SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Information Networking Security and Assurance Lab
National Chung Cheng University
2014/12/3 Kai, 2004 insa 1
RFC 2196 –
Site Security Handbook
a guide to developing computer security policies and
procedures for sites that have systems on the Internet
B. Fraser SEI/CMU
Information Networking Security and Assurance Lab
National Chung Cheng University 2
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 3
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 4
Kai, 2004 insa
1 Introduction
 This handbook is a guide to setting computer security policies
and procedures for sites that have system on the internet.
 Definitions
Site – any organization that owns computer or network-
related resources.
Internet – RFC 1594
Administrator
Security administrator
Decision maker – refers to those people at a site who set or
approve policy.
A collection of thousands of networks linked by
a common set of technical protocols which
make it possible for users of any one of the
networks to communicate with, or use the
services located on, any of the other networks
Information Networking Security and Assurance Lab
National Chung Cheng University 5
Kai, 2004 insa
1.5 Basic Approach
 Steps to develop a security plan for your site
1. Identify what you
trying to protect
2. Determine what you are
trying to protect it from.
3. Determine how
likely the threats are.
4. Implement measures which will protect
your assets in a cost-effective manner
5. Review the process
continuously and
make improvements
each time a
weakness is found.
The cost of protecting yourself against a
threat should be less than the cost of
recovering if the threat were to strike you.
Information Networking Security and Assurance Lab
National Chung Cheng University 6
Kai, 2004 insa
1.6 Risk Assessment
 It is possible to be mislead
about where the effort is needed.
 Risk analysis
 Determining what you need to protect, what you
need to protect it from, and how to protect it.
1. Identifying the assets
– the basic goals of security are availability,
confidentiality, and integrity
2. Identifying the threats
– Each threat should be examined with an eye to how the
threat could affect these areas
Information Networking Security and Assurance Lab
National Chung Cheng University 7
Kai, 2004 insa
1.6.2 Identifying the Assets
Hardware CPUs, boards, keyboards, terminals, workstations, personal
computers, printers, disk drivers, communication lines,
terminal server, routers
Software source programs, object programs, utilities, diagnostic
programs, operating systems, communication programs
data During execution, stored on-line, archived off-line, backups,
audit logs, databases, in transit over communication media.
People User, administrators, hardware maintainers
Documentation On programs, hardware, systems, local administrative
procedures.
Supplies Paper, forms, ribbons, magnetic media.
Information Networking Security and Assurance Lab
National Chung Cheng University 8
Kai, 2004 insa
1.6.3 Identifying the Threats
• The following are classic threats that should
be considered
1. Unauthorized access to resources and/or
information
2. Unintented and/or unauthorized disclosure of
information
3. Denial of service
Information Networking Security and Assurance Lab
National Chung Cheng University 9
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 10
Kai, 2004 insa
2 Security Policies
 What is a security policy and why have one?
 A security policy is a formal statement of the rules by
which people who are given access to an organization’s
technology and information assets must abide.
 Purposes of a security policy
 To inform users, staff and managers of their
obligatory requirements for protecting technology
and information assets.
 Appropriate Use Policy
AUP
spell out what users shall and
shall not do on the various
components of the system,
including the type of traffic
allowed on the networks.
Information Networking Security and Assurance Lab
National Chung Cheng University 11
Kai, 2004 insa
2 Security Policies
 Determined by the following Key tradeoff
1.Services Offered versus Security Provided
2.Ease of Use versus Security
3.Cost of Security versus Risk of Loss
 Who should be involved when forming policy
1.Site security administrator
2.Information technology technical staff
3.Administrator of large use groups within the organization
4.Security incident response team
5.Representative of the user groups affected by the security policy
6.Responsible management
7.Legal counsel
Loss of privacy
Loss of data
Loss of service
Monetary
Performance
Ease of use
Information Networking Security and Assurance Lab
National Chung Cheng University 12
Kai, 2004 insa
2.2 What Makes a Good Security Policy?
 The characteristics of a good security policy
1. Be implementable through system administration procedures
2. Be enforceable with security tools
3. Cleary define the area of responsibility for the users and
management.
 The component of a good security policy
1. Computer technology purchasing Guidelines which specify
required, or preferred, security features
2. A privacy policy which defines reasonable expectations of
privacy regarding.
3. An access policy which defines access rights and privileges to
protect assets for users.
Information Networking Security and Assurance Lab
National Chung Cheng University 13
Kai, 2004 insa
2.2 What Makes a Good Security Policy?
 The component of a good security policy
4. An accountability policy which defines the responsibilities of users.
5. An authentication policy which established trust through an effective
password policy.
6. An Availability statement which sets users' expectations for the
availability of resources.
7. An Information Technology System & Network Maintenance Policy
which describes how both internal and external maintenance people
are allowed to handle and access technology.
8. A Violations Reporting Policy that indicates which types of
violations must be reported and to whom the reports are made.
9. Supporting Information which provides users, staff, and management
with contact information for each type of policy violation
Information Networking Security and Assurance Lab
National Chung Cheng University 14
Kai, 2004 insa
2.3 Keeping the Policy Flexible
 In order for a security policy to be viable for the long
term, it requires a lot of flexibility based upon an
architectural security concept.
 It is important to recognize that there are exceptions
to every rule.
the policy should spell out what exceptions to the
general policy exist.
 Garbage Truck Syndrome
This refers to what would happen to a site if a key person
was suddenly unavailable for his/her job function.
Information Networking Security and Assurance Lab
National Chung Cheng University 15
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 16
Kai, 2004 insa
3 Architecture
1. Objectives
1. Completely defined security plans
1. the list of network services that will be provided
2. which areas of the organization will provide the services
3. who will have access to those services
4. how access will be provided
5. who will administer those services.
2. Separation of services
 to distinguish between hosts which operate within different
models of trust
3. Deny all/ Allow all
4. Identify real need for services
Individual policies can be consistent with the overall site security
host or
network
level Router level
the theory of a hard "crunchy"
shell and a soft "squishy“ middle.
security complexity can grow exponentially with the number of services provided.
Information Networking Security and Assurance Lab
National Chung Cheng University 17
Kai, 2004 insa
3.2 Network and Service Configuration
1. Protecting the infrastructure
2. Protecting the network
1. DoS
 attacking the routers
 Flooding the network with extraneous traffic
2. Spoofing
3. Solutions
1. Clear-text password
2. Cryptographic checksum
3. Encryption
3. Protecting the services
 Name servers (DNS and NIS(+))
 Password/key servers (NIS(+) and KDC)
 Authentication/proxy servers (SOCKS, FWTK)
 Electronic Mail
 World Wide Web (WWW)
 File Transfer (FTP, TFTP)
 NFS
4. Protecting the Protection
Information Networking Security and Assurance Lab
National Chung Cheng University 18
Kai, 2004 insa
3.3 firewalls
Filtering routers
Filtering policy: source and destination IP address,
source and destination TCP port numbers, state of
the TCP "ack" bit, UDP source and destination port
numbers, and direction of packet flow
Proxy servers
Application Layer Gateway
Combine with VPN
Logging function in Firewall
Information Networking Security and Assurance Lab
National Chung Cheng University 19
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 20
Kai, 2004 insa
4 Security services and procedures
1. Authentication
 One-time password
 Kerberos: V4 and V5
 Choosing and protecting Secret tokens and PINs
 Password Assurance
 The importance of robust passwords: Spider ->5p1der
 Changing default passwords
 Restricting access to the password file
 Password aging
 Password/account blocking
 A word about the finger daemon
Information Networking Security and Assurance Lab
National Chung Cheng University 21
Kai, 2004 insa
4 Security services and procedures
2. Confidentiality
 Encryption
3. Integrity
 Checksum: MD5
4. Authorization
 The privileges, rights, property, and permissible
actions
 ACL
Information Networking Security and Assurance Lab
National Chung Cheng University 22
Kai, 2004 insa
4.5 Access
 Physical Access
 Walk-up Network Connections
 Other network technologies
 Modems
 Modem lines must be managed
 Dial-in user must be authentication
 Call-back capability
 All logins should be logged
 Choose your opening banner carefully
 Dial-out authentication
 Make your modem programming as “Bullet-proof” as Possible
Information Networking Security and Assurance Lab
National Chung Cheng University 23
Kai, 2004 insa
4.6 Auditing
 What to collect
 Login and logout, super user access, ticket generation, and
any other change of access or status.
 Collection process
1. Read/write file
2. Write-once/read-many
3. Write-only
 Collection load
 Data compressed or batch capture
 Handling and preserving audit data
 Legal considerations
Do not gather passwords
Information Networking Security and Assurance Lab
National Chung Cheng University 24
Kai, 2004 insa
4.7 securing backups
1. Make sure your site is creating backups
2. Make sure your site is using offsite storage for
backups
3. Consider encrypting your backups to provide
additional protection of the information once it is
off-site.
4. Don’t always assume that your backups are good.
5. Periodically verify the correctness and
completeness of your backups
Information Networking Security and Assurance Lab
National Chung Cheng University 25
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 26
Kai, 2004 insa
5 Security incident handling
1. Preparing and planning
2. Notification
3. Identifying an incident
4. Handling
5. Aftermath
6. Administrative response to incident
Information Networking Security and Assurance Lab
National Chung Cheng University 27
Kai, 2004 insa
5.1 preparing and planning for incident
handling
 Why learning to respond efficiently to an incident?
1. Protecting the asset which could be compromised
2. Protecting resources which could be utilized more
profitably if an incident did not require their services
3. Complying with (government or other) regulations
4. Preventing the use of your systems in attacks against
other systems
5. Minimizing the potential for negative exposure.
Information Networking Security and Assurance Lab
National Chung Cheng University 28
Kai, 2004 insa
5.1 preparing and planning for incident
handling
 A set of objective can be identified for dealing with
incidents
1. Figure out how it happened
2. Find out how to avoid further exploitation of the same
vulnerability.
3. Avoid escalation and further incidents
4. Assess the impact and damage of the incident
5. Recover from the incident
6. Update policies and procedures as needed
7. Find out who did it
Information Networking Security and Assurance Lab
National Chung Cheng University 29
Kai, 2004 insa
5.1 preparing and planning for incident
handling
 Suggested priorities may serve as a starting point
for defining your organization’s response
1. Priority one – protect human life people’s safety
2. Priority two – protect classified and sensitive data. Prevent
exploitation of classified and sensitive systems.
3. Priority three – protect other data, including proprietary,
scientific, managerial and other data.
4. Priority four – prevent damage to systems.
5. Priority five – minimize disruption of computing resources.
Information Networking Security and Assurance Lab
National Chung Cheng University 30
Kai, 2004 insa
5.2 Notification and points of contact
1. Local managers and personnel
2. Law enforcement and investigative agencies
– legal and practical issues
1. Whether your site or organization is willing to risk
negative publicity or exposure to cooperate with legal
prosecution efforts.
2. Downstream liability
3. Distribution of information
4. Liabilities due to monitoring
Information Networking Security and Assurance Lab
National Chung Cheng University 31
Kai, 2004 insa
5.2 Notification and points of contact
3. Computer security incident handling (response)
teams
4. Affected and involved sites
5. Internal communications
6. Public relations – press releases
 Guidelines to provide to the press
1. Keep the technical level of detail low.
2. Keep the speculation out of press statements.
3. Work with law enforcement professionals to assure that
evidence is protected.
4. Try not to be forced into a press interview before you are
prepared.
5. Do not allow the press attention to detract from the handling
of the event.
Information Networking Security and Assurance Lab
National Chung Cheng University 32
Kai, 2004 insa
5.3 Identifying an incident
1. Is it real?
 Certain indications or symptoms of an incident that deserve special attention
1. System crashes
2. New user accounts
3. New files, or strange file names
4. Accounting discrepancies
5. Changes in file lengths or dates.
6. Attempts to write to system
7. Data modification or deletion
8. Denial of service
9. Unexplained, poor system performance
10. Anomalies
11. Suspicious probes
12. Suspicious browsing
13. Inability of a use to log in due to modifications of his account.
Information Networking Security and Assurance Lab
National Chung Cheng University 33
Kai, 2004 insa
5.3 Identifying an incident
2. Types and scope of incidents
1. Is this a multi-site incident?
2. Are many computer at your site affected by this
incident?
3. Is sensitive information involved?
4. What is the entry point of the incident?
5. Is the press involved?
6. What is the potential damage of the incident?
7. What is the estimated time to close out the incident
8. What resource could be required to handle the incident?
9. Is law enforcement involved?
3. Assessing the damage and extent
Information Networking Security and Assurance Lab
National Chung Cheng University 34
Kai, 2004 insa
5.4 Handling an incident
1. Types of notification and exchange of information
 The following minimum information should be provided
1. Timezone of logs, … in GMT or local time
2. Information about the remote system
3. All log entries relevant for the remote site
4. Type of incident
2. Protecting evidence and activity logs
 Gathering evidence
1. All system event
2. All actions you take
3. All external conversations
Information Networking Security and Assurance Lab
National Chung Cheng University 35
Kai, 2004 insa
5.4 handling an incident
3. Containment
4. Eradication
5. Recovery
6. Follow-up
 to write a report describing the exact sequence of
events:
1. the method of discovery
2. Correction procedure
3. monitoring procedure
4. a summary of lesson learned
Information Networking Security and Assurance Lab
National Chung Cheng University 36
Kai, 2004 insa
5.5 Aftermath of an incident
 In the wake of an incident, several actions
should take place.
1. An inventory should be taken of the systems’ assets
2. The lessons learned as a result of the incident
should be included in revised security plan to
prevent the incident from re-occurring
3. A new risk analysis should be developed in light of
the incident.
4. An investigation and prosecution of the individuals
who caused the incident should commence, if it is
deemed desirable
Information Networking Security and Assurance Lab
National Chung Cheng University 37
Kai, 2004 insa
5.6 Responsibilities
1. Not crossing the line
2. Good internet citizenship
3. Administrative response to incidents
Information Networking Security and Assurance Lab
National Chung Cheng University 38
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 39
Kai, 2004 insa
6 Ongoing activities
1. Subscribe to advisories that are issued by various security
incident response teams.
2. Monitor security patches that are produced by the vendors of
your equipment, and obtain and install all that apply.
3. Actively watch the configurations of your systems to
identify any changes.
4. Review all security policies and procedures annually
5. Read relevant mailing lists and USENET newsgroups to
keep up the date with the latest information being shared by
fellow administrators
6. Regularly check for compliance with policies and
procedures.
Information Networking Security and Assurance Lab
National Chung Cheng University 40
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 41
Kai, 2004 insa
7 Tools and locations
 COPS, DES, Drawbridge, identd, ISS, Kerberos,
logdaemon, lsof, MD5, PEM, PGP,
rpcbind/portmapper replacement, SATAN, sfingerd,
S/KEY, smarsh, ssh, Swatch, TCP-Wrapper, tiger,
Tripwire, TROJAN.PL
1. CERT Coordination Center
• ftp://info.cert.org:/pub/tools
2. DFN-CERT
• ftp://ftp.cert.dfn.de/pub/tools
3. Computer operations, audit, and security tools
(COAST)
• soast.cs.purdue.edu:/pub/tools
Information Networking Security and Assurance Lab
National Chung Cheng University 42
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 43
Kai, 2004 insa
8 Mailing lists and other resources
 Mailing lists
1. CERT advisory
– mailto: cert-advisory-request@cert.org
– Body: subscribe cert <FIRST NAME> <LAST NAME>
2. VIRUS-L List
– mailto: listserv%lehiibm1.bitnet@mitvma.mit.edu
– Body: subscribe virus-L FIRSTNAME LASTNAME
3. Internet Firewalls
– mailto: majordomo@greatcircle.com
– Body: subscribe firewalls user@host
 USENET newsgroups
1. comp.security.announce
2. comp.security.misc
3. alt.security
4. comp.virus
5. comp.risks
 World-Wide Web Pages
1. http://www.first.org
2. http://www.alw.nih.gov/Security/security.html
3. http://csrc.ncsl.nist.gov
Information Networking Security and Assurance Lab
National Chung Cheng University 44
Kai, 2004 insa

Weitere ähnliche Inhalte

Was ist angesagt?

Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patternsBlancoScience
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Internal ballistic
Internal ballisticInternal ballistic
Internal ballisticHemant Jain
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime sceneBlancoScience
 
Development of Latent Fingerprints
Development of Latent FingerprintsDevelopment of Latent Fingerprints
Development of Latent FingerprintsHamza Mohammad
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Forensics Topic: Fingerprints
Forensics Topic: FingerprintsForensics Topic: Fingerprints
Forensics Topic: FingerprintsBob Smullen
 
Timeline of forensic science
Timeline of forensic scienceTimeline of forensic science
Timeline of forensic sciencesevans-idaho
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptxkiran yadav
 
Glass Evidence
Glass EvidenceGlass Evidence
Glass Evidenceannperry09
 
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)Adam Nurudini
 
ammunition and its classification
ammunition and its classificationammunition and its classification
ammunition and its classificationHemant Jain
 

Was ist angesagt? (20)

Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
NIBIN
NIBINNIBIN
NIBIN
 
Forensic analysis of tool marks
Forensic analysis of tool marksForensic analysis of tool marks
Forensic analysis of tool marks
 
Internal ballistic
Internal ballisticInternal ballistic
Internal ballistic
 
Ridgeology
RidgeologyRidgeology
Ridgeology
 
Finger print
Finger printFinger print
Finger print
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime scene
 
Development of Latent Fingerprints
Development of Latent FingerprintsDevelopment of Latent Fingerprints
Development of Latent Fingerprints
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Forensics Topic: Fingerprints
Forensics Topic: FingerprintsForensics Topic: Fingerprints
Forensics Topic: Fingerprints
 
Timeline of forensic science
Timeline of forensic scienceTimeline of forensic science
Timeline of forensic science
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptx
 
IBIS
IBISIBIS
IBIS
 
Glass Evidence
Glass EvidenceGlass Evidence
Glass Evidence
 
Propallent burning
Propallent burningPropallent burning
Propallent burning
 
GSR
GSRGSR
GSR
 
Police and Detective Training Schools
Police and Detective Training SchoolsPolice and Detective Training Schools
Police and Detective Training Schools
 
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
 
ammunition and its classification
ammunition and its classificationammunition and its classification
ammunition and its classification
 

Andere mochten auch

Rfc ppt ponderosa
Rfc ppt  ponderosaRfc ppt  ponderosa
Rfc ppt ponderosaRay Bryant
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareDavid Sweigert
 
Use of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisUse of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisDavid Sweigert
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksDavid Sweigert
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDavid Sweigert
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksDavid Sweigert
 
Healthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRHealthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRDavid Sweigert
 
Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareDavid Sweigert
 
Cyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureCyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureDavid Sweigert
 
Developing Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to RecoveryDeveloping Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to RecoveryDavid Sweigert
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3David Sweigert
 
Russian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureRussian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureDavid Sweigert
 
Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017David Sweigert
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83David Sweigert
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefingDavid Sweigert
 
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...David Sweigert
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentDavid Sweigert
 
TDL3 Rootkit Background
TDL3 Rootkit BackgroundTDL3 Rootkit Background
TDL3 Rootkit BackgroundDavid Sweigert
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider ThreatDavid Sweigert
 

Andere mochten auch (20)

Rfc ppt ponderosa
Rfc ppt  ponderosaRfc ppt  ponderosa
Rfc ppt ponderosa
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Use of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisUse of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysis
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA framework
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication Attacks
 
Healthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRHealthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPR
 
Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional Warfare
 
Cyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureCyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy Infrastructure
 
Developing Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to RecoveryDeveloping Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to Recovery
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
 
Russian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureRussian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting Infrastructure
 
Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefing
 
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
TDL3 Rootkit Background
TDL3 Rootkit BackgroundTDL3 Rootkit Background
TDL3 Rootkit Background
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 

Ähnlich wie RFC 2196 Site Security Handbook

An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolJude Rainer
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayDotha Keller
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...Power System Operation
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdfDr. Shivashankar
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words ansachazerbelq9l
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxTRSrinidi
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear FacilitiesOPSWAT
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfVishwanathMahalle
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 

Ähnlich wie RFC 2196 Site Security Handbook (20)

An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 

Mehr von David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

Mehr von David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Kürzlich hochgeladen

The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)Congressional Budget Office
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfSamirsinh Parmar
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxtsionhagos36
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCNAP Global Network
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlEdouardHusson
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 
Government e Marketplace GeM Presentation
Government e Marketplace GeM PresentationGovernment e Marketplace GeM Presentation
Government e Marketplace GeM Presentationgememarket11
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 

Kürzlich hochgeladen (20)

The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
Government e Marketplace GeM Presentation
Government e Marketplace GeM PresentationGovernment e Marketplace GeM Presentation
Government e Marketplace GeM Presentation
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 

RFC 2196 Site Security Handbook

  • 1. Information Networking Security and Assurance Lab National Chung Cheng University 2014/12/3 Kai, 2004 insa 1 RFC 2196 – Site Security Handbook a guide to developing computer security policies and procedures for sites that have systems on the Internet B. Fraser SEI/CMU
  • 2. Information Networking Security and Assurance Lab National Chung Cheng University 2 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 3. Information Networking Security and Assurance Lab National Chung Cheng University 3 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 4. Information Networking Security and Assurance Lab National Chung Cheng University 4 Kai, 2004 insa 1 Introduction  This handbook is a guide to setting computer security policies and procedures for sites that have system on the internet.  Definitions Site – any organization that owns computer or network- related resources. Internet – RFC 1594 Administrator Security administrator Decision maker – refers to those people at a site who set or approve policy. A collection of thousands of networks linked by a common set of technical protocols which make it possible for users of any one of the networks to communicate with, or use the services located on, any of the other networks
  • 5. Information Networking Security and Assurance Lab National Chung Cheng University 5 Kai, 2004 insa 1.5 Basic Approach  Steps to develop a security plan for your site 1. Identify what you trying to protect 2. Determine what you are trying to protect it from. 3. Determine how likely the threats are. 4. Implement measures which will protect your assets in a cost-effective manner 5. Review the process continuously and make improvements each time a weakness is found. The cost of protecting yourself against a threat should be less than the cost of recovering if the threat were to strike you.
  • 6. Information Networking Security and Assurance Lab National Chung Cheng University 6 Kai, 2004 insa 1.6 Risk Assessment  It is possible to be mislead about where the effort is needed.  Risk analysis  Determining what you need to protect, what you need to protect it from, and how to protect it. 1. Identifying the assets – the basic goals of security are availability, confidentiality, and integrity 2. Identifying the threats – Each threat should be examined with an eye to how the threat could affect these areas
  • 7. Information Networking Security and Assurance Lab National Chung Cheng University 7 Kai, 2004 insa 1.6.2 Identifying the Assets Hardware CPUs, boards, keyboards, terminals, workstations, personal computers, printers, disk drivers, communication lines, terminal server, routers Software source programs, object programs, utilities, diagnostic programs, operating systems, communication programs data During execution, stored on-line, archived off-line, backups, audit logs, databases, in transit over communication media. People User, administrators, hardware maintainers Documentation On programs, hardware, systems, local administrative procedures. Supplies Paper, forms, ribbons, magnetic media.
  • 8. Information Networking Security and Assurance Lab National Chung Cheng University 8 Kai, 2004 insa 1.6.3 Identifying the Threats • The following are classic threats that should be considered 1. Unauthorized access to resources and/or information 2. Unintented and/or unauthorized disclosure of information 3. Denial of service
  • 9. Information Networking Security and Assurance Lab National Chung Cheng University 9 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 10. Information Networking Security and Assurance Lab National Chung Cheng University 10 Kai, 2004 insa 2 Security Policies  What is a security policy and why have one?  A security policy is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide.  Purposes of a security policy  To inform users, staff and managers of their obligatory requirements for protecting technology and information assets.  Appropriate Use Policy AUP spell out what users shall and shall not do on the various components of the system, including the type of traffic allowed on the networks.
  • 11. Information Networking Security and Assurance Lab National Chung Cheng University 11 Kai, 2004 insa 2 Security Policies  Determined by the following Key tradeoff 1.Services Offered versus Security Provided 2.Ease of Use versus Security 3.Cost of Security versus Risk of Loss  Who should be involved when forming policy 1.Site security administrator 2.Information technology technical staff 3.Administrator of large use groups within the organization 4.Security incident response team 5.Representative of the user groups affected by the security policy 6.Responsible management 7.Legal counsel Loss of privacy Loss of data Loss of service Monetary Performance Ease of use
  • 12. Information Networking Security and Assurance Lab National Chung Cheng University 12 Kai, 2004 insa 2.2 What Makes a Good Security Policy?  The characteristics of a good security policy 1. Be implementable through system administration procedures 2. Be enforceable with security tools 3. Cleary define the area of responsibility for the users and management.  The component of a good security policy 1. Computer technology purchasing Guidelines which specify required, or preferred, security features 2. A privacy policy which defines reasonable expectations of privacy regarding. 3. An access policy which defines access rights and privileges to protect assets for users.
  • 13. Information Networking Security and Assurance Lab National Chung Cheng University 13 Kai, 2004 insa 2.2 What Makes a Good Security Policy?  The component of a good security policy 4. An accountability policy which defines the responsibilities of users. 5. An authentication policy which established trust through an effective password policy. 6. An Availability statement which sets users' expectations for the availability of resources. 7. An Information Technology System & Network Maintenance Policy which describes how both internal and external maintenance people are allowed to handle and access technology. 8. A Violations Reporting Policy that indicates which types of violations must be reported and to whom the reports are made. 9. Supporting Information which provides users, staff, and management with contact information for each type of policy violation
  • 14. Information Networking Security and Assurance Lab National Chung Cheng University 14 Kai, 2004 insa 2.3 Keeping the Policy Flexible  In order for a security policy to be viable for the long term, it requires a lot of flexibility based upon an architectural security concept.  It is important to recognize that there are exceptions to every rule. the policy should spell out what exceptions to the general policy exist.  Garbage Truck Syndrome This refers to what would happen to a site if a key person was suddenly unavailable for his/her job function.
  • 15. Information Networking Security and Assurance Lab National Chung Cheng University 15 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 16. Information Networking Security and Assurance Lab National Chung Cheng University 16 Kai, 2004 insa 3 Architecture 1. Objectives 1. Completely defined security plans 1. the list of network services that will be provided 2. which areas of the organization will provide the services 3. who will have access to those services 4. how access will be provided 5. who will administer those services. 2. Separation of services  to distinguish between hosts which operate within different models of trust 3. Deny all/ Allow all 4. Identify real need for services Individual policies can be consistent with the overall site security host or network level Router level the theory of a hard "crunchy" shell and a soft "squishy“ middle. security complexity can grow exponentially with the number of services provided.
  • 17. Information Networking Security and Assurance Lab National Chung Cheng University 17 Kai, 2004 insa 3.2 Network and Service Configuration 1. Protecting the infrastructure 2. Protecting the network 1. DoS  attacking the routers  Flooding the network with extraneous traffic 2. Spoofing 3. Solutions 1. Clear-text password 2. Cryptographic checksum 3. Encryption 3. Protecting the services  Name servers (DNS and NIS(+))  Password/key servers (NIS(+) and KDC)  Authentication/proxy servers (SOCKS, FWTK)  Electronic Mail  World Wide Web (WWW)  File Transfer (FTP, TFTP)  NFS 4. Protecting the Protection
  • 18. Information Networking Security and Assurance Lab National Chung Cheng University 18 Kai, 2004 insa 3.3 firewalls Filtering routers Filtering policy: source and destination IP address, source and destination TCP port numbers, state of the TCP "ack" bit, UDP source and destination port numbers, and direction of packet flow Proxy servers Application Layer Gateway Combine with VPN Logging function in Firewall
  • 19. Information Networking Security and Assurance Lab National Chung Cheng University 19 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 20. Information Networking Security and Assurance Lab National Chung Cheng University 20 Kai, 2004 insa 4 Security services and procedures 1. Authentication  One-time password  Kerberos: V4 and V5  Choosing and protecting Secret tokens and PINs  Password Assurance  The importance of robust passwords: Spider ->5p1der  Changing default passwords  Restricting access to the password file  Password aging  Password/account blocking  A word about the finger daemon
  • 21. Information Networking Security and Assurance Lab National Chung Cheng University 21 Kai, 2004 insa 4 Security services and procedures 2. Confidentiality  Encryption 3. Integrity  Checksum: MD5 4. Authorization  The privileges, rights, property, and permissible actions  ACL
  • 22. Information Networking Security and Assurance Lab National Chung Cheng University 22 Kai, 2004 insa 4.5 Access  Physical Access  Walk-up Network Connections  Other network technologies  Modems  Modem lines must be managed  Dial-in user must be authentication  Call-back capability  All logins should be logged  Choose your opening banner carefully  Dial-out authentication  Make your modem programming as “Bullet-proof” as Possible
  • 23. Information Networking Security and Assurance Lab National Chung Cheng University 23 Kai, 2004 insa 4.6 Auditing  What to collect  Login and logout, super user access, ticket generation, and any other change of access or status.  Collection process 1. Read/write file 2. Write-once/read-many 3. Write-only  Collection load  Data compressed or batch capture  Handling and preserving audit data  Legal considerations Do not gather passwords
  • 24. Information Networking Security and Assurance Lab National Chung Cheng University 24 Kai, 2004 insa 4.7 securing backups 1. Make sure your site is creating backups 2. Make sure your site is using offsite storage for backups 3. Consider encrypting your backups to provide additional protection of the information once it is off-site. 4. Don’t always assume that your backups are good. 5. Periodically verify the correctness and completeness of your backups
  • 25. Information Networking Security and Assurance Lab National Chung Cheng University 25 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 26. Information Networking Security and Assurance Lab National Chung Cheng University 26 Kai, 2004 insa 5 Security incident handling 1. Preparing and planning 2. Notification 3. Identifying an incident 4. Handling 5. Aftermath 6. Administrative response to incident
  • 27. Information Networking Security and Assurance Lab National Chung Cheng University 27 Kai, 2004 insa 5.1 preparing and planning for incident handling  Why learning to respond efficiently to an incident? 1. Protecting the asset which could be compromised 2. Protecting resources which could be utilized more profitably if an incident did not require their services 3. Complying with (government or other) regulations 4. Preventing the use of your systems in attacks against other systems 5. Minimizing the potential for negative exposure.
  • 28. Information Networking Security and Assurance Lab National Chung Cheng University 28 Kai, 2004 insa 5.1 preparing and planning for incident handling  A set of objective can be identified for dealing with incidents 1. Figure out how it happened 2. Find out how to avoid further exploitation of the same vulnerability. 3. Avoid escalation and further incidents 4. Assess the impact and damage of the incident 5. Recover from the incident 6. Update policies and procedures as needed 7. Find out who did it
  • 29. Information Networking Security and Assurance Lab National Chung Cheng University 29 Kai, 2004 insa 5.1 preparing and planning for incident handling  Suggested priorities may serve as a starting point for defining your organization’s response 1. Priority one – protect human life people’s safety 2. Priority two – protect classified and sensitive data. Prevent exploitation of classified and sensitive systems. 3. Priority three – protect other data, including proprietary, scientific, managerial and other data. 4. Priority four – prevent damage to systems. 5. Priority five – minimize disruption of computing resources.
  • 30. Information Networking Security and Assurance Lab National Chung Cheng University 30 Kai, 2004 insa 5.2 Notification and points of contact 1. Local managers and personnel 2. Law enforcement and investigative agencies – legal and practical issues 1. Whether your site or organization is willing to risk negative publicity or exposure to cooperate with legal prosecution efforts. 2. Downstream liability 3. Distribution of information 4. Liabilities due to monitoring
  • 31. Information Networking Security and Assurance Lab National Chung Cheng University 31 Kai, 2004 insa 5.2 Notification and points of contact 3. Computer security incident handling (response) teams 4. Affected and involved sites 5. Internal communications 6. Public relations – press releases  Guidelines to provide to the press 1. Keep the technical level of detail low. 2. Keep the speculation out of press statements. 3. Work with law enforcement professionals to assure that evidence is protected. 4. Try not to be forced into a press interview before you are prepared. 5. Do not allow the press attention to detract from the handling of the event.
  • 32. Information Networking Security and Assurance Lab National Chung Cheng University 32 Kai, 2004 insa 5.3 Identifying an incident 1. Is it real?  Certain indications or symptoms of an incident that deserve special attention 1. System crashes 2. New user accounts 3. New files, or strange file names 4. Accounting discrepancies 5. Changes in file lengths or dates. 6. Attempts to write to system 7. Data modification or deletion 8. Denial of service 9. Unexplained, poor system performance 10. Anomalies 11. Suspicious probes 12. Suspicious browsing 13. Inability of a use to log in due to modifications of his account.
  • 33. Information Networking Security and Assurance Lab National Chung Cheng University 33 Kai, 2004 insa 5.3 Identifying an incident 2. Types and scope of incidents 1. Is this a multi-site incident? 2. Are many computer at your site affected by this incident? 3. Is sensitive information involved? 4. What is the entry point of the incident? 5. Is the press involved? 6. What is the potential damage of the incident? 7. What is the estimated time to close out the incident 8. What resource could be required to handle the incident? 9. Is law enforcement involved? 3. Assessing the damage and extent
  • 34. Information Networking Security and Assurance Lab National Chung Cheng University 34 Kai, 2004 insa 5.4 Handling an incident 1. Types of notification and exchange of information  The following minimum information should be provided 1. Timezone of logs, … in GMT or local time 2. Information about the remote system 3. All log entries relevant for the remote site 4. Type of incident 2. Protecting evidence and activity logs  Gathering evidence 1. All system event 2. All actions you take 3. All external conversations
  • 35. Information Networking Security and Assurance Lab National Chung Cheng University 35 Kai, 2004 insa 5.4 handling an incident 3. Containment 4. Eradication 5. Recovery 6. Follow-up  to write a report describing the exact sequence of events: 1. the method of discovery 2. Correction procedure 3. monitoring procedure 4. a summary of lesson learned
  • 36. Information Networking Security and Assurance Lab National Chung Cheng University 36 Kai, 2004 insa 5.5 Aftermath of an incident  In the wake of an incident, several actions should take place. 1. An inventory should be taken of the systems’ assets 2. The lessons learned as a result of the incident should be included in revised security plan to prevent the incident from re-occurring 3. A new risk analysis should be developed in light of the incident. 4. An investigation and prosecution of the individuals who caused the incident should commence, if it is deemed desirable
  • 37. Information Networking Security and Assurance Lab National Chung Cheng University 37 Kai, 2004 insa 5.6 Responsibilities 1. Not crossing the line 2. Good internet citizenship 3. Administrative response to incidents
  • 38. Information Networking Security and Assurance Lab National Chung Cheng University 38 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 39. Information Networking Security and Assurance Lab National Chung Cheng University 39 Kai, 2004 insa 6 Ongoing activities 1. Subscribe to advisories that are issued by various security incident response teams. 2. Monitor security patches that are produced by the vendors of your equipment, and obtain and install all that apply. 3. Actively watch the configurations of your systems to identify any changes. 4. Review all security policies and procedures annually 5. Read relevant mailing lists and USENET newsgroups to keep up the date with the latest information being shared by fellow administrators 6. Regularly check for compliance with policies and procedures.
  • 40. Information Networking Security and Assurance Lab National Chung Cheng University 40 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 41. Information Networking Security and Assurance Lab National Chung Cheng University 41 Kai, 2004 insa 7 Tools and locations  COPS, DES, Drawbridge, identd, ISS, Kerberos, logdaemon, lsof, MD5, PEM, PGP, rpcbind/portmapper replacement, SATAN, sfingerd, S/KEY, smarsh, ssh, Swatch, TCP-Wrapper, tiger, Tripwire, TROJAN.PL 1. CERT Coordination Center • ftp://info.cert.org:/pub/tools 2. DFN-CERT • ftp://ftp.cert.dfn.de/pub/tools 3. Computer operations, audit, and security tools (COAST) • soast.cs.purdue.edu:/pub/tools
  • 42. Information Networking Security and Assurance Lab National Chung Cheng University 42 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 43. Information Networking Security and Assurance Lab National Chung Cheng University 43 Kai, 2004 insa 8 Mailing lists and other resources  Mailing lists 1. CERT advisory – mailto: cert-advisory-request@cert.org – Body: subscribe cert <FIRST NAME> <LAST NAME> 2. VIRUS-L List – mailto: listserv%lehiibm1.bitnet@mitvma.mit.edu – Body: subscribe virus-L FIRSTNAME LASTNAME 3. Internet Firewalls – mailto: majordomo@greatcircle.com – Body: subscribe firewalls user@host  USENET newsgroups 1. comp.security.announce 2. comp.security.misc 3. alt.security 4. comp.virus 5. comp.risks  World-Wide Web Pages 1. http://www.first.org 2. http://www.alw.nih.gov/Security/security.html 3. http://csrc.ncsl.nist.gov
  • 44. Information Networking Security and Assurance Lab National Chung Cheng University 44 Kai, 2004 insa