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Threat Type Description Cryptojacking • Unauthorized use of someone else's computing device to mine cryptocurrency. • Devices can include computers, phones, routers, IoT devices. Advanced Persistent Threat (APT) • Stealthy attack. • Intruder remains undetected for a lengthy period of time. • Usually sponsored by nation states or organizations that have considerable resources. Phishing and social engineering • Attackers use psychological tactics to manipulate victims into disclosing information or performing an action that they shouldn’t. • Phishing is the most common form. • Uses email with malicious attachments or links. Insider threat • Disgruntled employees and others with internal access. • Use their access privilege or knowledge to steal data or damage systems. • Can also be accidental/unintentional. Malware • Any software intended to damage a computer system. • Can be distributed through email, websites, file sharing, social media, even legitimate published software. • Includes viruses, worms, Trojans, keyloggers, rootkits, bootkits, ransomware, spyware, etc.
  • 43. Threat Types (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Threat Type Description Denial of service • Any attack that consumes computer or network resources so the system cannot service legitimate client requests. • Can be conducted against: • Network • CPU • RAM • Disk space • Maximum allowed connections Unauthorized network access • Deliberate or accidental. • Normal security controls are bypassed. Injection and Cross-Site commands • Malicious commands hide inside normal browser activity. • Includes command and SQL injection, XSS, and XSRF. Session Hijacking/ Man-in-the-Middle • Attacker takes over legitimate network connection, often after user has authenticated.
  • 44. • Employees are the weakest link in security. • Help employees understand: • Risks • Impact for company and themselves • Security policies and procedures • Focus on attitude, motivation, and attention. Security Awareness Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 45. Security Training Copyright © 2019 Logical Operations, Inc. All rights reserved. • A clearly defined target audience. • Training objectives mapped to desired increases in on-the-job security practices. • Training outcomes that can be quantified and measured. • Variations and customizations for different job roles and levels. • Provisions for updates and refresher training sessions.
  • 46. • Process of allowing only authorized entities to observe/modify/take possession of a computer system or physical property. • Subject – entity requesting access: • Person. • System. • Process. Access Control • Object – entity being accessed – any resource. • Limits subject’s access to object using predefined rules/roles/labels. Subjects Objects Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 47. Types of Access Control Services Copyright © 2019 Logical Operations, Inc. All rights reserved. Access Control Service Description Identification and Authentication (I&A) • Provides unique identifier for each authorized subject attempting to access the object. • Includes method or methods to ensure identity of subject (authentication). • Typically administered with Identity Management System and support of a directory. Authorization • Determines the capabilities or rights of the subject when accessing the object. Audit • Creates a log or record of system activities. Accountability • Reports and reviews the contents of log files. • Each subject identifier must be unique to relate activities to one subject.
  • 48. Identity and Access Provisioning Lifecycle Provisioning Review Revocation/ Deprovisioning Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 49. Facilities Access Logical Access Concern Mitigation Electronic intrusion into network. • Establish logical perimeter. Hijacking networked utilities/industrial control system. • Harden network utilities with strong authentication/authorization. Remote tampering of networked physical access mechanisms. • Continuous monitoring of access granted by networked mechanisms. Physical Access Concern Mitigation Unauthorized people entering facility. • Establish physical perimeter. • Use guards, entrance/exit checkpoints. Unauthorized people attempting to enter facility. • Security cameras. Unrestricted access to all areas within facility. • Create physical security zones within building. • Use guards or doors requiring ID card. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 50. Systems Access Logical Access Concern Mitigation Attacker access to configuration consoles. • Administrator configuration of systems. • Change default administrator password. Remote access to a critical system by an attacker. • Establish authentication and authorization in remote services. Physical Access Concern Mitigation Physical damage to server. • Segment servers behind closely guarded rooms. Physical damage to networking equipment. • Equipment lockers. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 51. Device Access Logical Access Concern Mitigation Attacker accessing the configuration console. • Strong user name/passwords. • Change default passwords. Unrestricted access to workstations. • Require authentication/authorization mechanisms. Age of device mobility and BYOD (often pass beyond perimeter). • Implement mobile device management. • Require PIN use. Physical Access Concern Mitigation Device theft. • Physical locks on devices. Device loss. • Locking up phones/tablets. • Require PIN use. Unmonitored access to background wireless connections. • Turn off Bluetooth, NFC, geo-locating unless required. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 52. Information Access Logical Access Concern Mitigation Databases with sensitive information are prime targets. • Isolate database from rest of network. • Use authentication/authorization mechanisms. Inability to determine who is using remote connections. • Implement remote authentication protocols. All accounts allow full access to data. • Set up varied levels of access permissions. Physical Access Concern Mitigation Attackers simply walking out with a bunch of servers. • Lock and monitor server rooms/data centers. Hard copies of sensitive information. • Keep hard copies in locked file cabinets/safes. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 53. • Or “authentication by possession.” • Device that must be physically present to be used for access. • Theft of device: • Prevents access for authorized user. • May allow access by unauthorized user. • Often used together with a PIN/password for two-factor authentication. Something You Have PIN Password User Information Unique Value Two-factor authentication Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 54. • Or “authentication by characteristic.” • Uses personal attributes: • Fingerprints. • Hand geometry. • Retina scans. • Iris scans. • Facial recognition • Voiceprints. Something You Are Fingerprint Scanner Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 55. • A single instance of identification and authentication applied to resources. • Permissions won’t change for duration of session. • Lock session: • Timeouts. • Screensavers. Session Management Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 56. Federated Identity Single identity linked across many different identity management systems. Microsoft Account Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 57. • Centralized authentication system. • Provides consistent/scalable mechanism to control access: • Applications. • Services. • Systems. • Common examples: • X.500. • LDAP. • Active Directory. Directory Services Authentication Centralized Administration Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 58. LDAP LDAP Client LDAP Server LDAP Client Signed certificate Trusted session Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 59. • Microsoft’s LDAP-compatible directory implementation. • Structures objects within an organization into a hierarchy. • Allows administrators to centrally manage access using access control lists. • Can subdivide the domain into organizational units. Active Directory Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 60. Kerberos Ticket Ticket User passes credentials to an authentication server Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 61. The Kerberos Process 1. I (user) need to authenticate and I need a ticket. 2. Here is a TGT. 3. Here is my TGT; now I need an ST. 4. Here is your ST. 5. Here is my ST secure connection to the File Server. 6. Resource authenticates user and allows access via a secure connection. File Server Key Distribution Server Authentication Server Ticket Granting Server 1 2 3 4 5 6 User Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 62. SSO • Allows a user to authenticate once and receive access to a number of related but independent software systems. • SSO often considered a subset of Identity Federation. • Benefits: • Compromised credentials quickly regained by single action. • Central server minimizes burden of logging in and monitoring user logins. • Easy to use because only have to remember one password. • Security considerations: • Compromise of single set of credentials allows access to multiple systems. • If authentication servicer becomes unavailable, the entire system might become unavailable. • Need multiple levels of authentication to ensure secure SSO system. Email File Server Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 63. Cryptography Unprotected Data Encryption Protected Data Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 64. Encryption and Decryption Encryption Ciphertext Plaintext Ciphertext Decryption Plaintext Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 65. • Rule/system/mechanism used to encrypt data. • Also known as an encryption algorithm. • Stronger, more complex algorithm = more difficult to break. Ciphers Original Information Cipher Encrypted Information Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 66. Key Clustering Original Information Cipher U@5 U@5 Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 67. • Steganographic techniques include: • Hiding information in blocks. • Hiding information within images. • Invisibly altering structure of a digital image. Steganography Vessel Image Secret Data Steganographic Image Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 68. Symmetric Encryption Encrypts Data Decrypts Data Same Key on Both Sides Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 69. • Data Encryption Standard (DES) • Triple DES (3DES) • Advanced Encryption Standard (AES) • Blowfish • Twofish • IDEA • Skipjack • Rivest Cipher (RC) 4, 5, and 6 Copyright © 2019 Logical Operations, Inc. All rights reserved. Symmetric Encryption Algorithms
  • 70. Symmetric Algorithm Comparison Chart Copyright © 2019 Logical Operations, Inc. All rights reserved. Algorithm Block Size (bits) Key Size (bits) Rounds AES 128 128, 192, 256 10, 12, 14 Rijndael Variable (multiples of 32) 128, 192, 256 9, 11, or 13 depending on key/block size Blowfish 64 32 - 448 16 DES 64 56 (+ 8 parity bits) 16 3DES 64 112 or 168 48 IDEA 64 128 8 RC2 64 128 18 RC4 n/a 40 - 2048 (typically 40 - 128) 1 RC5 32, 64, 128 0 - 2040 0 - 255 RC6 128 128 - 2040 Variable (20 recommended) Skipjack 64 80 32 Twofish 128 128, 192, 256 16
  • 71. • Symmetric encryption benefits: • Good performance • Well suited to encrypt both data at rest and data in transit. • The greatest challenge is key management. • Both parties must agree upon the key ahead of time. • If the key gets compromised, all files and communications encrypted with that key have also been compromised. • A new key must be issued, with both parties again communicating ahead of time to agree upon the key. Copyright © 2019 Logical Operations, Inc. All rights reserved. Symmetric Encryption Considerations
  • 72. Asymmetric Encryption Public Key Encrypts Private Key Decrypts Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 73. • Rivest Shamir Adelman (RSA) • Diffie-Hellman (DH) • Elliptic Curve Cryptography (ECC) • Diffie-Hellman Ephemeral (DHE) • Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) • ElGamal • Digital Signature Algorithm (DSA) • Knapsack Copyright © 2019 Logical Operations, Inc. All rights reserved. Asymmetric Encryption Techniques
  • 74. Asymmetric Algorithm Comparison Chart Copyright © 2019 Logical Operations, Inc. All rights reserved. Asymmetric Algorithm Based On Common Use RSA Factors (products of large prime numbers) Digital certificates, digital signatures DH Handshake Key exchange ECC Elliptic curves Smart cards, wireless, realtime communications ElGamal DH OpenPGP, GnuGPG DSA Modular exponentiation and the discrete logarithmic problem FIPS-compliant digital signatures Knapsack Mathematical knapsack problem Early public key-based encryption
  • 75. • Asymmetric encryption is generally stronger than symmetric encryption. • More flexible key management. • Asymmetric algorithms have significantly lower performance than symmetric algorithms. • Asymmetric algorithms are used to encrypt only short amounts of data such as another encryption key. • It is very common to use a combination of both methods. • The biggest issue, besides performance, is the liability a person incurs if they lose their private key. • The private key should never be exposed. • It is always stored in a non-paged part of kernel memory. • If you put it on a smart card or other removable media, you must encrypt it (typically with a password or other symmetric key). • If someone steals your private key, they could impersonate you, getting you into legal trouble. • Compromised keys should immediately be revoked and reissued. Copyright © 2019 Logical Operations, Inc. All rights reserved. Asymmetric Encryption Considerations
  • 76. Hashing Message This is a secret Hash Copyright © 2019 Logical Operations, Inc. All rights reserved. Hash Function Hashing is one-way encryption 508FF7A91DB0A80A1 3151F786FBB6E43
  • 77. • MD2 • MD4 • MD5 • HAVAL • SHA • NTLM versions 1 and 2 • RIPEMD • HMAC Copyright © 2019 Logical Operations, Inc. All rights reserved. Hashing Algorithms
  • 78. Salting the Hash • Adding a random number to the input of a hashing function to create unique hash values. Message Secret Hash Hash Function 1 Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 79. END