SlideShare ist ein Scribd-Unternehmen logo
1 von 17
security transformation – A book summary Book written: by Mary Pat McCarthy and Stuart Campbell Summarized by: Faisal Yahya, MM CISSP
Computer and internet security Computer and Internet security issues are a fact of modern business life.  The question isn’t whether the Internet is safe; the question is whether your enterprise and its Web presence are safe.  Like any other neighborhood, the Internet has its risks, including vandals and thieves.
“Information risks and security vulnerabilities are not problems.  They’re facts.”
Every company is unique But how much Internet security do you need?  What kind should you have?  Some businesses, such as medical institutions, need to protect their customers’ privacy.  Others, such as financial networks, must guard against theft, while others must protect their intellectual property.
New ways of doing business Internet security is even more essential when you use any of the new business models that are emerging on the Web. Security is a matter of earning and keeping trust. Smart executives understand that no one can promise that ATM security will never be breached,  just as no one can promise that a bank branch will never be robbed. But if customers know they’re protected, they’ll trust their bank.  The key is managing perceptions.
“Security is a form of enlightened self-interest. It’s a means of warding off the three dreaded L’s of the digital age:  	Liability,  	Lawsuits, and  	Losses.”
The Security – conscious employee No security system, no matter how well intended, will work if your people don’t support it.  Remember, too, that most computer attacks are actually inside jobs. Start your security campaign at the top and present it with professional-looking manuals and materials.  Teach your people to spot it when something is wrong and to know what to do when they spot a problem.
…[continued] Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) work at different levels to detect intrusion, but they can’t tell you what the intruder did while inside.  Checksums let you determine if the programs on your system have been tampered with at all. Even a single alteration in a character or space changes the checksum for a line of code, so tampering becomes apparent.
“Like a good marketing campaign, the security campaign needs to be rolled out, accompanied by well-crafted materials and training programs.”
Changing security systems over time Both technology and your business will change. Systems will grow more complex. To create a moving defense against changing threats, choose security measures that can grow with your systems.  Most attention focuses on prevention, but you also need detection, response and prevention, such as strong passwords.
… [continued] As you audit your security system, close any holes. Disable services you don’t need.  If data doesn’t need to be distributed, don’t put it on a networked computer. Lock it up. Apply your prevention, detection and response plan to all secured data.  Because no security system is perfect, be prepared for the day that your defenses are penetrated. Be ready to discover the attack and respond.  Even though you can’t prevent or detect every intrusion, you can increase the odds of detection by using logging to record who gains access.  Many systems have built-in logging.
Responding to a security breach When it’s time to respond to a security problem, you may have to decide if the situation is grave enough to pull the plug on your system. Make sure that an appropriate executive makes that call.  Set up guidelines for response. Have a well-drilled team ready to go at the first sign of trouble, including the executive who will decide whether to shutdown the system, as well as your security staff and, in the case of an inside attack, someone from human resources.  Alert them by phone or pager, not e-mail, which may be compromised.
Assesing your risk Start with a security risk assessment, defining risk with the equation: Risk = asset value x threat x vulnerability.  The elements of this formula are: Asset value is the importance of an information asset to the firm’s strategy — What is your information worth?  Threats are events that could have a negative impact on the accessibility, integrity or confidentiality of your information assets — These include hackers, competitors, extortionists and thieves, as well as disgruntled employees and other insiders.  Vulnerabilitiesare the absence, inadequacy or inconsistency of defenses against threats — They may include weak locks, unshredded documents in your trashcans or careless storage of laptop computers.
“A security solution that forces your company to change its behavior to fit the solution’s characteristics simply will not work.”
Privacy is a separate security issue, a matter of ethics and culture. Privacy pertains to how information is used, not to access or safety.  Like security, privacy has a huge impact on customer trust.
What’s on the future In the future, issues of security will become more difficult, since computers will become faster, smaller and smarter. In time, wireless devices will proliferate.  Chips will become small enough to embed in the human body. Imagine the risks of a hacker getting computer access to reprogram someone’s pacemaker. Hackers already have broken some of the most difficult codes.  Some analysts believe we are rapidly approaching the limits of our ability to deliver secure data.  Soon programming and architecture issues will emerge too quickly for humans to handle, so computers will do those jobs, while people handle policy and administration.
Somethin’ about me               Faisal Yahya, MM, CISSP 	Project Manager and Security Practitioner with more than 15 years experienced in IT industry. 	email: faisal.yahya@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
Defense In-Depth
Defense In-DepthDefense In-Depth
Defense In-Depth
Will Kelly
 
Mobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingMobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security Training
Tonex
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
danielblander
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
Claudia Warwar
 

Was ist angesagt? (20)

Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
Defense In-Depth
Defense In-DepthDefense In-Depth
Defense In-Depth
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROI
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Mobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingMobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security Training
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending Network
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Self defending networks
Self defending networksSelf defending networks
Self defending networks
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 

Andere mochten auch

REVISED RESUME SEPTEMBER 2016
REVISED RESUME SEPTEMBER 2016REVISED RESUME SEPTEMBER 2016
REVISED RESUME SEPTEMBER 2016
ELISE STALLWORTH
 
หนังสือสรุปผลการดำเนินงานที่ประชุมประธาน สภาอาจารย์มหาวิทยาลัยแห่งประเทศไทย (...
หนังสือสรุปผลการดำเนินงานที่ประชุมประธาน สภาอาจารย์มหาวิทยาลัยแห่งประเทศไทย (...หนังสือสรุปผลการดำเนินงานที่ประชุมประธาน สภาอาจารย์มหาวิทยาลัยแห่งประเทศไทย (...
หนังสือสรุปผลการดำเนินงานที่ประชุมประธาน สภาอาจารย์มหาวิทยาลัยแห่งประเทศไทย (...
สุรพล ศรีบุญทรง
 

Andere mochten auch (10)

REVISED RESUME SEPTEMBER 2016
REVISED RESUME SEPTEMBER 2016REVISED RESUME SEPTEMBER 2016
REVISED RESUME SEPTEMBER 2016
 
ประวัติและผลงานอาจารย์ดีเด่น (หน้า20 32)
ประวัติและผลงานอาจารย์ดีเด่น (หน้า20 32)ประวัติและผลงานอาจารย์ดีเด่น (หน้า20 32)
ประวัติและผลงานอาจารย์ดีเด่น (หน้า20 32)
 
Aprendizaje Basado en Proyectos
Aprendizaje Basado en ProyectosAprendizaje Basado en Proyectos
Aprendizaje Basado en Proyectos
 
Congresso
CongressoCongresso
Congresso
 
หนังสือสรุปผลการดำเนินงานที่ประชุมประธาน สภาอาจารย์มหาวิทยาลัยแห่งประเทศไทย (...
หนังสือสรุปผลการดำเนินงานที่ประชุมประธาน สภาอาจารย์มหาวิทยาลัยแห่งประเทศไทย (...หนังสือสรุปผลการดำเนินงานที่ประชุมประธาน สภาอาจารย์มหาวิทยาลัยแห่งประเทศไทย (...
หนังสือสรุปผลการดำเนินงานที่ประชุมประธาน สภาอาจารย์มหาวิทยาลัยแห่งประเทศไทย (...
 
A Scandal In Bohemia - Re-Imagined
A Scandal In Bohemia - Re-ImaginedA Scandal In Bohemia - Re-Imagined
A Scandal In Bohemia - Re-Imagined
 
INVESTIGATION AND OPTIMIZATION OF TURNING PROCESS PARAMETER IN WET AND MQL SY...
INVESTIGATION AND OPTIMIZATION OF TURNING PROCESS PARAMETER IN WET AND MQL SY...INVESTIGATION AND OPTIMIZATION OF TURNING PROCESS PARAMETER IN WET AND MQL SY...
INVESTIGATION AND OPTIMIZATION OF TURNING PROCESS PARAMETER IN WET AND MQL SY...
 
Comparación de Wikispace y Blogger
Comparación de Wikispace y BloggerComparación de Wikispace y Blogger
Comparación de Wikispace y Blogger
 
GENERALIDADES DEL PRESUPUESTO GENERAL DEL ESTADO
GENERALIDADES DEL PRESUPUESTO GENERAL DEL ESTADOGENERALIDADES DEL PRESUPUESTO GENERAL DEL ESTADO
GENERALIDADES DEL PRESUPUESTO GENERAL DEL ESTADO
 
School & Society PowerPoint - Nov 14
School & Society PowerPoint - Nov 14School & Society PowerPoint - Nov 14
School & Society PowerPoint - Nov 14
 

Ähnlich wie Security Transformation

Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
Mark Lanterman
 

Ähnlich wie Security Transformation (20)

Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
EnterpriseImmuneSystem
EnterpriseImmuneSystemEnterpriseImmuneSystem
EnterpriseImmuneSystem
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Threat Intelligence in Cybersecurity.pdf
Threat Intelligence in Cybersecurity.pdfThreat Intelligence in Cybersecurity.pdf
Threat Intelligence in Cybersecurity.pdf
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 

Mehr von Faisal Yahya (6)

Hybrid IT, Inovasi Disruptif Menuju Kesempurnaan
Hybrid IT, Inovasi Disruptif Menuju KesempurnaanHybrid IT, Inovasi Disruptif Menuju Kesempurnaan
Hybrid IT, Inovasi Disruptif Menuju Kesempurnaan
 
My Latest Resume
My Latest ResumeMy Latest Resume
My Latest Resume
 
PERATURAN UJIAN BEGLEITHUND - PERKIN.doc
PERATURAN UJIAN BEGLEITHUND - PERKIN.docPERATURAN UJIAN BEGLEITHUND - PERKIN.doc
PERATURAN UJIAN BEGLEITHUND - PERKIN.doc
 
The Value of IT.pptx
The Value of IT.pptxThe Value of IT.pptx
The Value of IT.pptx
 
My Visual Resume
My Visual ResumeMy Visual Resume
My Visual Resume
 
Managing IT as a Business.pptx
Managing IT as a Business.pptxManaging IT as a Business.pptx
Managing IT as a Business.pptx
 

Kürzlich hochgeladen

The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdom
lunadelior
 
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Faga1939
 
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
 

Kürzlich hochgeladen (20)

The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdom
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In DubaiDubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024
 
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf
 
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 

Security Transformation

  • 1. security transformation – A book summary Book written: by Mary Pat McCarthy and Stuart Campbell Summarized by: Faisal Yahya, MM CISSP
  • 2. Computer and internet security Computer and Internet security issues are a fact of modern business life. The question isn’t whether the Internet is safe; the question is whether your enterprise and its Web presence are safe. Like any other neighborhood, the Internet has its risks, including vandals and thieves.
  • 3. “Information risks and security vulnerabilities are not problems. They’re facts.”
  • 4. Every company is unique But how much Internet security do you need? What kind should you have? Some businesses, such as medical institutions, need to protect their customers’ privacy. Others, such as financial networks, must guard against theft, while others must protect their intellectual property.
  • 5. New ways of doing business Internet security is even more essential when you use any of the new business models that are emerging on the Web. Security is a matter of earning and keeping trust. Smart executives understand that no one can promise that ATM security will never be breached, just as no one can promise that a bank branch will never be robbed. But if customers know they’re protected, they’ll trust their bank. The key is managing perceptions.
  • 6. “Security is a form of enlightened self-interest. It’s a means of warding off the three dreaded L’s of the digital age: Liability, Lawsuits, and Losses.”
  • 7. The Security – conscious employee No security system, no matter how well intended, will work if your people don’t support it. Remember, too, that most computer attacks are actually inside jobs. Start your security campaign at the top and present it with professional-looking manuals and materials. Teach your people to spot it when something is wrong and to know what to do when they spot a problem.
  • 8. …[continued] Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) work at different levels to detect intrusion, but they can’t tell you what the intruder did while inside. Checksums let you determine if the programs on your system have been tampered with at all. Even a single alteration in a character or space changes the checksum for a line of code, so tampering becomes apparent.
  • 9. “Like a good marketing campaign, the security campaign needs to be rolled out, accompanied by well-crafted materials and training programs.”
  • 10. Changing security systems over time Both technology and your business will change. Systems will grow more complex. To create a moving defense against changing threats, choose security measures that can grow with your systems. Most attention focuses on prevention, but you also need detection, response and prevention, such as strong passwords.
  • 11. … [continued] As you audit your security system, close any holes. Disable services you don’t need. If data doesn’t need to be distributed, don’t put it on a networked computer. Lock it up. Apply your prevention, detection and response plan to all secured data. Because no security system is perfect, be prepared for the day that your defenses are penetrated. Be ready to discover the attack and respond. Even though you can’t prevent or detect every intrusion, you can increase the odds of detection by using logging to record who gains access. Many systems have built-in logging.
  • 12. Responding to a security breach When it’s time to respond to a security problem, you may have to decide if the situation is grave enough to pull the plug on your system. Make sure that an appropriate executive makes that call. Set up guidelines for response. Have a well-drilled team ready to go at the first sign of trouble, including the executive who will decide whether to shutdown the system, as well as your security staff and, in the case of an inside attack, someone from human resources. Alert them by phone or pager, not e-mail, which may be compromised.
  • 13. Assesing your risk Start with a security risk assessment, defining risk with the equation: Risk = asset value x threat x vulnerability. The elements of this formula are: Asset value is the importance of an information asset to the firm’s strategy — What is your information worth? Threats are events that could have a negative impact on the accessibility, integrity or confidentiality of your information assets — These include hackers, competitors, extortionists and thieves, as well as disgruntled employees and other insiders. Vulnerabilitiesare the absence, inadequacy or inconsistency of defenses against threats — They may include weak locks, unshredded documents in your trashcans or careless storage of laptop computers.
  • 14. “A security solution that forces your company to change its behavior to fit the solution’s characteristics simply will not work.”
  • 15. Privacy is a separate security issue, a matter of ethics and culture. Privacy pertains to how information is used, not to access or safety. Like security, privacy has a huge impact on customer trust.
  • 16. What’s on the future In the future, issues of security will become more difficult, since computers will become faster, smaller and smarter. In time, wireless devices will proliferate. Chips will become small enough to embed in the human body. Imagine the risks of a hacker getting computer access to reprogram someone’s pacemaker. Hackers already have broken some of the most difficult codes. Some analysts believe we are rapidly approaching the limits of our ability to deliver secure data. Soon programming and architecture issues will emerge too quickly for humans to handle, so computers will do those jobs, while people handle policy and administration.
  • 17. Somethin’ about me Faisal Yahya, MM, CISSP Project Manager and Security Practitioner with more than 15 years experienced in IT industry. email: faisal.yahya@gmail.com