SlideShare a Scribd company logo
1 of 38
Operations Security
Objectives
● Understand the operations necessary to protect and
control information processing assets
● Identify the security services available
● Know the process and techniques that can be
implemented to keep the system operational when
faced with threats
Major Components of OpSec
● Privileged entity controls
○ Separation of Duties
○ Principle of Least Privilege
● Resource protection
○ Threat and Vulnerability Management
● Change control management
● Problem Management
● Auditing
Related Security Principles
● Accountability: management and administration
controls
○ Authorization
○ Logging
● Separation of Tasks/Duties
● Least privilege
● System architecture, configurations, redundancy
● Risk Reduction
● Layered Defense or Defense in Depth
● Transfer of risk, e.g. insurance
Constant Awareness Required
● Monitoring
● Auditing
● Surveillance
● IDS
● IPS
And what are we
looking for
○ threats
○ vulnerabilities
○ scanners
○ exposures
○ signatures
○ ...
Threat Model
Controls to protect hardware, software and media
from:
● Threats in a operating environment
● Internal/External intruders
● Operators inappropriately accessing resources
● OpSec Triple: Threats/Vulnerabilities/Assets
Threats - Inappropriate Activities
Can be grounds for job action or dismissal
● Inappropriate content
● Waste of Corporate Resources
● Sexual or Racial Harassment
● Abuse of privileges or rights
Threats - Illegal Operations
● Eavesdropping: sniffing, dumpster diving, etc.
● Fraud: falsified transactions
● Theft: information or trade secrets, physical
hardware
● Sabotage: DOS, production delays
● External Attacks
Network and System
Vulnerabilities
● Traffic/Trend Analysis: analyzing data
characteristics
● Covert Channel Analysis: unintended channel
● Countermeasures include:
○ Padding Messages
○ Sending Noise
Other Threats
● Data Scavenging - piecing together
information from bits of data
● Keyboard Attacks/Laboratory Attacks
● IPL Vulnerabilities
● Network Address Hijacking
Additional Topics
● Adds, moves and changes
● Information sensitivity: handling, storage,
life-cycle, destruction
● Exploits: viruses and worms
● Incident handling: logging, reporting, tracking
• Crimes: Means/opportunity/motive (MOM)
• Types of exploits: at each layer
• Insiders or those closest to assets are the
greatest risks
• Hackers, crackers and externally based
technical exploits drive the majority of
security discussions but not the bulk of
economic losses
Exploits and Malicious Attacks
Privileged Entity Controls
Definition
● Privileged operations functions
● Extended special access to system commands
● Access to special parameters
● Access to system control program: some only
run in particular state
Prevailing Laws and Regulations
● A number of laws have been passed that
require information privacy.
● Ensuring Privileged Entity Control is critical to
following the law and staying compliant.
○ NIS Directive
○ GDPR
○ EU Cybersecurity Act
○ Member States
● Data entry personnel must not be the same
individuals verifying the data
● Reconciliation of the information should not
be performed by the individual entering the
information
Separation of Duties
Separation of Duties
• Assign different task to different personnel
• No single person runs a system
• Related to concept of least privileges
• Secure Systems
• Highly Secure Systems
Separation of Duties
The same individual should not typically perform the
following functions:
• Systems administration
• Network management
• Data entry
• Computer operations
• Security administration
• Systems development and maintenance
• Security auditing
• Information systems management
• Change management
Separation of Duties
System Administrator
• Installing system software
• Planned Start up/Shut down
• Backup/recovery
• Mounting disks/tapes
• Handling hardware
• Adding/removing users
Separation of Duties
Security Administrator
● User activities
○ Adding/removing users
○ Setting clearances
○ Setting passwords
○ Setting other security characteristics
○ Changing profiles
● Setting file sensitivity labels
● Setting security characteristics of devices,
communications channels
● Reviewing audit data
Principle of Least Privilege
• The principle of least privilege (POLP) is the
practice of limiting access to the minimal level
that will allow normal functioning
• The principle is also applied to programs and
processes
• The principle of least privilege originated in the
United States Department of Defense in the
1970s. The Rainbow Series of security documents
highly emphasized this concept
Resources Protection
Protecting resources from disclosure, alteration,
misuse or unsafe conditions
• Hardware
• Software
• Data Processing Resources
• Media
• Change Management
Control Categories
● Preventative: prevent incident
○ Firewall or Locked Door
● Detective: detect after incident
○ Network IDS or Video Camera
● Corrective: correct after incident
○ IPS or Guard reaction
● Deterrent Control: deter behavior before
incident
○ Login warning banner or “Do Not Enter” sign
Additional Controls
● Application Controls
● Transaction Controls
● Input Controls
● Processing Controls
● Output Controls
● Change Controls
● Test Controls
Hardware Controls
● Hardware Maintenance
● Maintenance Accounts
● Diagnostic Port Control
● Hardware Physical Controls
○ Require locks and alarms
Problems with Software
● Powerful system utilities
● Powerful system commands
○ Superzapping - system utility or application that
bypasses all access controls and audit/logging functions
to make updates to code or data
● Direct control over hardware and software
● Direct control over all files
● Direct control over printers and output queues
● Powerful Input/Output commands
● Direct access to servers
● Initial program load from console
Problems with Software
● Initial program load: IPL from tape
● Control over job schedule and execution
● Control over all storage media
● Bypass label processing
● Re-labeling resources
● Resetting date/time, passwords
● Control of access ports/lines
● Erroneous transactions (fraud)
○ Altering proper transactions
○ Adding improper transactions
● Denial of service/Delays in operation
● Personal use, Disclosure
● Audit trail/log corruption/modification
Software Controls
● Anti-virus Management
● Software Testing
● Software Utilities
● Safe software Storage
● Back up Controls
Data Processing Resources
Physically safeguarding the resources that
process data for an organization, such as
• People
• Facilities
• Communications equipment
• Archives
• Data storage media
• Servers and network equipment
Media Protection - Key Terms
Due care and Due Diligence: legal standards
important in defining negligence and liability
• Due Diligence is understanding where your
risks lie
• Due Care is taking reasonable action to
mitigate those risks
Media Protection Key Terms
● Records Retention: policy driven, critical
influences include legal, personnel and
operational considerations
● Data Remanence: information left AFTER
erasure of media
Media Security Controls
Prevent the loss of sensitive information when
the media is stored outside the system
● Logging
○ log the use of the media
● Access Control
○ physical access control
● Proper Disposal
○ sanitization of data
Media Viability Controls
Protect during handling, shipping and storage
● Marking
○ label and mark media
● Handling
○ physical protection of data
● Storage
○ security and environmental protection
Data Backup
● RAID
● Multiple servers
● CDDVDOptical Jukebox
● Removable Hard Drives
● Tape
● Storage Area Network (SAN) backup to
Network Attached Storage (NAS)
Data Backup
● Basic Types
○ Full: Backup everything of interest
○ Differential: Files that have changed since
○ last Full backup
○ Incremental: Files that have changed since
last backup (any type of backup)
● On-Site vs. Off-Site
RAID
Redundant Array of Inexpensive Disks
● Striping
● Mirroring
● Parity or checksums
● RAID Levels
RAID Levels
● Level 0: Striped Disk Array
○ No fault tolerance
○ Performance Increase
● Level 1: Mirroring
○ Single controller
○ Duplexing (multiple controllers)
○ No Performance Increase
● Level 2: Bit Level Striping
○ Data striped over disk drives at bit level
○ Hamming code used for parity
● Level 3: Duplexing
○ Two separate controllers w/parity
○ Data striped across drives, parities kept on their own drive
RAID Levels
● Level 4: Duplexing w/parity
○ Data striped across drives at the block level (as opposed to
byte level)
● Level 5
○ Array of at least 3 hard drives (array controller)
○ Data is striped (entire data block written)
○ Parity is distributed over all the disks
● Level 6
○ Two different and independent parity schemes, plus the
features of Level 5 (Raid DP – Raid 6 w/ double parity)
● Level 10: Mirroring and striping
○ (high performance and reliability)
Discussion…

More Related Content

What's hot

CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecuritySam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)Sam Bowne
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12jemtallon
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and TestingSam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13jemtallon
 
Access control Week 1
Access control Week 1Access control Week 1
Access control Week 1jemtallon
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
Log maintenance network securiy
Log maintenance  network securiyLog maintenance  network securiy
Log maintenance network securiyMohsin Ali
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingSam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)Sam Bowne
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
 

What's hot (20)

CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13
 
Access control Week 1
Access control Week 1Access control Week 1
Access control Week 1
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Log maintenance network securiy
Log maintenance  network securiyLog maintenance  network securiy
Log maintenance network securiy
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 

Similar to Operations Security

Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraAnant Corporation
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemLecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemAlchemist095
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2jemtallon
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyersdarrentthurston
 
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...JosephTesta9
 
Webinar: Three Reasons Storage Security is Failing and How to Fix It
Webinar: Three Reasons Storage Security is Failing and How to Fix ItWebinar: Three Reasons Storage Security is Failing and How to Fix It
Webinar: Three Reasons Storage Security is Failing and How to Fix ItStorage Switzerland
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
Splunk, SIEMs, and Big Data - The Undercroft - November 2019Splunk, SIEMs, and Big Data - The Undercroft - November 2019
Splunk, SIEMs, and Big Data - The Undercroft - November 2019Jonathan Singer
 
Data security in the age of GDPR – most common data security problems
Data security in the age of GDPR – most common data security problemsData security in the age of GDPR – most common data security problems
Data security in the age of GDPR – most common data security problemsExove
 
Making Sites Reliable (как сделать систему надежной) (Павел Уваров, Андрей Та...
Making Sites Reliable (как сделать систему надежной) (Павел Уваров, Андрей Та...Making Sites Reliable (как сделать систему надежной) (Павел Уваров, Андрей Та...
Making Sites Reliable (как сделать систему надежной) (Павел Уваров, Андрей Та...Ontico
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksSecurity Bootcamp
 

Similar to Operations Security (20)

Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache Cassandra
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemLecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file system
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2
 
9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
 
Wc4
Wc4Wc4
Wc4
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
 
Webinar: Three Reasons Storage Security is Failing and How to Fix It
Webinar: Three Reasons Storage Security is Failing and How to Fix ItWebinar: Three Reasons Storage Security is Failing and How to Fix It
Webinar: Three Reasons Storage Security is Failing and How to Fix It
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
Splunk, SIEMs, and Big Data - The Undercroft - November 2019Splunk, SIEMs, and Big Data - The Undercroft - November 2019
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
 
Data security in the age of GDPR – most common data security problems
Data security in the age of GDPR – most common data security problemsData security in the age of GDPR – most common data security problems
Data security in the age of GDPR – most common data security problems
 
Making Sites Reliable (как сделать систему надежной) (Павел Уваров, Андрей Та...
Making Sites Reliable (как сделать систему надежной) (Павел Уваров, Андрей Та...Making Sites Reliable (как сделать систему надежной) (Павел Уваров, Андрей Та...
Making Sites Reliable (как сделать систему надежной) (Павел Уваров, Андрей Та...
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 

Recently uploaded

SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSebastiano Panichella
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 

Recently uploaded (20)

SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 

Operations Security

  • 2. Objectives ● Understand the operations necessary to protect and control information processing assets ● Identify the security services available ● Know the process and techniques that can be implemented to keep the system operational when faced with threats
  • 3. Major Components of OpSec ● Privileged entity controls ○ Separation of Duties ○ Principle of Least Privilege ● Resource protection ○ Threat and Vulnerability Management ● Change control management ● Problem Management ● Auditing
  • 4. Related Security Principles ● Accountability: management and administration controls ○ Authorization ○ Logging ● Separation of Tasks/Duties ● Least privilege ● System architecture, configurations, redundancy ● Risk Reduction ● Layered Defense or Defense in Depth ● Transfer of risk, e.g. insurance
  • 5. Constant Awareness Required ● Monitoring ● Auditing ● Surveillance ● IDS ● IPS And what are we looking for ○ threats ○ vulnerabilities ○ scanners ○ exposures ○ signatures ○ ...
  • 6. Threat Model Controls to protect hardware, software and media from: ● Threats in a operating environment ● Internal/External intruders ● Operators inappropriately accessing resources ● OpSec Triple: Threats/Vulnerabilities/Assets
  • 7. Threats - Inappropriate Activities Can be grounds for job action or dismissal ● Inappropriate content ● Waste of Corporate Resources ● Sexual or Racial Harassment ● Abuse of privileges or rights
  • 8. Threats - Illegal Operations ● Eavesdropping: sniffing, dumpster diving, etc. ● Fraud: falsified transactions ● Theft: information or trade secrets, physical hardware ● Sabotage: DOS, production delays ● External Attacks
  • 9. Network and System Vulnerabilities ● Traffic/Trend Analysis: analyzing data characteristics ● Covert Channel Analysis: unintended channel ● Countermeasures include: ○ Padding Messages ○ Sending Noise
  • 10. Other Threats ● Data Scavenging - piecing together information from bits of data ● Keyboard Attacks/Laboratory Attacks ● IPL Vulnerabilities ● Network Address Hijacking
  • 11. Additional Topics ● Adds, moves and changes ● Information sensitivity: handling, storage, life-cycle, destruction ● Exploits: viruses and worms ● Incident handling: logging, reporting, tracking
  • 12. • Crimes: Means/opportunity/motive (MOM) • Types of exploits: at each layer • Insiders or those closest to assets are the greatest risks • Hackers, crackers and externally based technical exploits drive the majority of security discussions but not the bulk of economic losses Exploits and Malicious Attacks
  • 13. Privileged Entity Controls Definition ● Privileged operations functions ● Extended special access to system commands ● Access to special parameters ● Access to system control program: some only run in particular state
  • 14. Prevailing Laws and Regulations ● A number of laws have been passed that require information privacy. ● Ensuring Privileged Entity Control is critical to following the law and staying compliant. ○ NIS Directive ○ GDPR ○ EU Cybersecurity Act ○ Member States
  • 15. ● Data entry personnel must not be the same individuals verifying the data ● Reconciliation of the information should not be performed by the individual entering the information Separation of Duties
  • 16. Separation of Duties • Assign different task to different personnel • No single person runs a system • Related to concept of least privileges • Secure Systems • Highly Secure Systems
  • 17. Separation of Duties The same individual should not typically perform the following functions: • Systems administration • Network management • Data entry • Computer operations • Security administration • Systems development and maintenance • Security auditing • Information systems management • Change management
  • 18. Separation of Duties System Administrator • Installing system software • Planned Start up/Shut down • Backup/recovery • Mounting disks/tapes • Handling hardware • Adding/removing users
  • 19. Separation of Duties Security Administrator ● User activities ○ Adding/removing users ○ Setting clearances ○ Setting passwords ○ Setting other security characteristics ○ Changing profiles ● Setting file sensitivity labels ● Setting security characteristics of devices, communications channels ● Reviewing audit data
  • 20. Principle of Least Privilege • The principle of least privilege (POLP) is the practice of limiting access to the minimal level that will allow normal functioning • The principle is also applied to programs and processes • The principle of least privilege originated in the United States Department of Defense in the 1970s. The Rainbow Series of security documents highly emphasized this concept
  • 21. Resources Protection Protecting resources from disclosure, alteration, misuse or unsafe conditions • Hardware • Software • Data Processing Resources • Media • Change Management
  • 22. Control Categories ● Preventative: prevent incident ○ Firewall or Locked Door ● Detective: detect after incident ○ Network IDS or Video Camera ● Corrective: correct after incident ○ IPS or Guard reaction ● Deterrent Control: deter behavior before incident ○ Login warning banner or “Do Not Enter” sign
  • 23. Additional Controls ● Application Controls ● Transaction Controls ● Input Controls ● Processing Controls ● Output Controls ● Change Controls ● Test Controls
  • 24. Hardware Controls ● Hardware Maintenance ● Maintenance Accounts ● Diagnostic Port Control ● Hardware Physical Controls ○ Require locks and alarms
  • 25. Problems with Software ● Powerful system utilities ● Powerful system commands ○ Superzapping - system utility or application that bypasses all access controls and audit/logging functions to make updates to code or data ● Direct control over hardware and software ● Direct control over all files ● Direct control over printers and output queues ● Powerful Input/Output commands ● Direct access to servers ● Initial program load from console
  • 26. Problems with Software ● Initial program load: IPL from tape ● Control over job schedule and execution ● Control over all storage media ● Bypass label processing ● Re-labeling resources ● Resetting date/time, passwords ● Control of access ports/lines ● Erroneous transactions (fraud) ○ Altering proper transactions ○ Adding improper transactions ● Denial of service/Delays in operation ● Personal use, Disclosure ● Audit trail/log corruption/modification
  • 27. Software Controls ● Anti-virus Management ● Software Testing ● Software Utilities ● Safe software Storage ● Back up Controls
  • 28. Data Processing Resources Physically safeguarding the resources that process data for an organization, such as • People • Facilities • Communications equipment • Archives • Data storage media • Servers and network equipment
  • 29. Media Protection - Key Terms Due care and Due Diligence: legal standards important in defining negligence and liability • Due Diligence is understanding where your risks lie • Due Care is taking reasonable action to mitigate those risks
  • 30. Media Protection Key Terms ● Records Retention: policy driven, critical influences include legal, personnel and operational considerations ● Data Remanence: information left AFTER erasure of media
  • 31. Media Security Controls Prevent the loss of sensitive information when the media is stored outside the system ● Logging ○ log the use of the media ● Access Control ○ physical access control ● Proper Disposal ○ sanitization of data
  • 32. Media Viability Controls Protect during handling, shipping and storage ● Marking ○ label and mark media ● Handling ○ physical protection of data ● Storage ○ security and environmental protection
  • 33. Data Backup ● RAID ● Multiple servers ● CDDVDOptical Jukebox ● Removable Hard Drives ● Tape ● Storage Area Network (SAN) backup to Network Attached Storage (NAS)
  • 34. Data Backup ● Basic Types ○ Full: Backup everything of interest ○ Differential: Files that have changed since ○ last Full backup ○ Incremental: Files that have changed since last backup (any type of backup) ● On-Site vs. Off-Site
  • 35. RAID Redundant Array of Inexpensive Disks ● Striping ● Mirroring ● Parity or checksums ● RAID Levels
  • 36. RAID Levels ● Level 0: Striped Disk Array ○ No fault tolerance ○ Performance Increase ● Level 1: Mirroring ○ Single controller ○ Duplexing (multiple controllers) ○ No Performance Increase ● Level 2: Bit Level Striping ○ Data striped over disk drives at bit level ○ Hamming code used for parity ● Level 3: Duplexing ○ Two separate controllers w/parity ○ Data striped across drives, parities kept on their own drive
  • 37. RAID Levels ● Level 4: Duplexing w/parity ○ Data striped across drives at the block level (as opposed to byte level) ● Level 5 ○ Array of at least 3 hard drives (array controller) ○ Data is striped (entire data block written) ○ Parity is distributed over all the disks ● Level 6 ○ Two different and independent parity schemes, plus the features of Level 5 (Raid DP – Raid 6 w/ double parity) ● Level 10: Mirroring and striping ○ (high performance and reliability)