SlideShare a Scribd company logo
1 of 94
Abstract
The major objective of this paper is to seek towards answering
the question about the development of the effective form of
leadership globally. The paper relies on the research studies
carried with the use of qualitative methodology that entails in-
depth interview of the selected study participants who are
experienced in the leadership field in the selected area of study.
The interviews after that had their transcription in analyzed,
coded and in a verbatim manner. In the future, the world will be
putting a lot of efforts into becoming a more developed universe
in the years to come. Global transformation starting from the
middle up to the higher levels of income will need leaders who
will be robust in facing the diversity and complicated
environment. With drastic globalization, there is the need for
global form of leadership growth and development. Global form
of leadership refers to the type of a leader who carries his or her
operations on global perspective with an open form of mindset
in a complicated and diverse form of an environment.
As at present, there are few leaders globally. Firms admit this
reality and must undertake the improvement of developing
leaders who serve global wise. Since the operations by the
organizations are continuing with the expansion across the
globe, the need for the leaders globally is at the same time
rising. Regardless of this organizations are facing hurdles with
sensitive shortages of the effective leaders globally. Hence,
they deserve to have the opportunity for developing their
respective knowledge, abilities, skills and their respective
personal traits into performing effectively as global leaders
when on stage. Not forgetting, various approaches are in place
towards the development of competencies for the global based
leaders. Previously, more emphasis was diverted to the
experience oriented and action based learning as the global
tasks, serving the multicultural organizations and very first
global leadership form of experience. Following the findings,
recommendations have been suggested for the development of
the effective global form of leadership.
Security Assessment
& Penetration testing
Marcus Murray, MVP [email protected]
1
Riskhantering hanteras av Management.
Vi kommer att prata om risk ur ett tekniker perspektiv.
Som tekniker måste vi veta vad som kan hända och förstå
konsekvenserna av det. Dessutom bör vi förstå hur man skall
mitigera.
Vi behöver inte kunskapen om att beräkna hur många kronor
saker kostar
Agenda
Planning Security Assessments
Gathering Information About the Organization
Penetration Testing for Intrusive Attacks
Marcus Murray, MVP [email protected]
2
Planning Security Assessments
Planning Security Assessments
Gathering Information About the Organization
Penetration Testing for Intrusive Attacks
Marcus Murray, MVP [email protected]
3
Why Does Network Security Fail?
Network security fails in several common areas, including:
Human awareness
Policy factors
Hardware or software misconfigurations
Poor assumptions
Ignorance
Failure to stay up-to-date
Marcus Murray, MVP [email protected]
Understanding Defense-in-Depth
Using a layered approach:
Increases an attacker’s risk of detection
Reduces an attacker’s chance of success
Guards, locks, tracking devices
Application hardening
OS hardening, authentication,
security update management, antivirus updates, auditing
Network segments, NIDS
Firewalls, boarder routers, VPNs with quarantine procedures
Strong passwords, ACLs, backup and restore strategy
Marcus Murray, MVP [email protected]
Why Perform Security Assessments?
Security assessments can:
Answer the questions “Is our network secure?” and “How do we
know that our network is secure?”
Provide a baseline to help improve security
Find configuration mistakes or missing
security updates
Reveal unexpected weaknesses in your
organization’s security
Ensure regulatory compliance
Marcus Murray, MVP [email protected]
Planning a Security AssessmentProject phasePlanning
elementsPre-assessmentScope
Goals
Timelines
Ground rulesAssessmentChoose technologies
Perform assessment
Organize resultsPreparing resultsEstimate risk presented by
discovered weaknesses
Create a plan for remediation
Identify vulnerabilities that have not been remediated
Determine improvement in network security over timeReporting
your findingsCreate final report
Present your findings
Arrange for next assessment
Marcus Murray, MVP [email protected]
Understanding the Security Assessment
ScopeComponentsExampleTargetAll servers running:
Windows 2000 Server
Windows Server 2003Target areaAll servers on the subnets:
192.168.0.0/24
192.168.1.0/24TimelineScanning will take place from June 3rd
to June 10th during non-critical business hoursVulnerabilities to
scan forRPC-over-DCOM vulnerability (MS 03-026)
Anonymous SAM enumeration
Guest account enabled
Greater than 10 accounts in the local Administrator group
Marcus Murray, MVP [email protected]
Understanding Security Assessment GoalsProject goalAll
computers running Windows 2000 Server and Windows Server
2003 on the subnets 192.168.0.0/24 and 192.168.1.0/24 will be
scanned for the following vulnerabilities and will be remediated
as statedVulnerabilityRemediationRPC-over-DCOM
vulnerability
(MS 03-026)Install Microsoft security updates
03-026 and 03-39Anonymous SAM enumerationConfigure
RestrictAnonymous to:
2 on Windows 2000 Server
1 on Windows Server 2003Guest account enabledDisable Guest
accountGreater than 10 accounts in the local administrator
groupMinimize the number of accounts on the administrators
group
Marcus Murray, MVP [email protected]
Types of Security Assessments
Vulnerability scanning:
Focuses on known weaknesses
Can be automated
Does not necessarily require expertise
Penetration testing:
Focuses on known and unknown weaknesses
Requires highly skilled testers
Carries tremendous legal burden in certain
countries/organizations
IT security auditing:
Focuses on security policies and procedures
Used to provide evidence for industry regulations
Marcus Murray, MVP [email protected]
Using Vulnerability Scanning to Assess Network Security
Develop a process for vulnerability scanning that will do the
following:
Detect vulnerabilities
Assign risk levels to discovered vulnerabilities
Identify vulnerabilities that have not been remediated
Determine improvement in network security over time
Marcus Murray, MVP [email protected]
Using Penetration Testing to Assess Network Security
Steps to a successful penetration test include:
Determine how the attacker is most likely to go about attacking
a network or an application
1
Determine how an attacker could exploit weaknesses
3
Locate assets that could be accessed, altered, or destroyed
4
Locate areas of weakness in network or application defenses
2
Determine whether the attack was detected
5
Determine what the attack footprint looks like
6
Make recommendations
7
Marcus Murray, MVP [email protected]
Understanding Components of an IT Security Audit
Process
Technology
Implementation
Documentation
Operations
Start with policy
Build process
Apply technology
Security Policy Model
Policy
Marcus Murray, MVP [email protected]
Implementing an IT Security Audit
Compare each area to standards and best practices
Security policy
Documented procedures
Operations
What you must do
What you say you do
What you really do
Marcus Murray, MVP [email protected]
Reporting Security Assessment Findings
Organize information into the following
reporting framework:
Define the vulnerability
Document mitigation plans
Identify where changes should occur
Assign responsibility for implementing approved
recommendations
Recommend a time for the next security assessment
Marcus Murray, MVP [email protected]
Gathering Information About the Organization
Planning Security Assessments
Gathering Information About the Organization
Penetration Testing for Intrusive Attacks
Marcus Murray, MVP [email protected]
16
What Is a Nonintrusive Attack?
Examples of nonintrusive attacks include:
Information reconnaissance
Port scanning
Obtaining host information using
fingerprinting techniques
Network and host discovery
Nonintrusive attack: The intent to gain information about an
organization’s network in preparation for a more intrusive
attack at a later time
Marcus Murray, MVP [email protected]
17
Information Reconnaissance Techniques
Common types of information sought by attackers include:
System configuration
Valid user accounts
Contact information
Extranet and remote access servers
Business partners and recent acquisitions or mergers
Information about your network may be obtained by:
Querying registrar information
Determining IP address assignments
Organization Web pages
Search engines
Public discussion forums
Marcus Murray, MVP [email protected]
18
Countermeasures Against Information Reconnaissance
Only provide information that is absolutely required to your
Internet registrar
Review your organization’s Web site content regularly for
inappropriate information
Create a policy defining appropriate public discussion forums
usage
Use e-mail addresses based on job roles on your company Web
site and registrar information
ü
ü
ü
ü
Marcus Murray, MVP [email protected]
19
What Information Can Be Obtained by Port Scanning?
Port scanning tips include:
Start by scanning slowly, a few ports at a time
To avoid detection, try the same port across
several hosts
Run scans from a number of different systems, optimally from
different networks
Typical results of a port scan include:
Discovery of ports that are listening or open
Determination of which ports refuse connections
Determination of connections that time out
Marcus Murray, MVP [email protected]
20
Port-Scanning Countermeasures
Port scanning countermeasures include:
Implement defense-in-depth to use multiple layers
of filtering
Plan for misconfigurations or failures
Run only the required services
Implement an intrusion-detection system
ü
ü
ü
ü
Expose services through a reverse proxy
ü
Marcus Murray, MVP [email protected]
21
What Information Can Be Collected About Network Hosts?
Types of information that can be collected using fingerprinting
techniques include:
IP and ICMP implementation
TCP responses
Listening ports
Banners
Service behavior
Remote operating system queries
Marcus Murray, MVP [email protected]
22
Countermeasures to Protect Network Host
InformationFingerprinting sourceCountermeasuresIP, ICMP,
and TCPBe conservative with the packets that you allow to
reach your system
Use a firewall or inline IDS device to normalize traffic
Assume that your attacker knows what version of operating
system is running, and make sure it is secureBannersChange the
banners that give operating system information
Assume that your attacker knows what version of operating
system and application is running, and make sure it is
securePort scanning, service behavior, and remote
queriesDisable unnecessary services
Filter traffic coming to isolate specific ports on the host
Implement IPSec on all systems in the managed network
Marcus Murray, MVP [email protected]
23
Penetration Testing for Intrusive Attacks
Planning Security Assessments
Gathering Information About the Organization
Penetration Testing for Intrusive Attacks
Marcus Murray, MVP [email protected]
24
What Is Penetration Testing for Intrusive Attacks?
Examples of penetration testing for intrusive attack methods
include:
Automated vulnerability scanning
Password attacks
Denial-of-service attacks
Application and database attacks
Network sniffing
Intrusive attack: Performing specific tasks that result in a
compromise of system information, stability, or availability
Marcus Murray, MVP [email protected]
25
What Is Automated Vulnerability Scanning?
Automated vulnerability scanning makes use of scanning tools
to automate the following tasks:
Banner grabbing and fingerprinting
Exploiting the vulnerability
Inference testing
Security update detection
Marcus Murray, MVP [email protected]
26
Scale/Performance
Basis: Fully patched remote Windows XP SP1 on a busy 100-
Mbps LANCheckDuration (seconds)Network Resources
(bytes)Windows vulnerabilities91 MBWeak passwords163.2
MBIIS vulnerabilities2130 KBSQL vulnerabilities5200
KBSecurity Updates (/nosum)46.5 MBTotal3611 MBSecurity
Updates (/sum)1064 MB
Marcus Murray, MVP [email protected]
27
What Is a Password Attack?
Two primary types of password attacks are:
Brute-force attacks
Password-disclosure attacks
Countermeasures to protect against password attacks include:
Require complex passwords
Educate users
Implement smart cards
Create policy that restricts passwords in batch files, scripts, or
Web pages
Marcus Murray, MVP [email protected]
28
What Is a Denial-of-Service Attack?
DoS attacks can be divided into three categories:
Flooding attacks
Resource starvation attacks
Disruption of service
Denial-of-Service (DoS) attack: Any attempt by an attacker to
deny his victim’s access to a resource
Note: Denial-of-service attacks should not be launched against
your own live production network
Marcus Murray, MVP [email protected]
29
Countermeasures for Denial-of-Service AttacksDoS
attackCountermeasuresFlooding attacksEnsure that your routers
have anti-spoofing rules in place and rules that block directed
broadcasts
Set rate limitations on devices to mitigate
flooding attacks
Consider blocking ICMP packetsResource starvation
attacksApply the latest updates to the operating system and
applications
Set disk quotasDisruption of serviceMake sure that the latest
update has been applied to the operating system and
applications
Test updates before applying to production systems
Disable unneeded services
Marcus Murray, MVP [email protected]
30
Understanding Application and Database Attacks
Common application and database attacks include:
Buffer overruns:
Write applications in managed code
SQL injection attacks:
Validate input for correct size and type
Marcus Murray, MVP [email protected]
31
What Is Network Sniffing?
An attacker can perform network sniffing by performing the
following tasks:
Compromising the host
Installing a network sniffer
Using a network sniffer to capture sensitive data such as
network credentials
Using network credentials to compromise
additional hosts
Network sniffing: The ability of an attacker to eavesdrop on
communications between network hosts
1
2
3
4
Marcus Murray, MVP [email protected]
32
Countermeasures for Network Sniffing Attacks
To reduce the threat of network sniffing attacks on your
network consider the following:
Use encryption to protect data
Use switches instead of hubs
Secure core network devices
Use crossover cables
Develop policy
Conduct regular scans
Marcus Murray, MVP [email protected]
33
How Attackers Avoid Detection During an Attack
Common ways that attackers avoid detection include:
Flooding log files
Using logging mechanisms
Attacking detection mechanisms
Using canonicalization attacks
Using decoys
Marcus Murray, MVP [email protected]
34
How Attackers Avoid Detection After an Attack
Common ways that attackers avoid detection after an attack
include:
Installing rootkits
Tampering with log files
Marcus Murray, MVP [email protected]
35
Countermeasures to Detection-Avoidance
TechniquesAvoidance TechniqueCountermeasuresFlooding log
files Back up log files before they are overwrittenUsing logging
mechanisms Ensure that your logging mechanism is using the
most updated version of software and all updatesAttacking
detection mechanisms Keep software and signatures
updatedUsing canonicalization attacks Ensure that applications
normalize data to its canonical formUsing decoys Secure the
end systems and networks being attackedUsing rootkits
Implement defense-in-depth strategiesTampering with log files
Secure log file locations
Store logs on another host
Use encryption to protect log files
Back up log files
Marcus Murray, MVP [email protected]
36
Session Summary
Plan your security assessment to determine scope and goals
Disclose only essential information about your organization on
Web sites and on registrar records
Educate users to use strong passwords or pass-phrases
Assume that the attacker already knows the exact operating
system and version and take as many steps as possible to secure
those systems
ü
ü
ü
ü
Keep systems up-to-date on security updates and
service packs
ü
Marcus Murray, MVP [email protected]
37
Data
Application
Client
Data
Application
Server
FW
Network
Perimeter
Physical Layer
Policies & Procedures
Disaster Recovery, Business Continuity,
Backups, and High Availability
Copyright © 2014 by McGraw-Hill Education.
I hope you will find this material useful. My goal is to help you
teach this chapter.
As a professional instructor you can undoubtedly produce better
quality slides. I encourage you to share your work with other
instructors.
If you want to share your own materials, please contact me at
[email protected] and I will update McGraw-Hill Professional.
A note to the instructor from the author
Copyright © 2014 by McGraw-Hill Education.
Introduction
Disaster recovery and business continuity planning are separate
but related concepts. In fact, disaster recovery is part of
business continuity.
Disaster recovery (DR) concerns the recovery of the technical
components of your business, such as computers, software, the
network, data, and so on.
Business continuity planning (BCP) includes disaster recovery
along with procedures to restore business operations and the
underlying functionality of the business infrastructure needed to
support the business, along with the resumption of the daily
work of the people in your workplace. Business continuity
planning is vital to keeping your business running and to
providing a return to “business as usual” during a disaster.
Copyright © 2014 by McGraw-Hill Education.
What Constitutes a Disaster?
A disaster is defined as a “sudden, unplanned calamitous event
causing great damage or loss” or “any event that creates an
inability on an organization’s part to provide critical business
functions for some predetermined period of time.”
With this general definition in mind, the disaster recovery
planner or business continuity professional would sit down with
all the principals in the organization and map out what would
constitute a disaster for that organization. This is the initial
stage
of creating a business impact analysis (BIA).
Copyright © 2014 by McGraw-Hill Education.
Service Assurance Methods
DR and BCP professionals work together to ensure the
recoverability and continuity of all aspects of an organization
that are affected by an outage or security event. This chapter
analyzes the best practices and methodologies for DR and BCP.
We also give close consideration to backups, which are
necessary for disaster recovery as well as recovery from less
severe incidents. Tape backups, which have traditionally been a
key component of DR strategies to move data from the primary
data center to the backup site, are giving way to online, real-
time data replication strategies to keep data synchronized.
We consider high availability in the final section of this
chapter. All three of these components–DR/BCP, backups, and
HA, form the core of a resiliency strategy for services and data.
Copyright © 2014 by McGraw-Hill Education.
Disaster Recovery
When you put together a disaster recovery plan, you need to
understand how your organization’s information technology (IT)
infrastructure, applications, and network support the business
functions of the enterprise you are recovering.
For example, a particular business unit may claim not to need a
certain application or function on day three of a disaster, but the
technology process may dictate that the application should be
available on day one, due to technological interdependencies. In
this example, the DR planner should work with (and educate)
the business unit to help them understand why they need to pay
for a day-one recovery as opposed to a day-three recovery. The
business unit’s budget will typically include a sizeable expense
for the IT department, and this may cause the business unit to
think that any disaster recovery or business continuity efforts
will be cost prohibitive. In working with the IT subject matter
experts (SMEs), you can sometimes figure out a way to bypass a
particular electronic feed or file dependency that may be needed
to continue the recovery of your system.
Copyright © 2014 by McGraw-Hill Education.
Determining What to Recover
All of this will work well if you know what you are recovering
and who to consult with. The responsible business continuity or
disaster recovery professional should work with the IT group
and the business unit to achieve one purpose—to operate a fine,
productive, and lucrative organization.
You can come to know what you are recovering and who is
involved by gathering experts, such as the programmer, business
analyst, system architect, or any other necessary SME. These
experts will prove to be invaluable when it comes to creating
your DR plan. They know what it takes to technically run the
business systems in question and can explain why a certain
disaster recovery process will cost a certain amount. This
information is important for the manager of the business unit, so
that she can make informed decisions.
Copyright © 2014 by McGraw-Hill Education.
Business Continuity Planning
The business continuity professional is more concerned with the
business functions that the employees perform than with the
underlying technologies. To figure out how the business can
resume normal operations during a disaster, the business
continuity professional needs to work with each business unit as
closely as possible. This means they need to meet with the
people who make the decisions, the people who carry out the
decisions in the management team, and finally the “worker
bees” who actually do the work.
You can think of the “worker bees” as power users who know an
application intimately. They know the nuances and
idiosyncrasies of the business function—they are looking at the
trees as opposed to the forest. This is important when it comes
to preparing the business unit’s business continuity plan. The
power users should participate in your disaster recovery
rehearsals and business continuity tabletop exercises.
Copyright © 2014 by McGraw-Hill Education.
Management Team
The business unit management team is vital because its
members see the business unit from a business perspective—at a
higher level—and will help in determining the importance of the
application, as they are acquainted with the mission of the
business unit. The business unit also needs to keep in mind the
need for a disaster recovery plan as it introduces new or
upgraded program applications. The disaster recovery and/or
business continuity professional should be kept informed about
such changes.
For example, a member of management in a business unit might
talk to a vendor about a product that could make a current
business function quicker, smarter, and better. Being the
diligent manager, he would bring the vendor in to meet with
upper management, and the decision would be made to buy the
product, all without informing the IT department or the disaster
recovery or business continuity professional.
As you can see, the business continuity professional needs to
have a relationship with every principle within the business unit
so that, should a new product be brought into the organization,
the knowledge and ability to recover the product will be taken
into consideration.
Copyright © 2014 by McGraw-Hill Education.
The Four Components of Business Continuity Planning
There are four main components of business continuity
planning, each of which is essential to the whole BCP initiative:
Plan initiation
Business impact analysis or assessment
Development of the recovery strategies
Rehearsal or exercise of the disaster recovery and business
continuity plans
Each business unit should have its own plan. The organization
as a whole needs to have a global plan, encompassing all the
business units. There should be two plans that work in tandem:
a business continuity plan (recovery of the people and business
function) and a disaster recovery plan (technological and
application recovery).
Copyright © 2014 by McGraw-Hill Education.
Initiating a Plan
Plan initiation puts everyone on the same page at the beginning
of the creation of the plan. A disaster or event is defined from
the perspective of the specific business unit or entire
organization. What one business unit or organization considers
a disaster may not be considered a disaster by another business
unit or organization, and vice versa.
A BIA is important for several reasons. It provides an
organization or business unit with a dollar value impact
for an unexpected event. This indicates how long an
organization can have its business interrupted before it will go
out of business completely.
Copyright © 2014 by McGraw-Hill Education.
Events
Here are three examples of possible events that could impact
your business and compel you to implement your disaster
recovery or business continuity plan, along with some possible
responses:
Hurricane: Because a hurricane can be predicted a reasonable
amount of time before it strikes, you have time to inform
employees to prepare their homes and other personal effects.
You also have the time to alert your technology group so that
they can initiate their preparation strategy procedures.
Blackout: You can ensure that your enterprise is attached to a
backup generator or an uninterruptible power supply (UPS).
You can conduct awareness programs and perhaps give away
small flashlights that employees can keep in their desks.
Illness outbreak: You can provide an offsite facility where your
employees can relocate during the outbreak and investigation.
Copyright © 2014 by McGraw-Hill Education.
Analyzing the Business Impact
With a BIA, you must first establish what the critical business
function is. This can be determined only by the critical members
of the business unit.
The BIA should be completed and reviewed by the business
unit, including upper management, since the financing of the
business continuity plan and disaster recovery project will
ultimately come from the business unit’s coffers.
Copyright © 2014 by McGraw-Hill Education.
Developing Recovery Strategies
The next step is to develop your recovery strategy. The business
unit will be paying for the recovery, so they need to know what
their options are for different types of recoveries.
You can provide anything from a no-frills recovery to an
instantaneous recovery. It all depends on the business functions
that have to be recovered and on how long the business unit can
go without the function.
The question is essentially how much insurance the business
unit wants to buy. If it is your business, you are the only one
who can make that decision. Someone who does not have as
large a stake in the growth of the business cannot look at the
business from the same perspective.
Copyright © 2014 by McGraw-Hill Education.
Procedures and Contacts
In a business recovery situation, there must be written
procedures that all employees in your business unit can quickly
access, understand, and follow. Information needs to be readily
available about the business function that has to be performed.
The procedures should be stored in multiple, accessible
locations to ensure they are available in a disaster scenario.
You also need to make readily available a list of people to
contact, along with their contact information. This list must be
of the current employees to contact, and it should include
members of the Human Resources, Facilities, Risk Management,
and Legal departments. The list of contacts should also include
the local fire and rescue department, police department, and
emergency operations center.
Copyright © 2014 by McGraw-Hill Education.
Rehearsing Disaster Recovery and Business Continuity Plans
The fourth BCP component, and the most crucial, is to rehearse,
exercise, or test the plan. This is “where the rubber meets the
road.”
Having the other three components in place is important, but the
plan is inadequate if you’re not sure whether it will work. It is
vital to test your plan. If the plan has not been tested and it fails
during a disaster, all the work you put into developing it is for
naught. If the plan fails during a test, though, you can improve
on it and test again.
Copyright © 2014 by McGraw-Hill Education.
Third-Party Vendor Issues
Most organizations make use of various third-party vendors
(Enterprise Resource Planning [ERP], Application Service
Provider [ASP], etc.) in their recovery efforts. In such cases,
the information about the third-party vendor is just as critical in
your business or technology recovery. When you need to make
use of such resources, it is beneficial, if not crucial, to make
inquiries into the third-party’s operations prior to the
implementation of its product or services.
In the real world, the disaster recovery and/or business
continuity professional has to integrate the vendor’s information
into the business unit’s continuity plan. If a critical path in your
DR plan depends on the involvement of a third-party vendor,
you can’t get your operation up and running if that third-party
vendor isn’t prepared to assist you. For example, suppose that
processing loans is the bread and butter of your business, and
your business relies on credit bureau reports to process loans. In
this scenario, you need to ensure that if your organization
experiences an outage, you will still receive these reports so
that your company can continue to conduct business.
The vendor’s ability to recover from a failure will also affect
how robust your recovery is. Although your recovery may be
technically sound, you must be sure that you can conduct
business. The same standards you apply to your own
organization should apply to third-party vendors you do
business with. They should be available to you to conduct
business. The disaster recovery or business continuity
coordinator should make the appropriate inquiries with vendors
to ensure that they can support a DR scenario.
Copyright © 2014 by McGraw-Hill Education.
Awareness and Training Programs
Another important element of disaster recovery and business
continuity planning is an awareness program. The business
continuity or disaster recovery professional can meet with each
business for tabletop exercises. These exercises are important,
because they actually get the members of the business unit to sit
down and think about a particular event and how first to prevent
or mitigate it and then how to recover from it.
The event can be anything from a category 3 hurricane to
workplace violence. Any work stoppage can potentially impede
the progress of an organization’s recovery or resumption of
services, and it is up to the management team to design or
develop a plan of action or a business continuity plan. The
business continuity or disaster recovery professional must
facilitate this process and make the business unit aware that
there are events that can bring the business to a grinding halt.
Copyright © 2014 by McGraw-Hill Education.
Backups
Backups may be used for complete system restoration, but they
can also allow you to recover the contents of a mailbox, for
example, or an “accidentally” deleted document. Backups can
be extended to saving more than just digital data. Backup
processes can include the backup of specifications and
configurations, policies and procedures, equipment, and data
centers.
However, if the backup is not good or is too old, or the backup
media is damaged, it will not fix the problem. Just having a
backup procedure in place does not always offer adequate
protection.
Many organizations can no longer depend on traditional backup
processes—doing an offline backup is unacceptable, doing an
online backup would unacceptably degrade system performance,
and restoring from a backup would take so much time that the
organization could not recover. Such organizations are using
alternatives to traditional backups, such as redundant systems
and cloud services.
Backup systems and processes, therefore, reflect the availability
needs of an organization as well as its recovery needs.
Copyright © 2014 by McGraw-Hill Education.
Traditional Backup Methods
In the traditional backup process, data is copied to backup
media, primarily tape, in a predictable and orderly fashion for
secure storage both onsite and offsite.
Backup media can thus be made available to restore data to new
or repaired systems after failure. In addition to data, modern
operating systems and application configurations are also
backed up.
This provides faster restore capabilities and occasionally may
be the only way to restore systems where applications that
support data are intimately integrated with a specific system.
Copyright © 2014 by McGraw-Hill Education.
Backup Types
There are several standard types of backups:
Full
Copy
Incremental
Differential
Copyright © 2014 by McGraw-Hill Education.
Full Backups
Backs up all data selected, whether or not it has changed since
the last backup. The definition of a full backup varies on
different systems. On some systems it includes critical
operating system files needed to rebuild a system completely;
on other systems it backs up only the user data.
Copyright © 2014 by McGraw-Hill Education.
Copy Backups
Data is copied from one disk to another.
Copyright © 2014 by McGraw-Hill Education.
Incremental Backups
When data is backed up, the archive bit on a file is turned off.
When changes are made to the file, the archive bit is set again.
An incremental backup uses this information to back up only
files that have changed since the last backup. This backup turns
the archive bit off again, and the next incremental backup backs
up only the files that have changed since the last incremental
backup. This backup type saves time, but it means that the
restore process will involve restoring the last full backup and
every incremental backup made after it.
Copyright © 2014 by McGraw-Hill Education.
Restoring from an Incremental backup requires that all backups
be applied.
The circle encloses all the backups that must be restored.
Copyright © 2014 by McGraw-Hill Education.
Differential Backups
Like an incremental backup, a differential backup only backs up
files with the archive bit set—files that have changed since the
last backup. Unlike an incremental backup, however, a
differential backup does not reset the archive bit.
Each differential backup backs up all files that have changed
since the last backup that reset the bits. Using this strategy, a
full backup is followed by differential backups.
A restore consists of restoring the full backup and then only the
last differential backup made. This saves time during the
restore, but, depending on your system, creating differential
backups takes longer than creating incremental backups.
Copyright © 2014 by McGraw-Hill Education.
Restoring from a differential backup requires applying only the
full backup and the last differential backup.
The circle encloses all of the backups that must be restored.
Copyright © 2014 by McGraw-Hill Education.
Backup Rotation Strategies
In the traditional backup process, old backups are usually not
immediately replaced by the new backup. Instead, multiple
previous copies of backups are kept. This ensures recovery
should one backup tape set be damaged or otherwise be found
not to be good. Two traditional backup rotation strategies are
Grandfather-Father-Son (GFS) and Tower of Hanoi.
Copyright © 2014 by McGraw-Hill Education.
GFS Backup Strategy
In the GFS rotation strategy, a backup is made to separate
media each day.
Each Sunday a full backup is made, and each day of the week an
incremental backup is made.
The Sunday backups are kept for a month, and the current
week’s incremental backups are also kept.
On the first Sunday of the month, a new tape or disk is used to
make a full backup. The previous full backup becomes the last
full backup of the prior month and is re-labeled as a monthly
backup.
Weekly and daily tapes are rotated as needed, with the oldest
being used for the current backup.
Thus, on any given day of the month, that week’s backup is
available, as well as the previous four or five weeks’ full
backups, along with the incremental backups taken each day of
the preceding week. If the backup scheme has been in use for a
while, prior months’ backups are also available.
Copyright © 2014 by McGraw-Hill Education.
Note:
No backup strategy is complete without plans to test backup
media and backups by doing a restore. If a backup is unusable,
it’s worse than having no backup at all, because it has lured
users into a sense of security. Be sure to add the testing of
backups to your backup strategy, and do this on a test system.
Copyright © 2014 by McGraw-Hill Education.
The Tower of Hanoi Backup Strategy
The Tower of Hanoi strategy is based on a game played with
three poles and a number of rings. The object is to move the
rings from their starting point on one pole to the other pole.
However, the rings are of different sizes, and you are not
allowed to have a ring on top of one that is smaller than itself.
To accomplish the task, a certain order must be followed.
Consider a simple version of the Tower of Hanoi, in which you
are given three pegs, one of which has three rings stacked on it
from largest at the bottom to smallest at the top. Call these
rings A (small), B (medium), and C (large). You need to move
the rings to the right-hand peg. How do you solve this puzzle?
Copyright © 2014 by McGraw-Hill Education.
Tower of Hanoi
Solution
The solution is to move
A to the right-hand peg,
then B to the middle peg,
A on top of B on the middle peg,
then C to the right-hand peg,
then A to the now-empty left-hand peg,
B on top of C on the right-hand peg,
and finally A on top of B to complete the stack on the right-
hand peg.
The rings were moved in this order: A B A C A B A. If you
solve this puzzle with four rings labeled A through D, your
moves would be A B A C A B A D A B A C A B A.
Five rings are solved with the sequence A B A C A B A D A B
A C A B A E A B A C A B A D A B A C A B A.
As you can see, there is a recursive pattern here that looks
complicated but is actually very repetitive. Small children solve
this puzzle all the time.
Copyright © 2014 by McGraw-Hill Education.
Tower of Hanoi for Backups
To use the same strategy with backup tapes requires the use of
multiple tapes in this same complicated order. Each backup is a
full backup, and multiple backups are made to each tape. Since
each tape’s backups are not sequential, the chance that the loss
of one tape or damage to one tape will destroy backups for the
current period is nil. A fairly current backup is always available
on another tape. This backup method gives you as many
different restore options as you have tapes.
Consider a three-tape Tower of Hanoi backup scheme and its
similarity to the sequence of the game. On day one, you perform
a full backup to tape A. On day two, your full backup goes to
tape B. On day three, you back up to tape A again, and on day
four you introduce tape C, which hasn’t been used yet. At this
point, you now have three tapes containing full backups for the
last three days. That’s pretty good coverage. On days 5, 6, and
7, you use tapes A, B, and A again, respectively. This gives you
three tapes containing full backups that you can rely on, even if
one tape is damaged.
Copyright © 2014 by McGraw-Hill Education.
Use More Tapes
For additional coverage, you can use a four-tape or five-tape
Tower of Hanoi scheme.
You would perform the same rotation as in the game, either A B
A C A B A D A B A C A B A in a four-tape system or A B A C
A B A D A B A C A B A E A B A C A B A D A B A C A B A
in a five-tape system.
Higher numbers of tapes can be used as well, but the system is
complicated enough that human error can become a concern.
Backup software can assist by prompting the backup operator
for the correct tape if it is configured for a Tower of Hanoi
scheme.
Copyright © 2014 by McGraw-Hill Education.
Backup Alternatives and Newer Methodologies
Many backup strategies are available for use today as
alternatives to traditional tape backups:
Hierarchical Storage Management (HSM)
Windows shadow copy
Online backup or data vaulting
Dedicated backup networks
Disk-to-disk (D2D) technology
Copyright © 2014 by McGraw-Hill Education.
Hierarchical Storage Management (HSM)
HSM is more of an archiving system than a strict “backup”
strategy, but it is a valid way of preserving data that can be
considered as part of a data retention strategy. Long available
for mainframe systems, it is also available on Windows.
HSM is an automated process that moves the least-used files to
progressively more remote data storage. In other words,
frequently used and changed data is stored online on high speed,
local disks. As data ages (as it is not accessed and is not
changed), it is moved to more remote storage locations, such as
disk appliances or even tape systems.
However, the data is still cataloged and appears readily
available to the user. If accessed, it can be automatically made
available—it can be moved to local disks, it can be returned via
network access, or, in the case of offline storage, operators can
be prompted to load the data. Online services or cloud storage
can be used for the more remote data storage, and this approach
is commonly found in e-mail archiving solutions.
Copyright © 2014 by McGraw-Hill Education.
Windows Shadow Copy
This Windows service takes a snapshot of a working volume,
and then a normal data backup can be made that includes open
files. The shadow copy service doesn’t make a copy; it just
fixes a point in time and then places subsequent changes in a
hidden volume.
When a backup is made, closed files and disk copies of open
files are stored along with the changes. When files are stored on
a Windows system, the service runs in the background,
constantly recording file changes.
If a special client is loaded, previous versions of a file can be
accessed and restored by any user who has authorization to read
the file. Imagine that Alice deletes a file on Monday, or Bob
makes a mistake in a complex spreadsheet design on Friday. On
the following Tuesday, each can obtain their old versions of the
file on their own, without a call to the help desk, and without IT
getting involved.
Copyright © 2014 by McGraw-Hill Education.
Online Backup or Data Vaulting
An individual or business can contract with an online service
that automatically and regularly connects to a host or hosts and
copies identified data to an online server.
Typically, arrangements can be made to back up everything,
data only, or specific data sets.
Payment plans are based both on volume of data backed up and
on the number of hosts, ranging up to complete data backups of
entire data centers.
Copyright © 2014 by McGraw-Hill Education.
Dedicated Backup Networks
An Ethernet LAN can become a backup bottleneck if disk and
tape systems are provided in parallel and exceed the LAN’s
throughput capacity. Backups also consume bandwidth and thus
degrade performance for other network operations.
Dedicated backup networks are often implemented using a Fibre
Channel storage area network (SAN) or Gigabit Ethernet
network and Internet Small Computer Systems Interface
(iSCSI). iSCSI and Gigabit Ethernet can provide wire-speed
data transfer. Backup is to servers or disk appliances on the
SAN.
Copyright © 2014 by McGraw-Hill Education.
Disk-to-Disk (D2D) Technology
A slow tape backup system may be a bottleneck, as servers may
be able to provide data faster than the tape system can record it.
D2D servers don’t wait for a tape drive, and disks can be
provided over high-speed dedicated backup networks, so both
backups and restores can be faster.
D2D can use traditional network-attached storage (NAS)
systems supported by Ethernet connectivity and either the
Network File System (NFS on Unix) protocol or Common
Internet File System (CIFS on Windows) protocol, or dedicated
backup networks can be provided for D2D.
Copyright © 2014 by McGraw-Hill Education.
Backup Benefits
Many benefits can be obtained from backing up as a regular part
of IT operations:
Cost savings: It takes many people-hours to reproduce digitally
stored data. The cost of backup software and hardware is a
fraction of this cost.
Productivity: Users cannot work without data. When data can be
restored quickly, productivity is maintained.
Increased security: When backups are available, the impact of
an attack that destroys or corrupts data is lessened. Data can be
replaced or compared to ensure its integrity.
Simplicity: When centralized backups are used, no user needs to
make a decision about what to back up.
Copyright © 2014 by McGraw-Hill Education.
Backup Policy
The way to ensure that backups are made and protected is to
have an enforceable and enforced backup policy.
The policy should identify the goals of the process, such as
frequency, the necessity of onsite and offsite storage, and
requirements for formal processes, authority, and
documentation.
Procedures can then be developed, approved, and used that
interpret policy in light of current applications, data sets,
equipment, and the availability of technologies. Several topics
should be specifically detailed in the policy.
Copyright © 2014 by McGraw-Hill Education.
Administrative Authority
Designate who has the authority to physically start the backup,
transport and check out backup media, perform restores, sign
off on activity, and approve changes in procedures. This should
also include guidelines for how individuals are chosen.
Recommendations should include separating duties between
backing up and restoring, between approval and activity, and
even between systems. (For example, those authorized to back
up directory services and password databases should be
different from those given authority to back up databases.) This
allows for role separation, a critical security requirement, and
the delegation of many routine duties to junior IT employees.
Copyright © 2014 by McGraw-Hill Education.
What to Back Up
Designate which information should be backed up.
Should system data or only application data be backed up?
What about configuration information, patch levels, and version
levels?
How will applications and operating systems be replaced?
Are original and backup copies of their installation disks
provided for?
These details should be specified.
Copyright © 2014 by McGraw-Hill Education.
Scheduling
Identify how often backups should be performed.
Copyright © 2014 by McGraw-Hill Education.
Monitoring
Specify how to ensure the completion and retention of backups.
Copyright © 2014 by McGraw-Hill Education.
Storage for Backup Media
Specify which of the many ways to store backup media are
appropriate.
Is media stored both onsite and offsite?
What are the requirements for each type of storage? For
example, are fireproof vaults or cabinets available? Are they
kept closed? Where are they located?
Onsite backup media needs to be available, but storing backups
near the original systems may be counterproductive. A disaster
that damages the original system might take out the backup
media as well.
Copyright © 2014 by McGraw-Hill Education.
Type of Media and Process Used
Specify how backups are made.
How many backups are made, and of what type?
How often are they made, and how long are they kept?
How often is backup media replaced?
Copyright © 2014 by McGraw-Hill Education.
High Availability
Not too long ago, most businesses closed at 5 p.m. Many were
not open on the weekends, holidays were observed by closings
or shortened hours, and few of us worried when we couldn’t
read the latest news at midnight or shop for bath towels at 3
a.m. That’s not true anymore. Even ordinary businesses
maintain computer systems around the clock, and their
customers expect instant gratification at any hour. Somehow,
since computers and networks are devices and not people, we
expect them just to keep working without breaks, or sleep.
Of course, they do break. Procedures, processes, software, and
hardware that enable system and network redundancy are a
necessary part of operations. However, they serve another
purpose as well. Redundancy ensures the integrity and
availability of information.
Copyright © 2014 by McGraw-Hill Education.
Redundancy
What effect does system redundancy have? Calculations
including the mean time to repair (how long it takes to replace a
failed component) and uptime (the percentage of time a system
is operational) can show the results of having versus not having
redundancy built into a computer system or a network.
However, the importance of these figures depends on the needs
and requirements of the system.
Most desktop systems, for example, do not require built-in
redundancy; if one fails and our work is critical, we simply
obtain another desktop system. The need for redundancy is met
by another system. In most cases, however, we do something
else while the system is fixed. Other systems, however, are
critical to the survival of a business or perhaps even of a life.
These systems need either built-in hardware redundancy,
support alternatives that can keep their functions intact, or both.
Copyright © 2014 by McGraw-Hill Education.
Note:
Critical systems are those systems a business must have, and
without which it would be critically damaged, or whose failure
might be life-threatening. Which systems are critical to a
business must be determined by the business. For some it will
be their e-commerce site, for others the billing system, and for
others their customer information databases. Everyone
recognizes the critical nature of air traffic control systems and
life support systems used in hospitals.
Two methods can be used to evaluate where and how much
redundancy is needed . The first, more traditional method is to
weigh the cost of providing redundancy against the cost of
downtime without redundancy. These costs can be calculated
and compared directly. (Is the cost of downtime greater or less
than the cost of redundancy?) The second method, which is
harder to calculate but is increasingly easier to justify, is to
decide based on the likelihood that customers will gravitate to
the organization that can provide the best availability of
service. This, in turn, is based on the increasing demands that
online services, unlike traditional services, be available
24×7×365. High availability can be a selling point that directly
leads to more business. Indeed, some customers will demand it.
There are automated methods for providing system redundancy,
such as hardware fault tolerance, clustering, and network
routing, and there are operational methods, such as component
hot-swapping and standby systems.
Copyright © 2014 by McGraw-Hill Education.
Automated Redundancy Methods
It has become commonplace to expect significant hardware
redundancy and fault tolerance in server systems. A wide range
of components are either duplicated within the systems or
effectively duplicated by linking systems into a cluster. Some
typical components and techniques are used:
Clustering
Fault tolerance
Redundant System Slot (RSS)
Cluster in a box
High-availability design
Internet network routing
Copyright © 2014 by McGraw-Hill Education.
Clustering
Entire computers or systems are duplicated. If a system fails,
operation automatically transfers to the other systems.
Clusters may be set up as active-standby, in which case one
system is live and the other is idle, or active-active, in which
case multiple systems are kept perfectly in synch, and even
dynamic load sharing is possible.
Active-active is ideal, as no system stands idle and the total
capacity of all systems can always be utilized. If there is a
system failure, fewer systems carry the load. When the failed
system is replaced, load balancing readjusts.
Clustering does have its downside. When active-standby is used,
duplication of systems is expensive. These active-standby
systems may also take seconds for the failover to occur, which
is a long time when systems are under heavy loads. Active-
active systems, however, may require specialized hardware and
additional, specialized administrative knowledge and
maintenance.
Copyright © 2014 by McGraw-Hill Education.
Fault Tolerance
Components may have backup systems or parts of systems that
allow them to recover from errors or to survive in spite of them.
For example, fault-tolerant CPUs use multiple CPUs running in
lockstep, each using the same processing logic. In the typical
case, three CPUs are used and the results from all CPUs are
compared. If one CPU produces results that don’t match those
of the other two, it is considered to have failed and is no longer
consulted until it is replaced.
Another example is the fault tolerance built into Microsoft’s
NTFS file system. If the system detects a bad spot on a disk
during a write, it automatically marks it as bad and writes the
data elsewhere. The logic to both these strategies is to isolate
failure and continue on. Meanwhile, the system can raise alerts
and record error messages to prompt maintenance.
Copyright © 2014 by McGraw-Hill Education.
Redundant System Slot (RSS)
Entire hot-swappable computer units are provided in a single
unit.
Each system has its own operating system and bus, but all
systems are connected and share other components.
Like clustered systems, RSS systems can be either active-
standby or active-active. RSS systems exist as a unit, and
systems cannot be removed from their unit and continue to
operate.
Copyright © 2014 by McGraw-Hill Education.
Cluster in a Box
Two or more systems are combined in a single unit.
The difference between these systems and RSS systems is that
each unit has its own CPU, bus, peripherals, operating system,
and applications.
Components can be hot-swapped, and therein lies its advantage
over a traditional cluster.
Copyright © 2014 by McGraw-Hill Education.
High Availability Design
Two or more complete components are placed on the network,
with one component serving either as a standby system (with
traffic being routed to the standby system if the primary fails)
or as an active node (with load balancing being used to route
traffic to multiple systems sharing the load, and if one fails,
traffic is routed only to the other functional systems).
Copyright © 2014 by McGraw-Hill Education.
A High Availability Network Design Supporting a Web Site
Multiple ISP backbones are available, and duplicate firewalls,
load-balancing systems, application servers, and database
servers support a single web site.
Copyright © 2014 by McGraw-Hill Education.
Internet Network Routing
In an attempt to achieve redundancy for Internet-based systems
similar to that of the Public Switched Telephone Network
(PSTN), new architectures for Internet routing are adding or
proposing a variety of techniques, such as these:
Reserve capacity
System and geographic diversity
Size limits
Dynamic restoration switching
Self-healing protection switching
Fast rerouting (which reverses traffic at the point of failure so
that it can be directed to an alternative route)
RSVP-based backup tunnels (where a node adjacent to a failed
link signals failure to upstream nodes, and traffic is thus
rerouted around the failure)
Two-path protection (in which sophisticated engineering
algorithms develop alternative paths between every node)
Two examples of such architectures are Multiprotocol Label
Switching (MPLS), which integrates IP and data-link layer
technologies to introduce sophisticated routing control, and
Automatic Switching Protection (ASP), which provides the fast
restoration times that modern technologies, such as voice and
streaming media, require.
Copyright © 2014 by McGraw-Hill Education.
Operational Redundancy Methods
In addition to technologies that provide automated redundancy,
there are many processes that help you to quickly get your
systems up and running, if a problem occurs. These include
Standby systems
Hot-swappable components
Copyright © 2014 by McGraw-Hill Education.
Standby Systems
Complete or partial systems are kept ready. Should a system, or
one of its subsystems, fail, the standby system can be put into
service. There are many variations on this technique.
Some clusters are deployed in active-standby state, so the
clustered system is ready to go but idle. To recover from a CPU
or other major system failure quickly, a hard drive might be
moved to another, duplicate, online system.
To recover quickly from the failure of a database system, a
duplicate system complete with database software may be kept
ready. The database is periodically updated by replication or by
export and import functions. If the main system fails, the
standby system can be placed online, though it may be lacking
some recent transactions.
Copyright © 2014 by McGraw-Hill Education.
Hot-Swappable Components
Many hardware components can now be replaced without
shutting down systems. Hard drives, network cards, and memory
are examples of current hardware components that can be added.
Modern operating systems detect the addition of these devices
on the fly, and operations continue with minor, if any, service
outages.
In a RAID array, for example, drive failure may be compensated
for by the built-in redundancy of the array. If the failed drive
can be replaced without shutting down the system, the array will
return to its prefailure state. Interruptions in service will be nil,
though performance may suffer depending on the current load.
Copyright © 2014 by McGraw-Hill Education.
Summary
In this chapter, we covered the four related business resumption
strategies that are all necessary for recovery from incidents,
outages, and disasters that result in service or data loss: disaster
recovery, business continuity planning, backups, and high-
availability. Together, these form the core of a strategy to keep
the organization’s information infrastructure operational.
Here in summary are the principal points, roles, and
responsibilities of a good disaster recovery and business
continuity program:
Develop and maintain disaster recovery and business continuity
plans for all your organization’s enterprise technologies.
Schedule and oversee disaster recovery rehearsals for all
enterprise systems.
Ensure disaster awareness by planning and conducting
awareness programs, hazard fairs, lunch-and-learn sessions, and
other informative events and materials.
Activate the plan.
Ensure community involvement by participating in local
community disaster mitigation and planning initiatives and
professional groups.
The disaster recovery and business continuity process is
cyclical and must be maintained for it to stay current with the
needs of the organization and the technologies in the
environment. Your plans must be updated and rehearsed
regularly. Disaster recovery is vital to everyone.
Backups can be an important part of a recovery strategy. They
play a role in disaster recovery process, to move data from the
primary site to the DR site, although real-time data replication
approaches are replacing traditional tape shipments in modern
DR plans. Backups are also necessary for recovering data in a
traditional data center.
High availability architectures are the fourth leg of the table
supporting service resiliency, to ensure that failure of one
system or component of a service doesn’t cause that service to
fail.
Copyright © 2014 by McGraw-Hill Education.
CISSP Guide to Security Essentials,
Second Edition
Software Development Security
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
1
CISSP Guide to Security Essentials, 2e
2
Objectives
Operating systems
Types of applications
Application models and technologies
Application threats and countermeasures
Security in the software development life cycle
Application security controls
Databases and data warehouses
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
2
Operating Systems
Operating system components
Kernel
Process management
Memory management
Hardware resource management
Device drivers
Tools
CISSP Guide to Security Essentials, 2e
3
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
Operating Systems (cont.)
Operating system security functions
Authentication
Resource access
Access control
Communication
Event logging
CISSP Guide to Security Essentials, 2e
4
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
5
Types of Applications
Agents
Standalone programs that are part of a larger application
Examples:
Anti-malware
Patch management
Configuration management
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
6
Types of Applications (cont.)
Applets
Software programs that run within the context of another
program
Example: media players within browser
Client-server
Separate programs on clients and servers communicate via
networks and work together
Few developed now but many are in use
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
7
Types of Applications (cont.)
Distributed
Software components run on several systems
Two-tier, three-tier, multi-tier
Reasons: scalability, performance, geographical
Web
Web browser as client, application server back-end
Client software nearly universal
Application software centralized
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
8
Software Models and Technologies
Control flow languages
Structured languages
Object oriented languages
Knowledge based languages
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
9
Control Flow Languages
Linear, sequential
Use of “if – then – else”
Branching with “go to”
Examples:
BASIC, COBOL, Cold Fusion, FORTRAN, Perl, PHP, Python,
VBScript
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
10
Structured Languages
Nested, heavy use of subroutines and functions
Little or no “go to”
Examples:
C
Pascal
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
11
Object-Oriented Languages
Utilize concepts of object programming
Classes, objects, instances, and inheritance
Methods, instantiations
Encapsulation, abstraction, polymorphism
Examples
C++, C#, Java, Ruby, Simula, Smalltalk
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
12
Knowledge-Based Systems
Neural networks
Modeled after biological reasoning processes
Artificial neurons that store pieces of information
Given cases about situations and outcomes, can predict future
outcomes
Expert systems
Inference engine and knowledge base of past situations and
outcomes
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
13
Threats in the Software Environment
Reasons for attacks
Industrial espionage
Vandalism and disruption
Denial of service
Political / religious
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
Software Attack Approaches
Authentication bypass
Access a system’s resources without providing credentials
Privilege escalation
Trick a system into providing a higher level of privileges, which
provides access to more information and functions
Denial of service
Incapacitate a system
CISSP Guide to Security Essentials, 2e
14
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
Threats to Software
Buffer overflow
Covert channel
Side channel attack
Malicious software
Input attacks
Object reuse
Mobile code
Social engineering
Back door
Logic bomb
CISSP Guide to Security Essentials, 2e
15
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
16
Threats to Software(cont.)
Buffer overflow attacks
Disrupt a software application by providing more data to the
application than it was designed to handle
Types
Stack buffer overflow
NOP sled attack
Heap overflow
Jump to register attack
Examples: Morris worm, ping of death, Code Red, SQL
Slammer, Blaster, Sasser, Conficker
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
17
Software Attach Approaches (cont.)
Buffer overflow attack countermeasures
Use safe languages and libraries
Executable space protection
Stack smashing protection
Application firewalls
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
18
Threats to Software (cont.)
Covert channel
Unintended and hidden channel of communications
Types:
Covert storage channel: read a storage location and learn about
the application or other data
Timing channel: observe timings in an application to determine
what is happening in the application
Countermeasures
Careful software analysis, good software engineering
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
19
Threats to Software (cont.)
Side channel attack
An attack on a cryptosystem based upon physical information
gained from the system
Examples: timing, power consumption, emanations, and even
sounds
Countermeasures
Limit release of information through shielding and other means
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
20
Threats to Software (cont.)
Malicious software
Types: viruses, worms, Trojan horses, rootkits, bots, spam,
pharming, spyware, key loggers
Purpose
Steal, corrupt, or destroy information
Remote control
Denial of service
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
Clarification: spam, phishing, pharming and whaling are
mechanisms for transporting malware to the target system.
20
CISSP Guide to Security Essentials, 2e
21
Threats to Software (cont.)
Types of malware
Virus: human assisted replication, embed in programs, files,
master boot records
Worm: self replicating, scan for victims, rapid spread
Trojan horse: claims one function, but is malware
Rootkit: hide within or beneath the operating system
Bot: remote control zombie (also known as Remote Access
Trojan (RAT) )
Spam: unsolicited e-mail
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
Clarification: spam, phishing, pharming and whaling are
mechanisms for transporting malware to the target system.
21
CISSP Guide to Security Essentials, 2e
22
Threats to Software (cont.)
Types of malware (cont.)
Pharming: attack on DNS to redirect traffic to decoy application
Spyware: collect information about usage, forward to central
server
Key logger: logs keystrokes and mouse movements, forwards to
central server
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
Clarification: spam, phishing, pharming and whaling are
mechanisms for transporting malware to the target system.
22
CISSP Guide to Security Essentials, 2e
23
Threats to software (cont.)
Malware countermeasures
Anti-malware
Application whitelisting
Process profiling
Spam filters
Patches
Firewalls and application firewalls
Hardened systems
Intrusion prevention systems
Decreased privilege levels
Penetration testing
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
24
Threats to Software (cont.)
Input attacks
Buffer overflow
Integer overflow
Script injection
Cross site scripting
Cross site request forgery
Countermeasures
Input field filtering, application firewall, application
vulnerability scanning, software developer training
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
25
Threats to Software (cont.)
Object reuse
Use of a resource belonging to another process, including:
Memory, databases, file systems, temporary files, and paging
space
Object reuse countermeasures
Application isolation
Server virtualization
Developer training
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
26
Threats to Software (cont.)
Mobile code
Executable code, active content, downloadable content
Examples: active website content, downloaded programs
Some is desired, but some is malicious in nature
Mobile code countermeasures
Anti-malware, mobile code access controls
Application whitelisting
Reduced user privileges
Secure system configuration
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
27
Threats to Software (cont.)
Social engineering
Attack on personnel to gain secrets
People are vulnerable because they want to help
Social engineering countermeasures
Security awareness training that includes accountability
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
28
Threats to Software (cont.)
Back door / maintenance hook
Access holes deliberately planted by a developer
To facilitate easier testing during development
To facilitate production access
To facilitate a break-in
Back door countermeasures
Code reviews
Source code control
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
29
Threats to Software (cont.)
Logic bombs
Deliberate malfunction that causes harm
Time bombs
Activate on a given date and time
Event bombs
Activate on a specific event
Logic bomb countermeasures
Software source code review, external audits
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
30
Security in the Software Development Life Cycle (SDLC)
SDLC
The entire collection of processes used to design, develop, test,
implement, and maintain software
Security must be included in each step of the SDLC
Conceptual
Requirements and specifications development
Application design, coding, and testing
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
31
Security in the Software Development Life Cycle (cont.)
Security in the conceptual stage
Presence of sensitive information must be identified
Access controls (users, administrators, third parties)
Regulatory conditions
Security dependencies
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
32
Security in the Software Development Life Cycle (cont.)
Security application requirements and specifications
Functional requirements
Standards
Security requirements
Roles, access controls, audit logging, configuration management
Regulatory requirements
Test plan a byproduct of requirements
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
33
Security in the Software Development Life Cycle (cont.)
Security in application design
Adhere to all requirements and specifications
Published design documents
Design reviews
Reviewed by all stakeholders including security
Threat risk modeling
Identify threats and risks prior to development
Possible changes to specs, req’s, or design
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
34
Security in the Software Development Life Cycle (cont.)
Security in application coding
Develop safe code
Free of common vulnerabilities
Use safe libraries that include safe functions for input
validation
Security in testing
Testing should verify correct coding of every requirement and
specification
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
35
Security in the Software Development Life Cycle (cont.)
Protect the SDLC itself
Source code access control
Protect source code
Record version changes
Protection of software development and testing tools
Protect from unauthorized modifications
Protection of software development systems
Prevent introduction of malware, back doors, logic bombs
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
36
Application Environment and Security Controls
Controls that must be present in a developed application
Authentication
Limiting access to only legitimate, approved users
Authorization
Limiting access only to approved functions and data
Role-based access control (RBAC)
Assign authorizations to roles, assign roles to users
Audit logging
Logging of all actions in the application
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
37
Database Architectures
Hierarchical databases: tree structure (no longer produced)
Network databases: complex tree structure (no longer produced)
Object databases: OO, methods stored with data
Distributed databases: physically distributed, any type
Relational databases (RDBMS): in widest use today
Oracle, SQL Server, DB2, MySQL, etc.
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
Data Warehouse
A type of database that is used for decision support and research
purposes
A copy of some or all transaction data
Usually, refreshed periodically (typically daily)
Indexed and tuned differently than a transaction database
Complex queries into trends do not affect production
transactions
CISSP Guide to Security Essentials, 2e
38
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
39
Database Transactions
Records retrieval
Records update
Records creation
Nested or complex transactions executed as a unit
Begin work… <transactions> …end work
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
40
Database Security Controls
Access controls
User ids, passwords
Table / row / field level access control
Read-only or read/write
Views
Virtual tables that are a subset of individual tables, or a “join”
between tables
Permission given to views just like “real” tables
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
41
Summary
Operating system components: kernel, device drivers, tools
Operating system functions: authentication, resource access,
access control, communication, event logging
Types of applications: agents, applets, client-server, distributed,
web
Application language types: control flow, structured, object
oriented, knowledge based
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
42
Summary (cont.)
Reasons for threats to applications: industrial espionage,
vandalism and disruption, denial of service, political / religious
Types of threats
buffer overflow, covert channel, side channel, malware, input
attacks, object reuse, mobile code, social engineering, back
door, logic bomb
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
CISSP Guide to Security Essentials, 2e
43
Summary (cont.)
Software development life cycle (SDLC) steps
Conceptual, requirements / specifications, design, coding,
testing, maintenance
Source code control, configuration management
Software environment security controls
Authentication, access control, role based access control
(RBAC), audit logging
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
Summary (cont.)
Types of databases
Hierarchical, network, distributed, object-oriented, relational
(most common)
Database security controls: userid, access control, audit
logging, views
CISSP Guide to Security Essentials, 2e
44
© 2016 Cengage Learning®. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole
or in part.
44
Please provide detail answer to the following questions.
1) List and describe the 8 domains of (CISSP), Information
Security (CBK, Common Body of Knowledge).
2) List and describe the OSI Network Model layers.
3) Describe what information can be obtained by port scanning
and what are the countermeasures? ( Review PP Domain 6)
4) Describe and discuss the four (4) components of Business
Continuity Planning. (Review PP DR7 & SDS).
5) Describe what is SQL injection and what is/are the
countermeasure to prevent SQL injection?
Running head: GLOBAL LEADERSHIP ASSIGNMENT
OUTLINE 1
Global Leadership4
Global Leadership Outline
Introduction
Thesis statement: to understand the meaning and importance of
global leadership and how it can be attained.
Main point 1: Meaning and importance of global leadership
from different point of views
Main point 2: Qualities and skills of a global leader
Main point 3: Ways of attaining global leadership
Main point 4: Challenges facing and hindering the development
of global leadership skills and qualities
Body
Literature review
Main point 1: Meaning and importance of global leadership
from different point of views
Meaning of global leadership from Levy, Peiperl, &
Jonsen, (2016); explanation as the article expounds on the
meaning from different countries and understanding point of
view.
Elaboration of global leadership meaning from Perruci, (2018)
point of view as well as the importance of the topic thereby
linking why it is important to attain global leadership. Also, use
of an article by Reiche, Bird, Mendenhall, & Osland, (2015)
also expounds on importance of global leadership.
Main point 2: Qualities and skills of a global leader
· Basis of global leadership Reiche, et al., (2015)
· Relevant qualities and skills that makes one an effective
leader as described by Hassanzadeh, et al., (2015).
· How identified skills and qualities of a global leadership
makes one an effective global leader as featured in
(Carrillo, 2019)
· Perruci, (2018); features of a global leader
Main point 3: Ways of attaining global leadership
· Roots of global leadership (Mendenhall, 2017)
· How education can be used to install and train leaders to
develop global leadership skills and qualities (Deshpande, 2017
and Longo, & McMillan, 2015)
· Hassanzadeh, et al., (2015); strategies of developing and
acquiring global leadership
· Herd, et al., (2018); methodologies that teachers can use to
train learners on different global leadership skill
Main point 4: Challenges facing and hindering the development
of global leadership skills and qualities
· Why some leaders despite going through training and global
leadership skills acquisition fail to do so
·

More Related Content

Similar to Abstract The major objective of this paper is to seek towa.docx

Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessmentpchronis
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Lanate Drummond
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report exampleIhor Uzhvenko
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Network Security Proposal TemplateNetwork Security Proposal.docx
Network Security Proposal TemplateNetwork Security Proposal.docxNetwork Security Proposal TemplateNetwork Security Proposal.docx
Network Security Proposal TemplateNetwork Security Proposal.docxvannagoforth
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWshyamuop
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWshyamuopfive
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechsMordecai Kraushar
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnicalJack585826
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational briefEnda Crossan
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Frances Coronel
 

Similar to Abstract The major objective of this paper is to seek towa.docx (20)

Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Network Security Proposal TemplateNetwork Security Proposal.docx
Network Security Proposal TemplateNetwork Security Proposal.docxNetwork Security Proposal TemplateNetwork Security Proposal.docx
Network Security Proposal TemplateNetwork Security Proposal.docx
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
Cyber-Risk-Management-Assessment (1)
Cyber-Risk-Management-Assessment (1)Cyber-Risk-Management-Assessment (1)
Cyber-Risk-Management-Assessment (1)
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 

More from daniahendric

Variables in a Research Study and Data CollectionIn this assignmen.docx
Variables in a Research Study and Data CollectionIn this assignmen.docxVariables in a Research Study and Data CollectionIn this assignmen.docx
Variables in a Research Study and Data CollectionIn this assignmen.docxdaniahendric
 
Variation exists in virtually all parts of our lives. We often see v.docx
Variation exists in virtually all parts of our lives. We often see v.docxVariation exists in virtually all parts of our lives. We often see v.docx
Variation exists in virtually all parts of our lives. We often see v.docxdaniahendric
 
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docxValerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docxdaniahendric
 
valerie is a 15 year old girl who has recently had signs of a high f.docx
valerie is a 15 year old girl who has recently had signs of a high f.docxvalerie is a 15 year old girl who has recently had signs of a high f.docx
valerie is a 15 year old girl who has recently had signs of a high f.docxdaniahendric
 
Utilizing the Statement of Financial Position on page 196 of the Acc.docx
Utilizing the Statement of Financial Position on page 196 of the Acc.docxUtilizing the Statement of Financial Position on page 196 of the Acc.docx
Utilizing the Statement of Financial Position on page 196 of the Acc.docxdaniahendric
 
Utech Company has income before irregular items of $307,500 for the .docx
Utech Company has income before irregular items of $307,500 for the .docxUtech Company has income before irregular items of $307,500 for the .docx
Utech Company has income before irregular items of $307,500 for the .docxdaniahendric
 
Using your work experience in the public and nonprofit sector, and t.docx
Using your work experience in the public and nonprofit sector, and t.docxUsing your work experience in the public and nonprofit sector, and t.docx
Using your work experience in the public and nonprofit sector, and t.docxdaniahendric
 
Using your textbook, provide a detailed and specific definition to.docx
Using your textbook, provide a detailed and specific definition to.docxUsing your textbook, provide a detailed and specific definition to.docx
Using your textbook, provide a detailed and specific definition to.docxdaniahendric
 
Using your text and at least one scholarly source, prepare a two to .docx
Using your text and at least one scholarly source, prepare a two to .docxUsing your text and at least one scholarly source, prepare a two to .docx
Using your text and at least one scholarly source, prepare a two to .docxdaniahendric
 
Using Walgreen Company as the target organization complete the.docx
Using Walgreen Company as the target organization complete the.docxUsing Walgreen Company as the target organization complete the.docx
Using Walgreen Company as the target organization complete the.docxdaniahendric
 
Using the text book and power point on Interest Groups, please ans.docx
Using the text book and power point on Interest Groups, please ans.docxUsing the text book and power point on Interest Groups, please ans.docx
Using the text book and power point on Interest Groups, please ans.docxdaniahendric
 
Using the template provided in attachment create your own layout.R.docx
Using the template provided in attachment create your own layout.R.docxUsing the template provided in attachment create your own layout.R.docx
Using the template provided in attachment create your own layout.R.docxdaniahendric
 
Using the simplified OOD methodologyWrite down a detailed descrip.docx
Using the simplified OOD methodologyWrite down a detailed descrip.docxUsing the simplified OOD methodologyWrite down a detailed descrip.docx
Using the simplified OOD methodologyWrite down a detailed descrip.docxdaniahendric
 
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docxUsing the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docxdaniahendric
 
Using the Tana Basin in Kenya,1.Discuss the water sources and .docx
Using the Tana Basin in Kenya,1.Discuss the water sources and .docxUsing the Tana Basin in Kenya,1.Discuss the water sources and .docx
Using the Tana Basin in Kenya,1.Discuss the water sources and .docxdaniahendric
 
Using the template provided in a separate file, create your own la.docx
Using the template provided in a separate file, create your own la.docxUsing the template provided in a separate file, create your own la.docx
Using the template provided in a separate file, create your own la.docxdaniahendric
 
Using the template provided in attachment create your own layo.docx
Using the template provided in attachment create your own layo.docxUsing the template provided in attachment create your own layo.docx
Using the template provided in attachment create your own layo.docxdaniahendric
 
Using the Sex(abled) video, the sexuality section in the Falvo text.docx
Using the Sex(abled) video, the sexuality section in the Falvo text.docxUsing the Sex(abled) video, the sexuality section in the Falvo text.docx
Using the Sex(abled) video, the sexuality section in the Falvo text.docxdaniahendric
 
Using the required and recommended resources from this week and last.docx
Using the required and recommended resources from this week and last.docxUsing the required and recommended resources from this week and last.docx
Using the required and recommended resources from this week and last.docxdaniahendric
 
Using the Internet, textbook or related resources, research the crea.docx
Using the Internet, textbook or related resources, research the crea.docxUsing the Internet, textbook or related resources, research the crea.docx
Using the Internet, textbook or related resources, research the crea.docxdaniahendric
 

More from daniahendric (20)

Variables in a Research Study and Data CollectionIn this assignmen.docx
Variables in a Research Study and Data CollectionIn this assignmen.docxVariables in a Research Study and Data CollectionIn this assignmen.docx
Variables in a Research Study and Data CollectionIn this assignmen.docx
 
Variation exists in virtually all parts of our lives. We often see v.docx
Variation exists in virtually all parts of our lives. We often see v.docxVariation exists in virtually all parts of our lives. We often see v.docx
Variation exists in virtually all parts of our lives. We often see v.docx
 
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docxValerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
 
valerie is a 15 year old girl who has recently had signs of a high f.docx
valerie is a 15 year old girl who has recently had signs of a high f.docxvalerie is a 15 year old girl who has recently had signs of a high f.docx
valerie is a 15 year old girl who has recently had signs of a high f.docx
 
Utilizing the Statement of Financial Position on page 196 of the Acc.docx
Utilizing the Statement of Financial Position on page 196 of the Acc.docxUtilizing the Statement of Financial Position on page 196 of the Acc.docx
Utilizing the Statement of Financial Position on page 196 of the Acc.docx
 
Utech Company has income before irregular items of $307,500 for the .docx
Utech Company has income before irregular items of $307,500 for the .docxUtech Company has income before irregular items of $307,500 for the .docx
Utech Company has income before irregular items of $307,500 for the .docx
 
Using your work experience in the public and nonprofit sector, and t.docx
Using your work experience in the public and nonprofit sector, and t.docxUsing your work experience in the public and nonprofit sector, and t.docx
Using your work experience in the public and nonprofit sector, and t.docx
 
Using your textbook, provide a detailed and specific definition to.docx
Using your textbook, provide a detailed and specific definition to.docxUsing your textbook, provide a detailed and specific definition to.docx
Using your textbook, provide a detailed and specific definition to.docx
 
Using your text and at least one scholarly source, prepare a two to .docx
Using your text and at least one scholarly source, prepare a two to .docxUsing your text and at least one scholarly source, prepare a two to .docx
Using your text and at least one scholarly source, prepare a two to .docx
 
Using Walgreen Company as the target organization complete the.docx
Using Walgreen Company as the target organization complete the.docxUsing Walgreen Company as the target organization complete the.docx
Using Walgreen Company as the target organization complete the.docx
 
Using the text book and power point on Interest Groups, please ans.docx
Using the text book and power point on Interest Groups, please ans.docxUsing the text book and power point on Interest Groups, please ans.docx
Using the text book and power point on Interest Groups, please ans.docx
 
Using the template provided in attachment create your own layout.R.docx
Using the template provided in attachment create your own layout.R.docxUsing the template provided in attachment create your own layout.R.docx
Using the template provided in attachment create your own layout.R.docx
 
Using the simplified OOD methodologyWrite down a detailed descrip.docx
Using the simplified OOD methodologyWrite down a detailed descrip.docxUsing the simplified OOD methodologyWrite down a detailed descrip.docx
Using the simplified OOD methodologyWrite down a detailed descrip.docx
 
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docxUsing the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
 
Using the Tana Basin in Kenya,1.Discuss the water sources and .docx
Using the Tana Basin in Kenya,1.Discuss the water sources and .docxUsing the Tana Basin in Kenya,1.Discuss the water sources and .docx
Using the Tana Basin in Kenya,1.Discuss the water sources and .docx
 
Using the template provided in a separate file, create your own la.docx
Using the template provided in a separate file, create your own la.docxUsing the template provided in a separate file, create your own la.docx
Using the template provided in a separate file, create your own la.docx
 
Using the template provided in attachment create your own layo.docx
Using the template provided in attachment create your own layo.docxUsing the template provided in attachment create your own layo.docx
Using the template provided in attachment create your own layo.docx
 
Using the Sex(abled) video, the sexuality section in the Falvo text.docx
Using the Sex(abled) video, the sexuality section in the Falvo text.docxUsing the Sex(abled) video, the sexuality section in the Falvo text.docx
Using the Sex(abled) video, the sexuality section in the Falvo text.docx
 
Using the required and recommended resources from this week and last.docx
Using the required and recommended resources from this week and last.docxUsing the required and recommended resources from this week and last.docx
Using the required and recommended resources from this week and last.docx
 
Using the Internet, textbook or related resources, research the crea.docx
Using the Internet, textbook or related resources, research the crea.docxUsing the Internet, textbook or related resources, research the crea.docx
Using the Internet, textbook or related resources, research the crea.docx
 

Recently uploaded

Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17Celine George
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff17thcssbs2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 

Recently uploaded (20)

Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 

Abstract The major objective of this paper is to seek towa.docx

  • 1. Abstract The major objective of this paper is to seek towards answering the question about the development of the effective form of leadership globally. The paper relies on the research studies carried with the use of qualitative methodology that entails in- depth interview of the selected study participants who are experienced in the leadership field in the selected area of study. The interviews after that had their transcription in analyzed, coded and in a verbatim manner. In the future, the world will be putting a lot of efforts into becoming a more developed universe in the years to come. Global transformation starting from the middle up to the higher levels of income will need leaders who will be robust in facing the diversity and complicated environment. With drastic globalization, there is the need for global form of leadership growth and development. Global form of leadership refers to the type of a leader who carries his or her operations on global perspective with an open form of mindset in a complicated and diverse form of an environment. As at present, there are few leaders globally. Firms admit this reality and must undertake the improvement of developing leaders who serve global wise. Since the operations by the organizations are continuing with the expansion across the globe, the need for the leaders globally is at the same time rising. Regardless of this organizations are facing hurdles with sensitive shortages of the effective leaders globally. Hence, they deserve to have the opportunity for developing their respective knowledge, abilities, skills and their respective personal traits into performing effectively as global leaders when on stage. Not forgetting, various approaches are in place towards the development of competencies for the global based leaders. Previously, more emphasis was diverted to the
  • 2. experience oriented and action based learning as the global tasks, serving the multicultural organizations and very first global leadership form of experience. Following the findings, recommendations have been suggested for the development of the effective global form of leadership. Security Assessment & Penetration testing Marcus Murray, MVP [email protected] 1 Riskhantering hanteras av Management. Vi kommer att prata om risk ur ett tekniker perspektiv. Som tekniker måste vi veta vad som kan hända och förstå konsekvenserna av det. Dessutom bör vi förstå hur man skall mitigera. Vi behöver inte kunskapen om att beräkna hur många kronor saker kostar
  • 3. Agenda Planning Security Assessments Gathering Information About the Organization Penetration Testing for Intrusive Attacks Marcus Murray, MVP [email protected] 2 Planning Security Assessments Planning Security Assessments Gathering Information About the Organization Penetration Testing for Intrusive Attacks Marcus Murray, MVP [email protected] 3 Why Does Network Security Fail? Network security fails in several common areas, including: Human awareness Policy factors Hardware or software misconfigurations Poor assumptions
  • 4. Ignorance Failure to stay up-to-date Marcus Murray, MVP [email protected] Understanding Defense-in-Depth Using a layered approach: Increases an attacker’s risk of detection Reduces an attacker’s chance of success Guards, locks, tracking devices Application hardening OS hardening, authentication, security update management, antivirus updates, auditing Network segments, NIDS Firewalls, boarder routers, VPNs with quarantine procedures Strong passwords, ACLs, backup and restore strategy Marcus Murray, MVP [email protected]
  • 5. Why Perform Security Assessments? Security assessments can: Answer the questions “Is our network secure?” and “How do we know that our network is secure?” Provide a baseline to help improve security Find configuration mistakes or missing security updates Reveal unexpected weaknesses in your organization’s security Ensure regulatory compliance Marcus Murray, MVP [email protected] Planning a Security AssessmentProject phasePlanning elementsPre-assessmentScope Goals Timelines Ground rulesAssessmentChoose technologies Perform assessment Organize resultsPreparing resultsEstimate risk presented by discovered weaknesses Create a plan for remediation Identify vulnerabilities that have not been remediated Determine improvement in network security over timeReporting your findingsCreate final report Present your findings Arrange for next assessment
  • 6. Marcus Murray, MVP [email protected] Understanding the Security Assessment ScopeComponentsExampleTargetAll servers running: Windows 2000 Server Windows Server 2003Target areaAll servers on the subnets: 192.168.0.0/24 192.168.1.0/24TimelineScanning will take place from June 3rd to June 10th during non-critical business hoursVulnerabilities to scan forRPC-over-DCOM vulnerability (MS 03-026) Anonymous SAM enumeration Guest account enabled Greater than 10 accounts in the local Administrator group Marcus Murray, MVP [email protected] Understanding Security Assessment GoalsProject goalAll computers running Windows 2000 Server and Windows Server 2003 on the subnets 192.168.0.0/24 and 192.168.1.0/24 will be scanned for the following vulnerabilities and will be remediated as statedVulnerabilityRemediationRPC-over-DCOM vulnerability (MS 03-026)Install Microsoft security updates 03-026 and 03-39Anonymous SAM enumerationConfigure RestrictAnonymous to: 2 on Windows 2000 Server 1 on Windows Server 2003Guest account enabledDisable Guest accountGreater than 10 accounts in the local administrator groupMinimize the number of accounts on the administrators group
  • 7. Marcus Murray, MVP [email protected] Types of Security Assessments Vulnerability scanning: Focuses on known weaknesses Can be automated Does not necessarily require expertise Penetration testing: Focuses on known and unknown weaknesses Requires highly skilled testers Carries tremendous legal burden in certain countries/organizations IT security auditing: Focuses on security policies and procedures Used to provide evidence for industry regulations Marcus Murray, MVP [email protected] Using Vulnerability Scanning to Assess Network Security Develop a process for vulnerability scanning that will do the following: Detect vulnerabilities
  • 8. Assign risk levels to discovered vulnerabilities Identify vulnerabilities that have not been remediated Determine improvement in network security over time Marcus Murray, MVP [email protected] Using Penetration Testing to Assess Network Security Steps to a successful penetration test include: Determine how the attacker is most likely to go about attacking a network or an application 1 Determine how an attacker could exploit weaknesses 3 Locate assets that could be accessed, altered, or destroyed 4 Locate areas of weakness in network or application defenses 2 Determine whether the attack was detected 5 Determine what the attack footprint looks like 6 Make recommendations 7 Marcus Murray, MVP [email protected]
  • 9. Understanding Components of an IT Security Audit Process Technology Implementation Documentation Operations Start with policy Build process Apply technology Security Policy Model Policy Marcus Murray, MVP [email protected] Implementing an IT Security Audit Compare each area to standards and best practices Security policy Documented procedures Operations What you must do What you say you do What you really do
  • 10. Marcus Murray, MVP [email protected] Reporting Security Assessment Findings Organize information into the following reporting framework: Define the vulnerability Document mitigation plans Identify where changes should occur Assign responsibility for implementing approved recommendations Recommend a time for the next security assessment Marcus Murray, MVP [email protected] Gathering Information About the Organization Planning Security Assessments Gathering Information About the Organization Penetration Testing for Intrusive Attacks Marcus Murray, MVP [email protected] 16 What Is a Nonintrusive Attack?
  • 11. Examples of nonintrusive attacks include: Information reconnaissance Port scanning Obtaining host information using fingerprinting techniques Network and host discovery Nonintrusive attack: The intent to gain information about an organization’s network in preparation for a more intrusive attack at a later time Marcus Murray, MVP [email protected] 17 Information Reconnaissance Techniques Common types of information sought by attackers include: System configuration Valid user accounts Contact information Extranet and remote access servers Business partners and recent acquisitions or mergers Information about your network may be obtained by: Querying registrar information Determining IP address assignments Organization Web pages Search engines Public discussion forums
  • 12. Marcus Murray, MVP [email protected] 18 Countermeasures Against Information Reconnaissance Only provide information that is absolutely required to your Internet registrar Review your organization’s Web site content regularly for inappropriate information Create a policy defining appropriate public discussion forums usage Use e-mail addresses based on job roles on your company Web site and registrar information ü ü ü ü Marcus Murray, MVP [email protected] 19 What Information Can Be Obtained by Port Scanning? Port scanning tips include:
  • 13. Start by scanning slowly, a few ports at a time To avoid detection, try the same port across several hosts Run scans from a number of different systems, optimally from different networks Typical results of a port scan include: Discovery of ports that are listening or open Determination of which ports refuse connections Determination of connections that time out Marcus Murray, MVP [email protected] 20 Port-Scanning Countermeasures Port scanning countermeasures include: Implement defense-in-depth to use multiple layers of filtering Plan for misconfigurations or failures Run only the required services Implement an intrusion-detection system ü ü ü ü Expose services through a reverse proxy
  • 14. ü Marcus Murray, MVP [email protected] 21 What Information Can Be Collected About Network Hosts? Types of information that can be collected using fingerprinting techniques include: IP and ICMP implementation TCP responses Listening ports Banners Service behavior Remote operating system queries Marcus Murray, MVP [email protected] 22 Countermeasures to Protect Network Host InformationFingerprinting sourceCountermeasuresIP, ICMP, and TCPBe conservative with the packets that you allow to reach your system Use a firewall or inline IDS device to normalize traffic Assume that your attacker knows what version of operating
  • 15. system is running, and make sure it is secureBannersChange the banners that give operating system information Assume that your attacker knows what version of operating system and application is running, and make sure it is securePort scanning, service behavior, and remote queriesDisable unnecessary services Filter traffic coming to isolate specific ports on the host Implement IPSec on all systems in the managed network Marcus Murray, MVP [email protected] 23 Penetration Testing for Intrusive Attacks Planning Security Assessments Gathering Information About the Organization Penetration Testing for Intrusive Attacks Marcus Murray, MVP [email protected] 24 What Is Penetration Testing for Intrusive Attacks? Examples of penetration testing for intrusive attack methods include:
  • 16. Automated vulnerability scanning Password attacks Denial-of-service attacks Application and database attacks Network sniffing Intrusive attack: Performing specific tasks that result in a compromise of system information, stability, or availability Marcus Murray, MVP [email protected] 25 What Is Automated Vulnerability Scanning? Automated vulnerability scanning makes use of scanning tools to automate the following tasks: Banner grabbing and fingerprinting Exploiting the vulnerability Inference testing Security update detection Marcus Murray, MVP [email protected] 26
  • 17. Scale/Performance Basis: Fully patched remote Windows XP SP1 on a busy 100- Mbps LANCheckDuration (seconds)Network Resources (bytes)Windows vulnerabilities91 MBWeak passwords163.2 MBIIS vulnerabilities2130 KBSQL vulnerabilities5200 KBSecurity Updates (/nosum)46.5 MBTotal3611 MBSecurity Updates (/sum)1064 MB Marcus Murray, MVP [email protected] 27 What Is a Password Attack? Two primary types of password attacks are: Brute-force attacks Password-disclosure attacks Countermeasures to protect against password attacks include: Require complex passwords Educate users Implement smart cards Create policy that restricts passwords in batch files, scripts, or Web pages Marcus Murray, MVP [email protected] 28
  • 18. What Is a Denial-of-Service Attack? DoS attacks can be divided into three categories: Flooding attacks Resource starvation attacks Disruption of service Denial-of-Service (DoS) attack: Any attempt by an attacker to deny his victim’s access to a resource Note: Denial-of-service attacks should not be launched against your own live production network Marcus Murray, MVP [email protected] 29 Countermeasures for Denial-of-Service AttacksDoS attackCountermeasuresFlooding attacksEnsure that your routers have anti-spoofing rules in place and rules that block directed broadcasts Set rate limitations on devices to mitigate flooding attacks Consider blocking ICMP packetsResource starvation attacksApply the latest updates to the operating system and applications Set disk quotasDisruption of serviceMake sure that the latest update has been applied to the operating system and applications Test updates before applying to production systems Disable unneeded services
  • 19. Marcus Murray, MVP [email protected] 30 Understanding Application and Database Attacks Common application and database attacks include: Buffer overruns: Write applications in managed code SQL injection attacks: Validate input for correct size and type Marcus Murray, MVP [email protected] 31 What Is Network Sniffing? An attacker can perform network sniffing by performing the following tasks: Compromising the host Installing a network sniffer Using a network sniffer to capture sensitive data such as network credentials Using network credentials to compromise additional hosts Network sniffing: The ability of an attacker to eavesdrop on
  • 20. communications between network hosts 1 2 3 4 Marcus Murray, MVP [email protected] 32 Countermeasures for Network Sniffing Attacks To reduce the threat of network sniffing attacks on your network consider the following: Use encryption to protect data Use switches instead of hubs Secure core network devices Use crossover cables Develop policy Conduct regular scans Marcus Murray, MVP [email protected]
  • 21. 33 How Attackers Avoid Detection During an Attack Common ways that attackers avoid detection include: Flooding log files Using logging mechanisms Attacking detection mechanisms Using canonicalization attacks Using decoys Marcus Murray, MVP [email protected] 34 How Attackers Avoid Detection After an Attack Common ways that attackers avoid detection after an attack include: Installing rootkits Tampering with log files Marcus Murray, MVP [email protected]
  • 22. 35 Countermeasures to Detection-Avoidance TechniquesAvoidance TechniqueCountermeasuresFlooding log files Back up log files before they are overwrittenUsing logging mechanisms Ensure that your logging mechanism is using the most updated version of software and all updatesAttacking detection mechanisms Keep software and signatures updatedUsing canonicalization attacks Ensure that applications normalize data to its canonical formUsing decoys Secure the end systems and networks being attackedUsing rootkits Implement defense-in-depth strategiesTampering with log files Secure log file locations Store logs on another host Use encryption to protect log files Back up log files Marcus Murray, MVP [email protected] 36 Session Summary Plan your security assessment to determine scope and goals Disclose only essential information about your organization on Web sites and on registrar records Educate users to use strong passwords or pass-phrases Assume that the attacker already knows the exact operating system and version and take as many steps as possible to secure
  • 23. those systems ü ü ü ü Keep systems up-to-date on security updates and service packs ü Marcus Murray, MVP [email protected] 37 Data Application Client Data Application Server FW Network Perimeter Physical Layer Policies & Procedures Disaster Recovery, Business Continuity, Backups, and High Availability Copyright © 2014 by McGraw-Hill Education.
  • 24. I hope you will find this material useful. My goal is to help you teach this chapter. As a professional instructor you can undoubtedly produce better quality slides. I encourage you to share your work with other instructors. If you want to share your own materials, please contact me at [email protected] and I will update McGraw-Hill Professional. A note to the instructor from the author Copyright © 2014 by McGraw-Hill Education. Introduction Disaster recovery and business continuity planning are separate but related concepts. In fact, disaster recovery is part of business continuity. Disaster recovery (DR) concerns the recovery of the technical components of your business, such as computers, software, the network, data, and so on. Business continuity planning (BCP) includes disaster recovery along with procedures to restore business operations and the underlying functionality of the business infrastructure needed to support the business, along with the resumption of the daily work of the people in your workplace. Business continuity planning is vital to keeping your business running and to providing a return to “business as usual” during a disaster.
  • 25. Copyright © 2014 by McGraw-Hill Education. What Constitutes a Disaster? A disaster is defined as a “sudden, unplanned calamitous event causing great damage or loss” or “any event that creates an inability on an organization’s part to provide critical business functions for some predetermined period of time.” With this general definition in mind, the disaster recovery planner or business continuity professional would sit down with all the principals in the organization and map out what would constitute a disaster for that organization. This is the initial stage of creating a business impact analysis (BIA). Copyright © 2014 by McGraw-Hill Education. Service Assurance Methods DR and BCP professionals work together to ensure the recoverability and continuity of all aspects of an organization that are affected by an outage or security event. This chapter analyzes the best practices and methodologies for DR and BCP. We also give close consideration to backups, which are necessary for disaster recovery as well as recovery from less severe incidents. Tape backups, which have traditionally been a key component of DR strategies to move data from the primary data center to the backup site, are giving way to online, real- time data replication strategies to keep data synchronized. We consider high availability in the final section of this chapter. All three of these components–DR/BCP, backups, and
  • 26. HA, form the core of a resiliency strategy for services and data. Copyright © 2014 by McGraw-Hill Education. Disaster Recovery When you put together a disaster recovery plan, you need to understand how your organization’s information technology (IT) infrastructure, applications, and network support the business functions of the enterprise you are recovering. For example, a particular business unit may claim not to need a certain application or function on day three of a disaster, but the technology process may dictate that the application should be available on day one, due to technological interdependencies. In this example, the DR planner should work with (and educate) the business unit to help them understand why they need to pay for a day-one recovery as opposed to a day-three recovery. The business unit’s budget will typically include a sizeable expense for the IT department, and this may cause the business unit to think that any disaster recovery or business continuity efforts will be cost prohibitive. In working with the IT subject matter experts (SMEs), you can sometimes figure out a way to bypass a particular electronic feed or file dependency that may be needed to continue the recovery of your system. Copyright © 2014 by McGraw-Hill Education. Determining What to Recover All of this will work well if you know what you are recovering and who to consult with. The responsible business continuity or disaster recovery professional should work with the IT group
  • 27. and the business unit to achieve one purpose—to operate a fine, productive, and lucrative organization. You can come to know what you are recovering and who is involved by gathering experts, such as the programmer, business analyst, system architect, or any other necessary SME. These experts will prove to be invaluable when it comes to creating your DR plan. They know what it takes to technically run the business systems in question and can explain why a certain disaster recovery process will cost a certain amount. This information is important for the manager of the business unit, so that she can make informed decisions. Copyright © 2014 by McGraw-Hill Education. Business Continuity Planning The business continuity professional is more concerned with the business functions that the employees perform than with the underlying technologies. To figure out how the business can resume normal operations during a disaster, the business continuity professional needs to work with each business unit as closely as possible. This means they need to meet with the people who make the decisions, the people who carry out the decisions in the management team, and finally the “worker bees” who actually do the work. You can think of the “worker bees” as power users who know an application intimately. They know the nuances and idiosyncrasies of the business function—they are looking at the trees as opposed to the forest. This is important when it comes to preparing the business unit’s business continuity plan. The power users should participate in your disaster recovery rehearsals and business continuity tabletop exercises. Copyright © 2014 by McGraw-Hill Education.
  • 28. Management Team The business unit management team is vital because its members see the business unit from a business perspective—at a higher level—and will help in determining the importance of the application, as they are acquainted with the mission of the business unit. The business unit also needs to keep in mind the need for a disaster recovery plan as it introduces new or upgraded program applications. The disaster recovery and/or business continuity professional should be kept informed about such changes. For example, a member of management in a business unit might talk to a vendor about a product that could make a current business function quicker, smarter, and better. Being the diligent manager, he would bring the vendor in to meet with upper management, and the decision would be made to buy the product, all without informing the IT department or the disaster recovery or business continuity professional. As you can see, the business continuity professional needs to have a relationship with every principle within the business unit so that, should a new product be brought into the organization, the knowledge and ability to recover the product will be taken into consideration. Copyright © 2014 by McGraw-Hill Education. The Four Components of Business Continuity Planning There are four main components of business continuity planning, each of which is essential to the whole BCP initiative: Plan initiation
  • 29. Business impact analysis or assessment Development of the recovery strategies Rehearsal or exercise of the disaster recovery and business continuity plans Each business unit should have its own plan. The organization as a whole needs to have a global plan, encompassing all the business units. There should be two plans that work in tandem: a business continuity plan (recovery of the people and business function) and a disaster recovery plan (technological and application recovery). Copyright © 2014 by McGraw-Hill Education. Initiating a Plan Plan initiation puts everyone on the same page at the beginning of the creation of the plan. A disaster or event is defined from the perspective of the specific business unit or entire organization. What one business unit or organization considers a disaster may not be considered a disaster by another business unit or organization, and vice versa. A BIA is important for several reasons. It provides an organization or business unit with a dollar value impact for an unexpected event. This indicates how long an organization can have its business interrupted before it will go out of business completely. Copyright © 2014 by McGraw-Hill Education. Events
  • 30. Here are three examples of possible events that could impact your business and compel you to implement your disaster recovery or business continuity plan, along with some possible responses: Hurricane: Because a hurricane can be predicted a reasonable amount of time before it strikes, you have time to inform employees to prepare their homes and other personal effects. You also have the time to alert your technology group so that they can initiate their preparation strategy procedures. Blackout: You can ensure that your enterprise is attached to a backup generator or an uninterruptible power supply (UPS). You can conduct awareness programs and perhaps give away small flashlights that employees can keep in their desks. Illness outbreak: You can provide an offsite facility where your employees can relocate during the outbreak and investigation. Copyright © 2014 by McGraw-Hill Education. Analyzing the Business Impact With a BIA, you must first establish what the critical business function is. This can be determined only by the critical members of the business unit. The BIA should be completed and reviewed by the business unit, including upper management, since the financing of the business continuity plan and disaster recovery project will ultimately come from the business unit’s coffers. Copyright © 2014 by McGraw-Hill Education. Developing Recovery Strategies
  • 31. The next step is to develop your recovery strategy. The business unit will be paying for the recovery, so they need to know what their options are for different types of recoveries. You can provide anything from a no-frills recovery to an instantaneous recovery. It all depends on the business functions that have to be recovered and on how long the business unit can go without the function. The question is essentially how much insurance the business unit wants to buy. If it is your business, you are the only one who can make that decision. Someone who does not have as large a stake in the growth of the business cannot look at the business from the same perspective. Copyright © 2014 by McGraw-Hill Education. Procedures and Contacts In a business recovery situation, there must be written procedures that all employees in your business unit can quickly access, understand, and follow. Information needs to be readily available about the business function that has to be performed. The procedures should be stored in multiple, accessible locations to ensure they are available in a disaster scenario. You also need to make readily available a list of people to contact, along with their contact information. This list must be of the current employees to contact, and it should include members of the Human Resources, Facilities, Risk Management, and Legal departments. The list of contacts should also include the local fire and rescue department, police department, and emergency operations center. Copyright © 2014 by McGraw-Hill Education.
  • 32. Rehearsing Disaster Recovery and Business Continuity Plans The fourth BCP component, and the most crucial, is to rehearse, exercise, or test the plan. This is “where the rubber meets the road.” Having the other three components in place is important, but the plan is inadequate if you’re not sure whether it will work. It is vital to test your plan. If the plan has not been tested and it fails during a disaster, all the work you put into developing it is for naught. If the plan fails during a test, though, you can improve on it and test again. Copyright © 2014 by McGraw-Hill Education. Third-Party Vendor Issues Most organizations make use of various third-party vendors (Enterprise Resource Planning [ERP], Application Service Provider [ASP], etc.) in their recovery efforts. In such cases, the information about the third-party vendor is just as critical in your business or technology recovery. When you need to make use of such resources, it is beneficial, if not crucial, to make inquiries into the third-party’s operations prior to the implementation of its product or services. In the real world, the disaster recovery and/or business continuity professional has to integrate the vendor’s information into the business unit’s continuity plan. If a critical path in your DR plan depends on the involvement of a third-party vendor, you can’t get your operation up and running if that third-party vendor isn’t prepared to assist you. For example, suppose that processing loans is the bread and butter of your business, and your business relies on credit bureau reports to process loans. In this scenario, you need to ensure that if your organization
  • 33. experiences an outage, you will still receive these reports so that your company can continue to conduct business. The vendor’s ability to recover from a failure will also affect how robust your recovery is. Although your recovery may be technically sound, you must be sure that you can conduct business. The same standards you apply to your own organization should apply to third-party vendors you do business with. They should be available to you to conduct business. The disaster recovery or business continuity coordinator should make the appropriate inquiries with vendors to ensure that they can support a DR scenario. Copyright © 2014 by McGraw-Hill Education. Awareness and Training Programs Another important element of disaster recovery and business continuity planning is an awareness program. The business continuity or disaster recovery professional can meet with each business for tabletop exercises. These exercises are important, because they actually get the members of the business unit to sit down and think about a particular event and how first to prevent or mitigate it and then how to recover from it. The event can be anything from a category 3 hurricane to workplace violence. Any work stoppage can potentially impede the progress of an organization’s recovery or resumption of services, and it is up to the management team to design or develop a plan of action or a business continuity plan. The business continuity or disaster recovery professional must facilitate this process and make the business unit aware that there are events that can bring the business to a grinding halt. Copyright © 2014 by McGraw-Hill Education.
  • 34. Backups Backups may be used for complete system restoration, but they can also allow you to recover the contents of a mailbox, for example, or an “accidentally” deleted document. Backups can be extended to saving more than just digital data. Backup processes can include the backup of specifications and configurations, policies and procedures, equipment, and data centers. However, if the backup is not good or is too old, or the backup media is damaged, it will not fix the problem. Just having a backup procedure in place does not always offer adequate protection. Many organizations can no longer depend on traditional backup processes—doing an offline backup is unacceptable, doing an online backup would unacceptably degrade system performance, and restoring from a backup would take so much time that the organization could not recover. Such organizations are using alternatives to traditional backups, such as redundant systems and cloud services. Backup systems and processes, therefore, reflect the availability needs of an organization as well as its recovery needs. Copyright © 2014 by McGraw-Hill Education. Traditional Backup Methods In the traditional backup process, data is copied to backup media, primarily tape, in a predictable and orderly fashion for secure storage both onsite and offsite. Backup media can thus be made available to restore data to new or repaired systems after failure. In addition to data, modern
  • 35. operating systems and application configurations are also backed up. This provides faster restore capabilities and occasionally may be the only way to restore systems where applications that support data are intimately integrated with a specific system. Copyright © 2014 by McGraw-Hill Education. Backup Types There are several standard types of backups: Full Copy Incremental Differential Copyright © 2014 by McGraw-Hill Education. Full Backups Backs up all data selected, whether or not it has changed since the last backup. The definition of a full backup varies on different systems. On some systems it includes critical operating system files needed to rebuild a system completely; on other systems it backs up only the user data. Copyright © 2014 by McGraw-Hill Education.
  • 36. Copy Backups Data is copied from one disk to another. Copyright © 2014 by McGraw-Hill Education. Incremental Backups When data is backed up, the archive bit on a file is turned off. When changes are made to the file, the archive bit is set again. An incremental backup uses this information to back up only files that have changed since the last backup. This backup turns the archive bit off again, and the next incremental backup backs up only the files that have changed since the last incremental backup. This backup type saves time, but it means that the restore process will involve restoring the last full backup and every incremental backup made after it. Copyright © 2014 by McGraw-Hill Education. Restoring from an Incremental backup requires that all backups be applied. The circle encloses all the backups that must be restored. Copyright © 2014 by McGraw-Hill Education. Differential Backups Like an incremental backup, a differential backup only backs up
  • 37. files with the archive bit set—files that have changed since the last backup. Unlike an incremental backup, however, a differential backup does not reset the archive bit. Each differential backup backs up all files that have changed since the last backup that reset the bits. Using this strategy, a full backup is followed by differential backups. A restore consists of restoring the full backup and then only the last differential backup made. This saves time during the restore, but, depending on your system, creating differential backups takes longer than creating incremental backups. Copyright © 2014 by McGraw-Hill Education. Restoring from a differential backup requires applying only the full backup and the last differential backup. The circle encloses all of the backups that must be restored. Copyright © 2014 by McGraw-Hill Education. Backup Rotation Strategies In the traditional backup process, old backups are usually not immediately replaced by the new backup. Instead, multiple previous copies of backups are kept. This ensures recovery should one backup tape set be damaged or otherwise be found not to be good. Two traditional backup rotation strategies are Grandfather-Father-Son (GFS) and Tower of Hanoi. Copyright © 2014 by McGraw-Hill Education.
  • 38. GFS Backup Strategy In the GFS rotation strategy, a backup is made to separate media each day. Each Sunday a full backup is made, and each day of the week an incremental backup is made. The Sunday backups are kept for a month, and the current week’s incremental backups are also kept. On the first Sunday of the month, a new tape or disk is used to make a full backup. The previous full backup becomes the last full backup of the prior month and is re-labeled as a monthly backup. Weekly and daily tapes are rotated as needed, with the oldest being used for the current backup. Thus, on any given day of the month, that week’s backup is available, as well as the previous four or five weeks’ full backups, along with the incremental backups taken each day of the preceding week. If the backup scheme has been in use for a while, prior months’ backups are also available. Copyright © 2014 by McGraw-Hill Education. Note: No backup strategy is complete without plans to test backup media and backups by doing a restore. If a backup is unusable, it’s worse than having no backup at all, because it has lured users into a sense of security. Be sure to add the testing of backups to your backup strategy, and do this on a test system. Copyright © 2014 by McGraw-Hill Education.
  • 39. The Tower of Hanoi Backup Strategy The Tower of Hanoi strategy is based on a game played with three poles and a number of rings. The object is to move the rings from their starting point on one pole to the other pole. However, the rings are of different sizes, and you are not allowed to have a ring on top of one that is smaller than itself. To accomplish the task, a certain order must be followed. Consider a simple version of the Tower of Hanoi, in which you are given three pegs, one of which has three rings stacked on it from largest at the bottom to smallest at the top. Call these rings A (small), B (medium), and C (large). You need to move the rings to the right-hand peg. How do you solve this puzzle? Copyright © 2014 by McGraw-Hill Education. Tower of Hanoi Solution The solution is to move A to the right-hand peg, then B to the middle peg, A on top of B on the middle peg, then C to the right-hand peg,
  • 40. then A to the now-empty left-hand peg, B on top of C on the right-hand peg, and finally A on top of B to complete the stack on the right- hand peg. The rings were moved in this order: A B A C A B A. If you solve this puzzle with four rings labeled A through D, your moves would be A B A C A B A D A B A C A B A. Five rings are solved with the sequence A B A C A B A D A B A C A B A E A B A C A B A D A B A C A B A. As you can see, there is a recursive pattern here that looks complicated but is actually very repetitive. Small children solve this puzzle all the time. Copyright © 2014 by McGraw-Hill Education. Tower of Hanoi for Backups To use the same strategy with backup tapes requires the use of multiple tapes in this same complicated order. Each backup is a full backup, and multiple backups are made to each tape. Since each tape’s backups are not sequential, the chance that the loss of one tape or damage to one tape will destroy backups for the current period is nil. A fairly current backup is always available
  • 41. on another tape. This backup method gives you as many different restore options as you have tapes. Consider a three-tape Tower of Hanoi backup scheme and its similarity to the sequence of the game. On day one, you perform a full backup to tape A. On day two, your full backup goes to tape B. On day three, you back up to tape A again, and on day four you introduce tape C, which hasn’t been used yet. At this point, you now have three tapes containing full backups for the last three days. That’s pretty good coverage. On days 5, 6, and 7, you use tapes A, B, and A again, respectively. This gives you three tapes containing full backups that you can rely on, even if one tape is damaged. Copyright © 2014 by McGraw-Hill Education. Use More Tapes For additional coverage, you can use a four-tape or five-tape Tower of Hanoi scheme. You would perform the same rotation as in the game, either A B A C A B A D A B A C A B A in a four-tape system or A B A C A B A D A B A C A B A E A B A C A B A D A B A C A B A in a five-tape system.
  • 42. Higher numbers of tapes can be used as well, but the system is complicated enough that human error can become a concern. Backup software can assist by prompting the backup operator for the correct tape if it is configured for a Tower of Hanoi scheme. Copyright © 2014 by McGraw-Hill Education. Backup Alternatives and Newer Methodologies Many backup strategies are available for use today as alternatives to traditional tape backups: Hierarchical Storage Management (HSM) Windows shadow copy Online backup or data vaulting Dedicated backup networks Disk-to-disk (D2D) technology Copyright © 2014 by McGraw-Hill Education.
  • 43. Hierarchical Storage Management (HSM) HSM is more of an archiving system than a strict “backup” strategy, but it is a valid way of preserving data that can be considered as part of a data retention strategy. Long available for mainframe systems, it is also available on Windows. HSM is an automated process that moves the least-used files to progressively more remote data storage. In other words, frequently used and changed data is stored online on high speed, local disks. As data ages (as it is not accessed and is not changed), it is moved to more remote storage locations, such as disk appliances or even tape systems. However, the data is still cataloged and appears readily available to the user. If accessed, it can be automatically made available—it can be moved to local disks, it can be returned via network access, or, in the case of offline storage, operators can be prompted to load the data. Online services or cloud storage can be used for the more remote data storage, and this approach is commonly found in e-mail archiving solutions. Copyright © 2014 by McGraw-Hill Education. Windows Shadow Copy
  • 44. This Windows service takes a snapshot of a working volume, and then a normal data backup can be made that includes open files. The shadow copy service doesn’t make a copy; it just fixes a point in time and then places subsequent changes in a hidden volume. When a backup is made, closed files and disk copies of open files are stored along with the changes. When files are stored on a Windows system, the service runs in the background, constantly recording file changes. If a special client is loaded, previous versions of a file can be accessed and restored by any user who has authorization to read the file. Imagine that Alice deletes a file on Monday, or Bob makes a mistake in a complex spreadsheet design on Friday. On the following Tuesday, each can obtain their old versions of the file on their own, without a call to the help desk, and without IT getting involved. Copyright © 2014 by McGraw-Hill Education. Online Backup or Data Vaulting An individual or business can contract with an online service that automatically and regularly connects to a host or hosts and
  • 45. copies identified data to an online server. Typically, arrangements can be made to back up everything, data only, or specific data sets. Payment plans are based both on volume of data backed up and on the number of hosts, ranging up to complete data backups of entire data centers. Copyright © 2014 by McGraw-Hill Education. Dedicated Backup Networks An Ethernet LAN can become a backup bottleneck if disk and tape systems are provided in parallel and exceed the LAN’s throughput capacity. Backups also consume bandwidth and thus degrade performance for other network operations. Dedicated backup networks are often implemented using a Fibre Channel storage area network (SAN) or Gigabit Ethernet network and Internet Small Computer Systems Interface (iSCSI). iSCSI and Gigabit Ethernet can provide wire-speed data transfer. Backup is to servers or disk appliances on the SAN. Copyright © 2014 by McGraw-Hill Education.
  • 46. Disk-to-Disk (D2D) Technology A slow tape backup system may be a bottleneck, as servers may be able to provide data faster than the tape system can record it. D2D servers don’t wait for a tape drive, and disks can be provided over high-speed dedicated backup networks, so both backups and restores can be faster. D2D can use traditional network-attached storage (NAS) systems supported by Ethernet connectivity and either the Network File System (NFS on Unix) protocol or Common Internet File System (CIFS on Windows) protocol, or dedicated backup networks can be provided for D2D. Copyright © 2014 by McGraw-Hill Education. Backup Benefits Many benefits can be obtained from backing up as a regular part of IT operations: Cost savings: It takes many people-hours to reproduce digitally
  • 47. stored data. The cost of backup software and hardware is a fraction of this cost. Productivity: Users cannot work without data. When data can be restored quickly, productivity is maintained. Increased security: When backups are available, the impact of an attack that destroys or corrupts data is lessened. Data can be replaced or compared to ensure its integrity. Simplicity: When centralized backups are used, no user needs to make a decision about what to back up. Copyright © 2014 by McGraw-Hill Education. Backup Policy The way to ensure that backups are made and protected is to have an enforceable and enforced backup policy. The policy should identify the goals of the process, such as frequency, the necessity of onsite and offsite storage, and requirements for formal processes, authority, and documentation. Procedures can then be developed, approved, and used that interpret policy in light of current applications, data sets, equipment, and the availability of technologies. Several topics
  • 48. should be specifically detailed in the policy. Copyright © 2014 by McGraw-Hill Education. Administrative Authority Designate who has the authority to physically start the backup, transport and check out backup media, perform restores, sign off on activity, and approve changes in procedures. This should also include guidelines for how individuals are chosen. Recommendations should include separating duties between backing up and restoring, between approval and activity, and even between systems. (For example, those authorized to back up directory services and password databases should be different from those given authority to back up databases.) This allows for role separation, a critical security requirement, and the delegation of many routine duties to junior IT employees. Copyright © 2014 by McGraw-Hill Education.
  • 49. What to Back Up Designate which information should be backed up. Should system data or only application data be backed up? What about configuration information, patch levels, and version levels? How will applications and operating systems be replaced? Are original and backup copies of their installation disks provided for? These details should be specified. Copyright © 2014 by McGraw-Hill Education. Scheduling Identify how often backups should be performed. Copyright © 2014 by McGraw-Hill Education. Monitoring Specify how to ensure the completion and retention of backups.
  • 50. Copyright © 2014 by McGraw-Hill Education. Storage for Backup Media Specify which of the many ways to store backup media are appropriate. Is media stored both onsite and offsite? What are the requirements for each type of storage? For example, are fireproof vaults or cabinets available? Are they kept closed? Where are they located? Onsite backup media needs to be available, but storing backups near the original systems may be counterproductive. A disaster that damages the original system might take out the backup media as well. Copyright © 2014 by McGraw-Hill Education. Type of Media and Process Used Specify how backups are made.
  • 51. How many backups are made, and of what type? How often are they made, and how long are they kept? How often is backup media replaced? Copyright © 2014 by McGraw-Hill Education. High Availability Not too long ago, most businesses closed at 5 p.m. Many were not open on the weekends, holidays were observed by closings or shortened hours, and few of us worried when we couldn’t read the latest news at midnight or shop for bath towels at 3 a.m. That’s not true anymore. Even ordinary businesses maintain computer systems around the clock, and their customers expect instant gratification at any hour. Somehow, since computers and networks are devices and not people, we expect them just to keep working without breaks, or sleep. Of course, they do break. Procedures, processes, software, and hardware that enable system and network redundancy are a necessary part of operations. However, they serve another purpose as well. Redundancy ensures the integrity and availability of information. Copyright © 2014 by McGraw-Hill Education.
  • 52. Redundancy What effect does system redundancy have? Calculations including the mean time to repair (how long it takes to replace a failed component) and uptime (the percentage of time a system is operational) can show the results of having versus not having redundancy built into a computer system or a network. However, the importance of these figures depends on the needs and requirements of the system. Most desktop systems, for example, do not require built-in redundancy; if one fails and our work is critical, we simply obtain another desktop system. The need for redundancy is met by another system. In most cases, however, we do something else while the system is fixed. Other systems, however, are critical to the survival of a business or perhaps even of a life. These systems need either built-in hardware redundancy, support alternatives that can keep their functions intact, or both. Copyright © 2014 by McGraw-Hill Education.
  • 53. Note: Critical systems are those systems a business must have, and without which it would be critically damaged, or whose failure might be life-threatening. Which systems are critical to a business must be determined by the business. For some it will be their e-commerce site, for others the billing system, and for others their customer information databases. Everyone recognizes the critical nature of air traffic control systems and life support systems used in hospitals. Two methods can be used to evaluate where and how much redundancy is needed . The first, more traditional method is to weigh the cost of providing redundancy against the cost of downtime without redundancy. These costs can be calculated and compared directly. (Is the cost of downtime greater or less than the cost of redundancy?) The second method, which is harder to calculate but is increasingly easier to justify, is to decide based on the likelihood that customers will gravitate to the organization that can provide the best availability of service. This, in turn, is based on the increasing demands that online services, unlike traditional services, be available 24×7×365. High availability can be a selling point that directly leads to more business. Indeed, some customers will demand it. There are automated methods for providing system redundancy,
  • 54. such as hardware fault tolerance, clustering, and network routing, and there are operational methods, such as component hot-swapping and standby systems. Copyright © 2014 by McGraw-Hill Education. Automated Redundancy Methods It has become commonplace to expect significant hardware redundancy and fault tolerance in server systems. A wide range of components are either duplicated within the systems or effectively duplicated by linking systems into a cluster. Some typical components and techniques are used: Clustering Fault tolerance Redundant System Slot (RSS) Cluster in a box High-availability design Internet network routing Copyright © 2014 by McGraw-Hill Education.
  • 55. Clustering Entire computers or systems are duplicated. If a system fails, operation automatically transfers to the other systems. Clusters may be set up as active-standby, in which case one system is live and the other is idle, or active-active, in which case multiple systems are kept perfectly in synch, and even dynamic load sharing is possible. Active-active is ideal, as no system stands idle and the total capacity of all systems can always be utilized. If there is a system failure, fewer systems carry the load. When the failed system is replaced, load balancing readjusts. Clustering does have its downside. When active-standby is used, duplication of systems is expensive. These active-standby systems may also take seconds for the failover to occur, which is a long time when systems are under heavy loads. Active- active systems, however, may require specialized hardware and additional, specialized administrative knowledge and maintenance. Copyright © 2014 by McGraw-Hill Education.
  • 56. Fault Tolerance Components may have backup systems or parts of systems that allow them to recover from errors or to survive in spite of them. For example, fault-tolerant CPUs use multiple CPUs running in lockstep, each using the same processing logic. In the typical case, three CPUs are used and the results from all CPUs are compared. If one CPU produces results that don’t match those of the other two, it is considered to have failed and is no longer consulted until it is replaced. Another example is the fault tolerance built into Microsoft’s NTFS file system. If the system detects a bad spot on a disk during a write, it automatically marks it as bad and writes the data elsewhere. The logic to both these strategies is to isolate failure and continue on. Meanwhile, the system can raise alerts and record error messages to prompt maintenance. Copyright © 2014 by McGraw-Hill Education. Redundant System Slot (RSS) Entire hot-swappable computer units are provided in a single unit.
  • 57. Each system has its own operating system and bus, but all systems are connected and share other components. Like clustered systems, RSS systems can be either active- standby or active-active. RSS systems exist as a unit, and systems cannot be removed from their unit and continue to operate. Copyright © 2014 by McGraw-Hill Education. Cluster in a Box Two or more systems are combined in a single unit. The difference between these systems and RSS systems is that each unit has its own CPU, bus, peripherals, operating system, and applications. Components can be hot-swapped, and therein lies its advantage over a traditional cluster. Copyright © 2014 by McGraw-Hill Education.
  • 58. High Availability Design Two or more complete components are placed on the network, with one component serving either as a standby system (with traffic being routed to the standby system if the primary fails) or as an active node (with load balancing being used to route traffic to multiple systems sharing the load, and if one fails, traffic is routed only to the other functional systems). Copyright © 2014 by McGraw-Hill Education. A High Availability Network Design Supporting a Web Site Multiple ISP backbones are available, and duplicate firewalls, load-balancing systems, application servers, and database servers support a single web site. Copyright © 2014 by McGraw-Hill Education. Internet Network Routing
  • 59. In an attempt to achieve redundancy for Internet-based systems similar to that of the Public Switched Telephone Network (PSTN), new architectures for Internet routing are adding or proposing a variety of techniques, such as these: Reserve capacity System and geographic diversity Size limits Dynamic restoration switching Self-healing protection switching Fast rerouting (which reverses traffic at the point of failure so that it can be directed to an alternative route) RSVP-based backup tunnels (where a node adjacent to a failed link signals failure to upstream nodes, and traffic is thus rerouted around the failure) Two-path protection (in which sophisticated engineering algorithms develop alternative paths between every node) Two examples of such architectures are Multiprotocol Label Switching (MPLS), which integrates IP and data-link layer technologies to introduce sophisticated routing control, and Automatic Switching Protection (ASP), which provides the fast restoration times that modern technologies, such as voice and streaming media, require. Copyright © 2014 by McGraw-Hill Education.
  • 60. Operational Redundancy Methods In addition to technologies that provide automated redundancy, there are many processes that help you to quickly get your systems up and running, if a problem occurs. These include Standby systems Hot-swappable components Copyright © 2014 by McGraw-Hill Education. Standby Systems Complete or partial systems are kept ready. Should a system, or one of its subsystems, fail, the standby system can be put into service. There are many variations on this technique. Some clusters are deployed in active-standby state, so the clustered system is ready to go but idle. To recover from a CPU or other major system failure quickly, a hard drive might be moved to another, duplicate, online system. To recover quickly from the failure of a database system, a duplicate system complete with database software may be kept
  • 61. ready. The database is periodically updated by replication or by export and import functions. If the main system fails, the standby system can be placed online, though it may be lacking some recent transactions. Copyright © 2014 by McGraw-Hill Education. Hot-Swappable Components Many hardware components can now be replaced without shutting down systems. Hard drives, network cards, and memory are examples of current hardware components that can be added. Modern operating systems detect the addition of these devices on the fly, and operations continue with minor, if any, service outages. In a RAID array, for example, drive failure may be compensated for by the built-in redundancy of the array. If the failed drive can be replaced without shutting down the system, the array will return to its prefailure state. Interruptions in service will be nil, though performance may suffer depending on the current load. Copyright © 2014 by McGraw-Hill Education.
  • 62. Summary In this chapter, we covered the four related business resumption strategies that are all necessary for recovery from incidents, outages, and disasters that result in service or data loss: disaster recovery, business continuity planning, backups, and high- availability. Together, these form the core of a strategy to keep the organization’s information infrastructure operational. Here in summary are the principal points, roles, and responsibilities of a good disaster recovery and business continuity program: Develop and maintain disaster recovery and business continuity plans for all your organization’s enterprise technologies. Schedule and oversee disaster recovery rehearsals for all enterprise systems. Ensure disaster awareness by planning and conducting awareness programs, hazard fairs, lunch-and-learn sessions, and other informative events and materials. Activate the plan. Ensure community involvement by participating in local community disaster mitigation and planning initiatives and professional groups. The disaster recovery and business continuity process is
  • 63. cyclical and must be maintained for it to stay current with the needs of the organization and the technologies in the environment. Your plans must be updated and rehearsed regularly. Disaster recovery is vital to everyone. Backups can be an important part of a recovery strategy. They play a role in disaster recovery process, to move data from the primary site to the DR site, although real-time data replication approaches are replacing traditional tape shipments in modern DR plans. Backups are also necessary for recovering data in a traditional data center. High availability architectures are the fourth leg of the table supporting service resiliency, to ensure that failure of one system or component of a service doesn’t cause that service to fail. Copyright © 2014 by McGraw-Hill Education. CISSP Guide to Security Essentials, Second Edition
  • 64. Software Development Security © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1 CISSP Guide to Security Essentials, 2e 2 Objectives Operating systems Types of applications Application models and technologies Application threats and countermeasures Security in the software development life cycle Application security controls Databases and data warehouses © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 2
  • 65. Operating Systems Operating system components Kernel Process management Memory management Hardware resource management Device drivers Tools CISSP Guide to Security Essentials, 2e 3 © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Operating Systems (cont.) Operating system security functions Authentication Resource access Access control Communication Event logging CISSP Guide to Security Essentials, 2e
  • 66. 4 © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 5 Types of Applications Agents Standalone programs that are part of a larger application Examples: Anti-malware Patch management Configuration management © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 6 Types of Applications (cont.) Applets Software programs that run within the context of another
  • 67. program Example: media players within browser Client-server Separate programs on clients and servers communicate via networks and work together Few developed now but many are in use © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 7 Types of Applications (cont.) Distributed Software components run on several systems Two-tier, three-tier, multi-tier Reasons: scalability, performance, geographical Web Web browser as client, application server back-end Client software nearly universal Application software centralized © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
  • 68. CISSP Guide to Security Essentials, 2e 8 Software Models and Technologies Control flow languages Structured languages Object oriented languages Knowledge based languages © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 9 Control Flow Languages Linear, sequential Use of “if – then – else” Branching with “go to” Examples: BASIC, COBOL, Cold Fusion, FORTRAN, Perl, PHP, Python, VBScript © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
  • 69. or in part. CISSP Guide to Security Essentials, 2e 10 Structured Languages Nested, heavy use of subroutines and functions Little or no “go to” Examples: C Pascal © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 11 Object-Oriented Languages Utilize concepts of object programming Classes, objects, instances, and inheritance Methods, instantiations Encapsulation, abstraction, polymorphism Examples C++, C#, Java, Ruby, Simula, Smalltalk
  • 70. © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 12 Knowledge-Based Systems Neural networks Modeled after biological reasoning processes Artificial neurons that store pieces of information Given cases about situations and outcomes, can predict future outcomes Expert systems Inference engine and knowledge base of past situations and outcomes © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 13 Threats in the Software Environment Reasons for attacks
  • 71. Industrial espionage Vandalism and disruption Denial of service Political / religious © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Software Attack Approaches Authentication bypass Access a system’s resources without providing credentials Privilege escalation Trick a system into providing a higher level of privileges, which provides access to more information and functions Denial of service Incapacitate a system CISSP Guide to Security Essentials, 2e 14 © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Threats to Software
  • 72. Buffer overflow Covert channel Side channel attack Malicious software Input attacks Object reuse Mobile code Social engineering Back door Logic bomb CISSP Guide to Security Essentials, 2e 15 © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 16 Threats to Software(cont.) Buffer overflow attacks Disrupt a software application by providing more data to the application than it was designed to handle Types Stack buffer overflow
  • 73. NOP sled attack Heap overflow Jump to register attack Examples: Morris worm, ping of death, Code Red, SQL Slammer, Blaster, Sasser, Conficker © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 17 Software Attach Approaches (cont.) Buffer overflow attack countermeasures Use safe languages and libraries Executable space protection Stack smashing protection Application firewalls © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 18
  • 74. Threats to Software (cont.) Covert channel Unintended and hidden channel of communications Types: Covert storage channel: read a storage location and learn about the application or other data Timing channel: observe timings in an application to determine what is happening in the application Countermeasures Careful software analysis, good software engineering © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 19 Threats to Software (cont.) Side channel attack An attack on a cryptosystem based upon physical information gained from the system Examples: timing, power consumption, emanations, and even sounds Countermeasures Limit release of information through shielding and other means
  • 75. © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 20 Threats to Software (cont.) Malicious software Types: viruses, worms, Trojan horses, rootkits, bots, spam, pharming, spyware, key loggers Purpose Steal, corrupt, or destroy information Remote control Denial of service © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Clarification: spam, phishing, pharming and whaling are mechanisms for transporting malware to the target system. 20
  • 76. CISSP Guide to Security Essentials, 2e 21 Threats to Software (cont.) Types of malware Virus: human assisted replication, embed in programs, files, master boot records Worm: self replicating, scan for victims, rapid spread Trojan horse: claims one function, but is malware Rootkit: hide within or beneath the operating system Bot: remote control zombie (also known as Remote Access Trojan (RAT) ) Spam: unsolicited e-mail © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Clarification: spam, phishing, pharming and whaling are mechanisms for transporting malware to the target system. 21 CISSP Guide to Security Essentials, 2e 22 Threats to Software (cont.)
  • 77. Types of malware (cont.) Pharming: attack on DNS to redirect traffic to decoy application Spyware: collect information about usage, forward to central server Key logger: logs keystrokes and mouse movements, forwards to central server © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Clarification: spam, phishing, pharming and whaling are mechanisms for transporting malware to the target system. 22 CISSP Guide to Security Essentials, 2e 23 Threats to software (cont.) Malware countermeasures Anti-malware Application whitelisting Process profiling Spam filters Patches
  • 78. Firewalls and application firewalls Hardened systems Intrusion prevention systems Decreased privilege levels Penetration testing © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 24 Threats to Software (cont.) Input attacks Buffer overflow Integer overflow Script injection Cross site scripting Cross site request forgery Countermeasures Input field filtering, application firewall, application vulnerability scanning, software developer training © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
  • 79. CISSP Guide to Security Essentials, 2e 25 Threats to Software (cont.) Object reuse Use of a resource belonging to another process, including: Memory, databases, file systems, temporary files, and paging space Object reuse countermeasures Application isolation Server virtualization Developer training © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 26 Threats to Software (cont.) Mobile code Executable code, active content, downloadable content Examples: active website content, downloaded programs Some is desired, but some is malicious in nature
  • 80. Mobile code countermeasures Anti-malware, mobile code access controls Application whitelisting Reduced user privileges Secure system configuration © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 27 Threats to Software (cont.) Social engineering Attack on personnel to gain secrets People are vulnerable because they want to help Social engineering countermeasures Security awareness training that includes accountability © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 28
  • 81. Threats to Software (cont.) Back door / maintenance hook Access holes deliberately planted by a developer To facilitate easier testing during development To facilitate production access To facilitate a break-in Back door countermeasures Code reviews Source code control © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 29 Threats to Software (cont.) Logic bombs Deliberate malfunction that causes harm Time bombs Activate on a given date and time Event bombs Activate on a specific event Logic bomb countermeasures Software source code review, external audits
  • 82. © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 30 Security in the Software Development Life Cycle (SDLC) SDLC The entire collection of processes used to design, develop, test, implement, and maintain software Security must be included in each step of the SDLC Conceptual Requirements and specifications development Application design, coding, and testing © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 31 Security in the Software Development Life Cycle (cont.) Security in the conceptual stage
  • 83. Presence of sensitive information must be identified Access controls (users, administrators, third parties) Regulatory conditions Security dependencies © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 32 Security in the Software Development Life Cycle (cont.) Security application requirements and specifications Functional requirements Standards Security requirements Roles, access controls, audit logging, configuration management Regulatory requirements Test plan a byproduct of requirements © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e
  • 84. 33 Security in the Software Development Life Cycle (cont.) Security in application design Adhere to all requirements and specifications Published design documents Design reviews Reviewed by all stakeholders including security Threat risk modeling Identify threats and risks prior to development Possible changes to specs, req’s, or design © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 34 Security in the Software Development Life Cycle (cont.) Security in application coding Develop safe code Free of common vulnerabilities Use safe libraries that include safe functions for input validation Security in testing Testing should verify correct coding of every requirement and
  • 85. specification © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 35 Security in the Software Development Life Cycle (cont.) Protect the SDLC itself Source code access control Protect source code Record version changes Protection of software development and testing tools Protect from unauthorized modifications Protection of software development systems Prevent introduction of malware, back doors, logic bombs © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 36 Application Environment and Security Controls
  • 86. Controls that must be present in a developed application Authentication Limiting access to only legitimate, approved users Authorization Limiting access only to approved functions and data Role-based access control (RBAC) Assign authorizations to roles, assign roles to users Audit logging Logging of all actions in the application © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 37 Database Architectures Hierarchical databases: tree structure (no longer produced) Network databases: complex tree structure (no longer produced) Object databases: OO, methods stored with data Distributed databases: physically distributed, any type Relational databases (RDBMS): in widest use today Oracle, SQL Server, DB2, MySQL, etc. © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
  • 87. or in part. Data Warehouse A type of database that is used for decision support and research purposes A copy of some or all transaction data Usually, refreshed periodically (typically daily) Indexed and tuned differently than a transaction database Complex queries into trends do not affect production transactions CISSP Guide to Security Essentials, 2e 38 © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 39 Database Transactions Records retrieval Records update Records creation Nested or complex transactions executed as a unit
  • 88. Begin work… <transactions> …end work © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 40 Database Security Controls Access controls User ids, passwords Table / row / field level access control Read-only or read/write Views Virtual tables that are a subset of individual tables, or a “join” between tables Permission given to views just like “real” tables © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 41
  • 89. Summary Operating system components: kernel, device drivers, tools Operating system functions: authentication, resource access, access control, communication, event logging Types of applications: agents, applets, client-server, distributed, web Application language types: control flow, structured, object oriented, knowledge based © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. CISSP Guide to Security Essentials, 2e 42 Summary (cont.) Reasons for threats to applications: industrial espionage, vandalism and disruption, denial of service, political / religious Types of threats buffer overflow, covert channel, side channel, malware, input attacks, object reuse, mobile code, social engineering, back door, logic bomb © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
  • 90. or in part. CISSP Guide to Security Essentials, 2e 43 Summary (cont.) Software development life cycle (SDLC) steps Conceptual, requirements / specifications, design, coding, testing, maintenance Source code control, configuration management Software environment security controls Authentication, access control, role based access control (RBAC), audit logging © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Summary (cont.) Types of databases Hierarchical, network, distributed, object-oriented, relational (most common) Database security controls: userid, access control, audit logging, views
  • 91. CISSP Guide to Security Essentials, 2e 44 © 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 44 Please provide detail answer to the following questions. 1) List and describe the 8 domains of (CISSP), Information Security (CBK, Common Body of Knowledge). 2) List and describe the OSI Network Model layers. 3) Describe what information can be obtained by port scanning and what are the countermeasures? ( Review PP Domain 6) 4) Describe and discuss the four (4) components of Business Continuity Planning. (Review PP DR7 & SDS).
  • 92. 5) Describe what is SQL injection and what is/are the countermeasure to prevent SQL injection? Running head: GLOBAL LEADERSHIP ASSIGNMENT OUTLINE 1 Global Leadership4 Global Leadership Outline Introduction Thesis statement: to understand the meaning and importance of global leadership and how it can be attained. Main point 1: Meaning and importance of global leadership from different point of views Main point 2: Qualities and skills of a global leader Main point 3: Ways of attaining global leadership Main point 4: Challenges facing and hindering the development of global leadership skills and qualities Body Literature review Main point 1: Meaning and importance of global leadership from different point of views Meaning of global leadership from Levy, Peiperl, & Jonsen, (2016); explanation as the article expounds on the meaning from different countries and understanding point of
  • 93. view. Elaboration of global leadership meaning from Perruci, (2018) point of view as well as the importance of the topic thereby linking why it is important to attain global leadership. Also, use of an article by Reiche, Bird, Mendenhall, & Osland, (2015) also expounds on importance of global leadership. Main point 2: Qualities and skills of a global leader · Basis of global leadership Reiche, et al., (2015) · Relevant qualities and skills that makes one an effective leader as described by Hassanzadeh, et al., (2015). · How identified skills and qualities of a global leadership makes one an effective global leader as featured in (Carrillo, 2019) · Perruci, (2018); features of a global leader Main point 3: Ways of attaining global leadership · Roots of global leadership (Mendenhall, 2017) · How education can be used to install and train leaders to develop global leadership skills and qualities (Deshpande, 2017 and Longo, & McMillan, 2015) · Hassanzadeh, et al., (2015); strategies of developing and acquiring global leadership · Herd, et al., (2018); methodologies that teachers can use to train learners on different global leadership skill Main point 4: Challenges facing and hindering the development of global leadership skills and qualities
  • 94. · Why some leaders despite going through training and global leadership skills acquisition fail to do so ·