SlideShare uma empresa Scribd logo
1 de 20
CIS 264 Week 1
Highline Community College
        Dan Morrill
 Roles within the company
 Risks that are part of the regulatory landscape (SOX,
  HIPAA, FERPA, PCI-DSS, etc.)
 Risks that are part of the business decisions
 Risks that are part of the technology decisions
 Risks that are part of the security decisions
   HIPAA requires a firewall, the business decides to
    purchase CISCO because of an existing contract,
    Technology purchases a Cisco 7600 with a firewall
    module, security configures it to work on the network by
    opening ports and allowing access to services
 Decisions for technological solutions will be made by
  people who do not understand the technology
 Decisions for purchasing will be made by existing
  contracts and discounts with IT providers
 Decisions might be locked in for years (Cisco,
  Microsoft, Linux) because of those contracts
   And it is hard to swap out technologies, it is nearly
    impossible for a Windows shop to go to Linux in its
    entirety because of “lock in” with vendors
   You see this now with cloud computing, and the attempt
    to avoid vendor lock in with any provider
 Point solutions are still popular in organizations
   Technology and security need to understand what needs
    to be protected in the organization
   Technology and security need to understand the critical
    assets for business continuity (the systems the company
    needs to run to continue to do business)
      Every manager and executive thinks that their systems are
       business critical and will make decisions about IT, Business
       Continuity, and Disaster recovery based on that perception
 Businesses are highly political
   Don’t tell the VP you can’t do it, or won’t do it – they will
    find a way to make it happen regardless of what IT says
 Technology and security need to identify every IT
 solution in the company and how the interconnect to
 each other to deliver services
   This includes new, old, vintage, and forgotten systems
    and programs
   Some programs and systems will be orphaned in the
    organization with no clear manager or maintainer
   Some users do not want their systems upgraded or
    changed and will help kill new systems or changes
   Some managers do not want to lose what political power
    they have – and will help kill new systems or changes
 Technology provides solutions to business
 problems, business problems are based on the
 perceived power of the people making those decisions
     What are the systems we need to protect
     Who uses them and how
     What are the risks we are trying to reduce
     What is the highest priority risks (this is heavily
      influenced by power both actual and perceived within
      an organization)
 Are you reducing risks in the most cost effective way?
   Heavily dependent upon politics and power within the
      organization
 Risk = (threats x vulnerabilities) + (likelihood x impact) +
  (politics + positional power in the organization)
 Risk is the probability of loss
    This means uncertainty and messy answers
    This means that the “risk” is open to political and positional
     influence up and down the organization
 Risk is the possibility of a threat
    How likely is something to happen, how clever are the
     hackers, how clever is IT and security?
 Risk is qualified (measured) by how likely something is to
  happen to the systems
    This is prone to second guessing, and lack of imagination
 A vulnerability is the weakness that makes the
  resource susceptible to the threat.
 A threat is anything capable of acting against a
  resource in a manner that can result in harm
  (intentionally or accidentally).
 The likelihood is a measure of how probable it is that
  the threat/vulnerability pair will be realized.
 The severity is a measure of the magnitude of the
  consequences that result from the threat/vulnerability
  pair being realized for that resource.
 Likelihood:
 Critical (5) – Exposure is apparent through casual use or with publicly
  available information, and the weakness is accessible publicly on the
  Internet
  High (4) – The threat-source is highly motivated and sufficiently
  capable, and controls to prevent the vulnerability from being exercised
  are ineffective.
  Moderate (3) – The threat-source is motivated and capable, but
  controls are in place that may impede successful exercise of the
  vulnerability.
  Low (2) – The threat-source lacks motivation or capability, or controls
  are in place to prevent, or at least significantly impede, the
  vulnerability from being exercised
  Extremely Low (1) – The threat-source is part of a small and trusted
  group, controls prevent exploitation without physical access to the
  target, significant inside knowledge is necessary, or purely theoretical
 Severity:
 Critical (4) – May allow full access to or control of the
  application, system, or communication including all data
  and functionality
  High (3) - May allow limited access to or control of the
  application, system, or communication including only
  certain data and functionality
  Moderate (2) – May indirectly contribute to unauthorized
  activity or just have no known attack vector. Impact may
  vary as other vulnerabilities or attack vectors are identified.
  Low (1) – May indirectly contribute to unauthorized
  activity or just have no known attack vector. Impact may
  vary as other vulnerabilities or attack vectors are identified.
 Risk Exposure:
 1 – 4 Low - May have some minor effect on the system, but likely little impact to the
  organization overall. Recovering from such an impact will require minimal expenditures
  and resources. A single issue, by itself, may not place the integrity, availability, or
  confidentiality of a system at risk. Multiple issues in this category could be combined,
  however, in an exploit attempt.
  5–7         Moderate - May result in some tangible impact to the organization. The
  impact could be narrow in focus and perhaps only noted by a few individuals or parts of
  the organization. May cause organizational embarrassment. Recovering from such an
  impact will require some expenditure and resources.
  8 – 11     High - May cause an extensive system outage, and/or loss of customer or
  business confidence. May also result in compromise of a large amount of the
  organization’s information or services, including sensitive information. Recovering from
  such an impact will require a substantial amount of expenditure, resources, and
  time. These vulnerabilities should be taken seriously and addressed quickly.
  12+        Critical - This level of risk exposure is unacceptable for any aspect of the
  environment. It introduces a level of exposure that cannot be maintained over time. The
  remaining categories may be acceptable depending on the risk tolerance range.
 Applied Risk Exposure:
 1–8        Low - Acceptable without review by
 management
 9 – 25     Moderate - Management must determine
 whether corrective actions are required or decide to
 accept the risk
 26 – 39 High - Undesirable and requires corrective
 action. A plan must be developed to incorporate these
 actions within a reasonable period of time based on
 the discretion of management.
 40+         Critical - Undesirable and requires
 immediate corrective action
 There are two primary approaches to information
  security at this time
   Proactive
   Reactive
 Proactive – identify risks and vulnerabilities to systems
  before hackers do, and take appropriate actions to
  secure them and minimize risk
 Reactive – wait to get hacked, then take appropriate
  measures and actions to secure them and minimize
  risk
 Reactive information security has generally fallen out
 of favor
   Most companies do a combination of reactive and
    proactive security
      Patch updates
      Internal security testing
      If hacked – find the way they got in and fix it
   Reactive information security has a hard time scaling to
    the organization because of the complexity of systems
    being used and the number of ways that networks are
    accessed
   BYOD complicates the matter of reactive because it is
    very hard to define where the network boarder is
 Proactive information security is limited by:
   The imagination of people doing security risk management
   The skills of the employees who conduct information security
    surveys of the network
   The support of management to fix problems (that might be
    critical but costly) in a reasonable period of time
   “Security as a Cost Center” the perception of no real benefit to
    the company because nothing bad ever happens
 Proactive information security is written into some
  regulations by specifying that companies will accomplish
  tasks like third party network evaluations, firewalls, and
  other security systems as part of the companies operations
 One of the largest problems in information security is
 that there are a large number of “unknowns”
   It is unknown to most companies, law enforcements,
    and governments just how many vulnerabilities there
    are out there
   There is a broad and complex market for “Zero Day”
    vulnerabilities that are used by companies, criminals,
    law enforcement and governments without notifying the
    developer of those flaws
 Most companies cannot and do not belong in the
 business of “zero day” research
 Hacks get more complex
 Hackers duration on the networks increases
 AV might not catch it all
 Firewalls and SEIM systems might not see it all
 Coders will never write unhackable code
 Systems are exposed everywhere there is a connection
 Open markets for vulnerabilities
 Slow OEM response at times to vulnerabilities
 You have to manage your networks, systems, access points,
  user front ends, and everything else with what you know
   People in technology and/or information security that do not
     constantly learn new stuff become obsolete within a year
 You have to work with an often dysfunctional organization
  to learn to play politics to secure systems adequately
 You have to trust OEM’s to deliver a patch in time
 You have to trust your systems based on what they are
  seeing
 And you have to get creative with your skills to keep your
  networks safe
Understanding the security_organization

Mais conteúdo relacionado

Mais procurados

Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1securityAnne Starr
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsArun Prabhakar
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 

Mais procurados (20)

Security policy
Security policySecurity policy
Security policy
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Role management
Role managementRole management
Role management
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 

Destaque

Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Professional Security Organization ASIS Offers Bootcamp Training
Professional Security Organization ASIS Offers Bootcamp TrainingProfessional Security Organization ASIS Offers Bootcamp Training
Professional Security Organization ASIS Offers Bootcamp TrainingEmblez Longoria
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Health IT Conference – iHT2
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning warsRafal Los
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationPECB
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesJorge Sebastiao
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT SecuritySeccuris Inc.
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Building a Modern Security Engineering Organization
Building a Modern Security Engineering OrganizationBuilding a Modern Security Engineering Organization
Building a Modern Security Engineering OrganizationZane Lackey
 

Destaque (15)

Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Professional Security Organization ASIS Offers Bootcamp Training
Professional Security Organization ASIS Offers Bootcamp TrainingProfessional Security Organization ASIS Offers Bootcamp Training
Professional Security Organization ASIS Offers Bootcamp Training
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning wars
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
The New Security - Post "9/11"
The New Security - Post "9/11"The New Security - Post "9/11"
The New Security - Post "9/11"
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Building a Modern Security Engineering Organization
Building a Modern Security Engineering OrganizationBuilding a Modern Security Engineering Organization
Building a Modern Security Engineering Organization
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 

Semelhante a Understanding the security_organization

Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdfRiyaSonawane
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachGraydon McKee
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Network Security Risks and Challenges for Enterprises
Network Security Risks and Challenges for EnterprisesNetwork Security Risks and Challenges for Enterprises
Network Security Risks and Challenges for EnterprisesSandeep Yadav
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptxlochanrajdahal
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesDiane M. Metcalf
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 

Semelhante a Understanding the security_organization (20)

Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
information security management
information security managementinformation security management
information security management
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Network Security Risks and Challenges for Enterprises
Network Security Risks and Challenges for EnterprisesNetwork Security Risks and Challenges for Enterprises
Network Security Risks and Challenges for Enterprises
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 

Mais de Dan Morrill

Windows power shell and active directory
Windows power shell and active directoryWindows power shell and active directory
Windows power shell and active directoryDan Morrill
 
Windows power shell basics
Windows power shell basicsWindows power shell basics
Windows power shell basicsDan Morrill
 
Understanding web site analytics
Understanding web site analyticsUnderstanding web site analytics
Understanding web site analyticsDan Morrill
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingDan Morrill
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingDan Morrill
 
Understanding UNIX CASE and TPUT
Understanding UNIX CASE and TPUTUnderstanding UNIX CASE and TPUT
Understanding UNIX CASE and TPUTDan Morrill
 
Information security principles
Information security principlesInformation security principles
Information security principlesDan Morrill
 
Using Regular Expressions in Grep
Using Regular Expressions in GrepUsing Regular Expressions in Grep
Using Regular Expressions in GrepDan Morrill
 
You should ask before copying that media
You should ask before copying that mediaYou should ask before copying that media
You should ask before copying that mediaDan Morrill
 
Cis 216 – shell scripting
Cis 216 – shell scriptingCis 216 – shell scripting
Cis 216 – shell scriptingDan Morrill
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 
AWS Hadoop and PIG and overview
AWS Hadoop and PIG and overviewAWS Hadoop and PIG and overview
AWS Hadoop and PIG and overviewDan Morrill
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computingDan Morrill
 
Social Media Plan for CityU of Seattle
Social Media Plan for CityU of SeattleSocial Media Plan for CityU of Seattle
Social Media Plan for CityU of SeattleDan Morrill
 
Case Studies In Social Media Chinese
Case Studies In Social Media ChineseCase Studies In Social Media Chinese
Case Studies In Social Media ChineseDan Morrill
 
Case Studies In Social Media
Case Studies In Social MediaCase Studies In Social Media
Case Studies In Social MediaDan Morrill
 
Turn On Tune In Step Out
Turn On Tune In Step OutTurn On Tune In Step Out
Turn On Tune In Step OutDan Morrill
 
Technology And The Future Of Management
Technology And The Future Of ManagementTechnology And The Future Of Management
Technology And The Future Of ManagementDan Morrill
 

Mais de Dan Morrill (19)

Windows power shell and active directory
Windows power shell and active directoryWindows power shell and active directory
Windows power shell and active directory
 
Windows power shell basics
Windows power shell basicsWindows power shell basics
Windows power shell basics
 
Understanding web site analytics
Understanding web site analyticsUnderstanding web site analytics
Understanding web site analytics
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scripting
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
 
Understanding UNIX CASE and TPUT
Understanding UNIX CASE and TPUTUnderstanding UNIX CASE and TPUT
Understanding UNIX CASE and TPUT
 
Information security principles
Information security principlesInformation security principles
Information security principles
 
Using Regular Expressions in Grep
Using Regular Expressions in GrepUsing Regular Expressions in Grep
Using Regular Expressions in Grep
 
You should ask before copying that media
You should ask before copying that mediaYou should ask before copying that media
You should ask before copying that media
 
Cis 216 – shell scripting
Cis 216 – shell scriptingCis 216 – shell scripting
Cis 216 – shell scripting
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
AWS Hadoop and PIG and overview
AWS Hadoop and PIG and overviewAWS Hadoop and PIG and overview
AWS Hadoop and PIG and overview
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Social Media Plan for CityU of Seattle
Social Media Plan for CityU of SeattleSocial Media Plan for CityU of Seattle
Social Media Plan for CityU of Seattle
 
BSIS Overview
BSIS OverviewBSIS Overview
BSIS Overview
 
Case Studies In Social Media Chinese
Case Studies In Social Media ChineseCase Studies In Social Media Chinese
Case Studies In Social Media Chinese
 
Case Studies In Social Media
Case Studies In Social MediaCase Studies In Social Media
Case Studies In Social Media
 
Turn On Tune In Step Out
Turn On Tune In Step OutTurn On Tune In Step Out
Turn On Tune In Step Out
 
Technology And The Future Of Management
Technology And The Future Of ManagementTechnology And The Future Of Management
Technology And The Future Of Management
 

Último

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Understanding the security_organization

  • 1. CIS 264 Week 1 Highline Community College Dan Morrill
  • 2.  Roles within the company  Risks that are part of the regulatory landscape (SOX, HIPAA, FERPA, PCI-DSS, etc.)  Risks that are part of the business decisions  Risks that are part of the technology decisions  Risks that are part of the security decisions  HIPAA requires a firewall, the business decides to purchase CISCO because of an existing contract, Technology purchases a Cisco 7600 with a firewall module, security configures it to work on the network by opening ports and allowing access to services
  • 3.  Decisions for technological solutions will be made by people who do not understand the technology  Decisions for purchasing will be made by existing contracts and discounts with IT providers  Decisions might be locked in for years (Cisco, Microsoft, Linux) because of those contracts  And it is hard to swap out technologies, it is nearly impossible for a Windows shop to go to Linux in its entirety because of “lock in” with vendors  You see this now with cloud computing, and the attempt to avoid vendor lock in with any provider
  • 4.  Point solutions are still popular in organizations  Technology and security need to understand what needs to be protected in the organization  Technology and security need to understand the critical assets for business continuity (the systems the company needs to run to continue to do business)  Every manager and executive thinks that their systems are business critical and will make decisions about IT, Business Continuity, and Disaster recovery based on that perception  Businesses are highly political  Don’t tell the VP you can’t do it, or won’t do it – they will find a way to make it happen regardless of what IT says
  • 5.  Technology and security need to identify every IT solution in the company and how the interconnect to each other to deliver services  This includes new, old, vintage, and forgotten systems and programs  Some programs and systems will be orphaned in the organization with no clear manager or maintainer  Some users do not want their systems upgraded or changed and will help kill new systems or changes  Some managers do not want to lose what political power they have – and will help kill new systems or changes
  • 6.  Technology provides solutions to business problems, business problems are based on the perceived power of the people making those decisions  What are the systems we need to protect  Who uses them and how  What are the risks we are trying to reduce  What is the highest priority risks (this is heavily influenced by power both actual and perceived within an organization)  Are you reducing risks in the most cost effective way?  Heavily dependent upon politics and power within the organization
  • 7.  Risk = (threats x vulnerabilities) + (likelihood x impact) + (politics + positional power in the organization)  Risk is the probability of loss  This means uncertainty and messy answers  This means that the “risk” is open to political and positional influence up and down the organization  Risk is the possibility of a threat  How likely is something to happen, how clever are the hackers, how clever is IT and security?  Risk is qualified (measured) by how likely something is to happen to the systems  This is prone to second guessing, and lack of imagination
  • 8.  A vulnerability is the weakness that makes the resource susceptible to the threat.  A threat is anything capable of acting against a resource in a manner that can result in harm (intentionally or accidentally).  The likelihood is a measure of how probable it is that the threat/vulnerability pair will be realized.  The severity is a measure of the magnitude of the consequences that result from the threat/vulnerability pair being realized for that resource.
  • 9.  Likelihood:  Critical (5) – Exposure is apparent through casual use or with publicly available information, and the weakness is accessible publicly on the Internet High (4) – The threat-source is highly motivated and sufficiently capable, and controls to prevent the vulnerability from being exercised are ineffective. Moderate (3) – The threat-source is motivated and capable, but controls are in place that may impede successful exercise of the vulnerability. Low (2) – The threat-source lacks motivation or capability, or controls are in place to prevent, or at least significantly impede, the vulnerability from being exercised Extremely Low (1) – The threat-source is part of a small and trusted group, controls prevent exploitation without physical access to the target, significant inside knowledge is necessary, or purely theoretical
  • 10.  Severity:  Critical (4) – May allow full access to or control of the application, system, or communication including all data and functionality High (3) - May allow limited access to or control of the application, system, or communication including only certain data and functionality Moderate (2) – May indirectly contribute to unauthorized activity or just have no known attack vector. Impact may vary as other vulnerabilities or attack vectors are identified. Low (1) – May indirectly contribute to unauthorized activity or just have no known attack vector. Impact may vary as other vulnerabilities or attack vectors are identified.
  • 11.  Risk Exposure:  1 – 4 Low - May have some minor effect on the system, but likely little impact to the organization overall. Recovering from such an impact will require minimal expenditures and resources. A single issue, by itself, may not place the integrity, availability, or confidentiality of a system at risk. Multiple issues in this category could be combined, however, in an exploit attempt. 5–7 Moderate - May result in some tangible impact to the organization. The impact could be narrow in focus and perhaps only noted by a few individuals or parts of the organization. May cause organizational embarrassment. Recovering from such an impact will require some expenditure and resources. 8 – 11 High - May cause an extensive system outage, and/or loss of customer or business confidence. May also result in compromise of a large amount of the organization’s information or services, including sensitive information. Recovering from such an impact will require a substantial amount of expenditure, resources, and time. These vulnerabilities should be taken seriously and addressed quickly. 12+ Critical - This level of risk exposure is unacceptable for any aspect of the environment. It introduces a level of exposure that cannot be maintained over time. The remaining categories may be acceptable depending on the risk tolerance range.
  • 12.  Applied Risk Exposure:  1–8 Low - Acceptable without review by management 9 – 25 Moderate - Management must determine whether corrective actions are required or decide to accept the risk 26 – 39 High - Undesirable and requires corrective action. A plan must be developed to incorporate these actions within a reasonable period of time based on the discretion of management. 40+ Critical - Undesirable and requires immediate corrective action
  • 13.  There are two primary approaches to information security at this time  Proactive  Reactive  Proactive – identify risks and vulnerabilities to systems before hackers do, and take appropriate actions to secure them and minimize risk  Reactive – wait to get hacked, then take appropriate measures and actions to secure them and minimize risk
  • 14.  Reactive information security has generally fallen out of favor  Most companies do a combination of reactive and proactive security  Patch updates  Internal security testing  If hacked – find the way they got in and fix it  Reactive information security has a hard time scaling to the organization because of the complexity of systems being used and the number of ways that networks are accessed  BYOD complicates the matter of reactive because it is very hard to define where the network boarder is
  • 15.  Proactive information security is limited by:  The imagination of people doing security risk management  The skills of the employees who conduct information security surveys of the network  The support of management to fix problems (that might be critical but costly) in a reasonable period of time  “Security as a Cost Center” the perception of no real benefit to the company because nothing bad ever happens  Proactive information security is written into some regulations by specifying that companies will accomplish tasks like third party network evaluations, firewalls, and other security systems as part of the companies operations
  • 16.  One of the largest problems in information security is that there are a large number of “unknowns”  It is unknown to most companies, law enforcements, and governments just how many vulnerabilities there are out there  There is a broad and complex market for “Zero Day” vulnerabilities that are used by companies, criminals, law enforcement and governments without notifying the developer of those flaws  Most companies cannot and do not belong in the business of “zero day” research
  • 17.
  • 18.  Hacks get more complex  Hackers duration on the networks increases  AV might not catch it all  Firewalls and SEIM systems might not see it all  Coders will never write unhackable code  Systems are exposed everywhere there is a connection  Open markets for vulnerabilities  Slow OEM response at times to vulnerabilities
  • 19.  You have to manage your networks, systems, access points, user front ends, and everything else with what you know  People in technology and/or information security that do not constantly learn new stuff become obsolete within a year  You have to work with an often dysfunctional organization to learn to play politics to secure systems adequately  You have to trust OEM’s to deliver a patch in time  You have to trust your systems based on what they are seeing  And you have to get creative with your skills to keep your networks safe

Notas do Editor

  1. http://ossie-group.org/blog/?p=79
  2. http://ossie-group.org/blog/?p=79
  3. http://www.av-comparatives.org/images/docs/avc_prot_2012b_en.pdf