SlideShare a Scribd company logo
Security Program and
Policies
Principles and Practices
by Sari Stern Greene
Chapter 8: Communications and Operations Security
Copyright 2014 Pearson Education, Inc. 2
Objectives
❑ Author useful standard operating procedures
❑ Implement change control processes
❑ Understand the importance of patch management
❑ Protect information systems against malware
❑ Consider data backup and replication strategies
❑ Recognize the security requirements of email and
email systems
❑ Appreciate the value of log data and analysis
❑ Evaluate service provider relationships
❑ Write policies and procedures to support operational
and communications security
Copyright 2014 Pearson Education, Inc. 3
Standard Operating Procedures
(SOPs)
❑ SOPs provide direction to improve
communication, reduce training time, and improve
work consistency
❑ SOPs should be documented to protect the
company from the pitfalls of institutional
knowledge
■ If a business process is only known by one employee,
and that employee becomes unavailable, how is this
process going to be performed successfully?
Copyright 2014 Pearson Education, Inc. 4
Standard Operating Procedures
Cont.
■ SOPs should be written in as simple a style
as possible for all to clearly understand the
procedures
■ SOPs should include all steps of a given
procedure
■ SOPs should not be overly detailed and
should remain clear
Copyright 2014 Pearson Education, Inc. 5
Standard Operating Procedures
Cont.
■ If a procedure contains less than 10 steps, it
should be presented in step format
■ If a procedure contains 10 steps or more, but
few decisions, it should be presented in a
graphical format or a hierarchical format
■ If a procedure requires many decisions, then
it should be presented as a flowchart
Copyright 2014 Pearson Education, Inc. 6
Standard Operating Procedures
Cont.
■ After a procedure has been researched,
documented, reviewed, and tested, it should
be authorized by the process owner
■ The integrity of the SOP documents must be
protected so that employees don’t follow
instructions that have been maliciously
tampered with
Copyright 2014 Pearson Education, Inc. 7
Standard Operating Procedures
Cont.
■ The change management process must be
defined so that the SOPs mirror the evolution
of the business processes
■ All revisions of the SOP documents must be
reviewed and approved by the process owner
Copyright 2014 Pearson Education, Inc. 8
Operational Change Control
■ Change control: Internal procedure by which only
authorized changes are made to software, hardware,
network access privileges, or business processes
■ Change control process
❑ Starts with a Request for Change (RFC)
❑ Description of the proposed change
❑ Justification why the change should be implemented
❑ Impact of not implementing the change
❑ Alternatives
❑ Cost
❑ Resource requirements and timeframe
❑ The change is then evaluated and if approved implemented
Copyright 2014 Pearson Education, Inc. 9
Operational Change Control Cont.
■ Change control plan
❑ Developed after the change is approved
❑ Components
■ Security review to ensure no new vulnerabilities are introduced
■ Implementation instructions
■ Rollback and/or recovery options
■ Post implementation monitoring
■ Change must be communicated to all relevant parties
❑ Two categories of messages
■ Messages about the change
■ Messages how the change will impact employees
■ All actions should be documented throughout the
implementation process
Copyright 2014 Pearson Education, Inc. 10
Why Is Patching Handled
Differently
■ Patch
❑ Software or code designed to fix a problem
■ Security patching is the primary method of fixing
security vulnerabilities
■ Patches need to be applied quickly
■ Patch management
❑ The process of scheduling, testing, approving, and
applying security patches
❑ Patching could be unpredictable and disruptive
❑ User should be notified of potential downtime
Malware Protection
■ Malware
❑ Short for malicious software
❑ Software designed to disrupt computer operation,
gather sensitive information, or gain unauthorized
access to computer systems and mobile devices
❑ It can be bundled with other programs or self-
replicated
❑ Typically requires user interaction
Copyright 2014 Pearson Education, Inc. 11
Malware Protection cont.
■ Malware categories
❑ Virus
❑ Worm
❑ Trojans
❑ Bots
❑ Ransomware
❑ Rootkits
❑ Spyware/adware
❑ Hybrid
Copyright 2014 Pearson Education, Inc. 12
How Is Malware Controlled
■ Prevention controls
❑ Stop an attack before it occurs
■ Detection controls
❑ Identify the presence of malware, alert the user,
and prevent the malware from carrying out its
mission
Copyright 2014 Pearson Education, Inc. 13
What Is Antivirus Software?
■ Used to detect, contain, and in some cases
eliminate malicious software
■ Most AV software employs two techniques
❑ Signature-based recognition
❑ Behavior-based (heuristic) recognition
Copyright 2014 Pearson Education, Inc. 14
Copyright 2014 Pearson Education, Inc. 15
Data Replication
■ Data Replication
❑ The process of copying data to a second location that is available
for immediate or near-time use
■ Data backup
❑ The process of copying and storing data that can be restored to
its original location
■ Failure to back up threatens data availability and data
integrity
❑ Lost/corrupt data can also have a negative impact on the
company:
■ Financially
■ Legally
■ PR-wise
Copyright 2014 Pearson Education, Inc. 16
Is There a Recommended Backup or
Replication Strategy?
❑ The following aspects should be considered when
the strategy is designed:
■ Reliability
■ Speed
■ Simplicity
■ Ease of use
■ Security of the stored information
❑ Backed-up or replicated data should be stored at
an off-site location in an environment secured
from theft, the elements, and natural disasters
Copyright 2014 Pearson Education, Inc. 17
The Importance of Testing
❑ If the company relies on backup to protect data
integrity and availability, then it needs to be sure
that the information stored on the backup media is
restorable in case of an incident
❑ Just as it is important that a backup would take
place according to a set schedule, test restores
should also be officially scheduled
Copyright 2014 Pearson Education, Inc. 18
Securing Messaging
❑ E-mail is, by default, an insecure way to transmit
information
❑ Unless optional encryption is added to the e-mail
solution, no confidential information should EVER
be sent via e-mail
❑ Inherently, e-mail does not employ ANY
encryption, and all information sent is sent in clear
text
Copyright 2014 Pearson Education, Inc. 19
Securing Messaging Cont.
■ Employees should not commit any
information to email that they would not feel
comfortable writing on company letterhead
■ Employees must be trained to understand the
risks and responsibilities associated with
using e-mail as a business tool in a corporate
environment
Copyright 2014 Pearson Education, Inc. 20
Securing Messaging Cont.
■ Documents sent as e-mail attachments might
contain more information than the sender
intended to share
❑ Metadata
■ Details about a file that describes or identifies it, such as
title, author name, subjects, and keywords
■ E-mail is an effective method of distributing
malware
❑ Can be embedded in an attachment
❑ Sent as a hyperlink
Copyright 2014 Pearson Education, Inc. 21
Securing Messaging Cont.
■ Incoming attachments may contain a malicious
payload:
❑ Virus
❑ Worm
❑ Trojan
❑ Other malicious scripts
❑ Hoax
■ Users must be trained to be suspicious toward
attachments
■ Access to personal email accounts should not
be allowed from the corporate network
Copyright 2014 Pearson Education, Inc. 22
Securing Messaging Cont.
■ Common e-mail-related mistakes
❑ Hitting the wrong button: using “reply all” as
opposed to “reply” or “forward” instead of “reply”
❑ Sending an e-mail to the wrong e-mail address
because it is close to the intended recipient’s
❑ Leaving an entire string of replies in an e-mail
forwarded to a third person who should not have
been privy to some of the information discussed in
earlier e-mails
■ Training users is paramount to e-mail security
Copyright 2014 Pearson Education, Inc. 23
Are E-Mail Servers at Risk?
■ Compromising the e-mail server
❑ Relay abuse
■ Involves using the mail server to distribute spam and malware
❑ A denial of service attack against an e-mail is an
attack against the availability of the service
❑ The e-mail server should be set up so that it does not
allow an open relay of SMTP traffic. Failure do to so
implies two issues:
■ The e-mail server will be used by unscrupulous spammers
■ The domain name used for e-mail purposes will be blacklisted
Activity Monitoring and Log
Analysis
■ Log: A record of the vents occurring within an
organization’s systems and networks
■ Almost every device and application on the
network can log activity
■ Log management
❑ Configuring the log sources, including log generation,
storage, and security
❑ Performing analysis of log data
❑ Initiating appropriate responses to identified events
❑ Managing the long-term storage of log data
Copyright 2014 Pearson Education, Inc. 24
Analyzing Logs
■ Log analysis techniques
❑ Correlation
❑ Sequencing
❑ Signature
❑ Trend analysis
Copyright 2014 Pearson Education, Inc. 25
Service Provider Oversight
■ Service providers include vendors, contractors,
business partners and affiliates who store,
process, transmit, or access company
information on company information systems
■ Service providers internal controls should meet
or exceed those of the contracting organization
■ Due diligence is the process used to assess the
adequacy of service providers
■ SSAE16 audit reports are the most widely
accepted due diligence documentation
Copyright 2014 Pearson Education, Inc. 26
Copyright 2014 Pearson Education, Inc. 27
Summary
■ Day-to-day activities can have a huge impact on the security of the
network and the data it contains. SOPs are important in providing a
consistent framework across the company.
■ Change must be managed. Two mandatory components of a
change management process are RFC documents and a change
control plan.
■ Malware is becoming the tool of choice for criminals to exploit
devices, operating systems, applications, and user vulnerabilities.
Many types of malware exist and companies should protect against
them.
■ Sound backup strategies should be developed, tested, authorized
and implemented. E-mail, while being a fantastic business tool, is
also a double-edge sword because of its inherent lack of built-in
security and must be treated as such.
■ Operational security extends to service providers. Service provider
controls should meet or exceed those of the company.

More Related Content

What's hot

Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
SAROJ BEHERA
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
Owako Rodah
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Kimberly Simon MBA
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources Security
Nada G.Youssef
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
Virginia Fernandez
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
Nada G.Youssef
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
RSAArcher
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
KP Naidu
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
ISO 27001
ISO 27001ISO 27001
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
Dr. Ahmed Al Zaidy
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
KloudLearn
 

What's hot (20)

Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources Security
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 

Viewers also liked

Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Chapter 1: Understanding Policy
Chapter 1: Understanding Policy
Nada G.Youssef
 
Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style
Nada G.Youssef
 
Chapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementChapter 4: Governance and Risk Management
Chapter 4: Governance and Risk Management
Nada G.Youssef
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
Nada G.Youssef
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
Nada G.Youssef
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
Nada G.Youssef
 

Viewers also liked (6)

Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Chapter 1: Understanding Policy
Chapter 1: Understanding Policy
 
Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style
 
Chapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementChapter 4: Governance and Risk Management
Chapter 4: Governance and Risk Management
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 

Similar to Chapter 8: Communications and Operations Security

Information Security Incident Management.pdf
Information Security Incident Management.pdfInformation Security Incident Management.pdf
Information Security Incident Management.pdf
GoldenMIT
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint GovernanceImperva
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
Tommy Zul Hidayat
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
Jigisha Aryya
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
projectwinner
 
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
Financial Poise
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
mishogelashvili28
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
Matthew Rosenquist
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
Great Bay Software
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
Accenture Technology
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
Frances Coronel
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist, LLC
 
Group presentation for Information Security Class.
Group presentation for Information Security Class.Group presentation for Information Security Class.
Group presentation for Information Security Class.
Ashley Clark
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
abhichowdary16
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
Shawn Tuma
 
Building HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teamsBuilding HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teams
Gaurav Garg
 

Similar to Chapter 8: Communications and Operations Security (20)

Information Security Incident Management.pdf
Information Security Incident Management.pdfInformation Security Incident Management.pdf
Information Security Incident Management.pdf
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
 
Group presentation for Information Security Class.
Group presentation for Information Security Class.Group presentation for Information Security Class.
Group presentation for Information Security Class.
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Building HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teamsBuilding HIPAA Compliance in service delivery teams
Building HIPAA Compliance in service delivery teams
 

More from Nada G.Youssef

مجلة 1
مجلة 1مجلة 1
مجلة 1
Nada G.Youssef
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
Nada G.Youssef
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
Nada G.Youssef
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
Nada G.Youssef
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
Nada G.Youssef
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
Nada G.Youssef
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
Nada G.Youssef
 
Chapter Six
Chapter SixChapter Six
Chapter Six
Nada G.Youssef
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
Nada G.Youssef
 
Chapter Four
Chapter FourChapter Four
Chapter Four
Nada G.Youssef
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
Nada G.Youssef
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
Nada G.Youssef
 
Chapter one
Chapter oneChapter one
Chapter one
Nada G.Youssef
 
Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University
Nada G.Youssef
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Nada G.Youssef
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
Nada G.Youssef
 

More from Nada G.Youssef (16)

مجلة 1
مجلة 1مجلة 1
مجلة 1
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter one
Chapter oneChapter one
Chapter one
 
Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

Chapter 8: Communications and Operations Security

  • 1. Security Program and Policies Principles and Practices by Sari Stern Greene Chapter 8: Communications and Operations Security
  • 2. Copyright 2014 Pearson Education, Inc. 2 Objectives ❑ Author useful standard operating procedures ❑ Implement change control processes ❑ Understand the importance of patch management ❑ Protect information systems against malware ❑ Consider data backup and replication strategies ❑ Recognize the security requirements of email and email systems ❑ Appreciate the value of log data and analysis ❑ Evaluate service provider relationships ❑ Write policies and procedures to support operational and communications security
  • 3. Copyright 2014 Pearson Education, Inc. 3 Standard Operating Procedures (SOPs) ❑ SOPs provide direction to improve communication, reduce training time, and improve work consistency ❑ SOPs should be documented to protect the company from the pitfalls of institutional knowledge ■ If a business process is only known by one employee, and that employee becomes unavailable, how is this process going to be performed successfully?
  • 4. Copyright 2014 Pearson Education, Inc. 4 Standard Operating Procedures Cont. ■ SOPs should be written in as simple a style as possible for all to clearly understand the procedures ■ SOPs should include all steps of a given procedure ■ SOPs should not be overly detailed and should remain clear
  • 5. Copyright 2014 Pearson Education, Inc. 5 Standard Operating Procedures Cont. ■ If a procedure contains less than 10 steps, it should be presented in step format ■ If a procedure contains 10 steps or more, but few decisions, it should be presented in a graphical format or a hierarchical format ■ If a procedure requires many decisions, then it should be presented as a flowchart
  • 6. Copyright 2014 Pearson Education, Inc. 6 Standard Operating Procedures Cont. ■ After a procedure has been researched, documented, reviewed, and tested, it should be authorized by the process owner ■ The integrity of the SOP documents must be protected so that employees don’t follow instructions that have been maliciously tampered with
  • 7. Copyright 2014 Pearson Education, Inc. 7 Standard Operating Procedures Cont. ■ The change management process must be defined so that the SOPs mirror the evolution of the business processes ■ All revisions of the SOP documents must be reviewed and approved by the process owner
  • 8. Copyright 2014 Pearson Education, Inc. 8 Operational Change Control ■ Change control: Internal procedure by which only authorized changes are made to software, hardware, network access privileges, or business processes ■ Change control process ❑ Starts with a Request for Change (RFC) ❑ Description of the proposed change ❑ Justification why the change should be implemented ❑ Impact of not implementing the change ❑ Alternatives ❑ Cost ❑ Resource requirements and timeframe ❑ The change is then evaluated and if approved implemented
  • 9. Copyright 2014 Pearson Education, Inc. 9 Operational Change Control Cont. ■ Change control plan ❑ Developed after the change is approved ❑ Components ■ Security review to ensure no new vulnerabilities are introduced ■ Implementation instructions ■ Rollback and/or recovery options ■ Post implementation monitoring ■ Change must be communicated to all relevant parties ❑ Two categories of messages ■ Messages about the change ■ Messages how the change will impact employees ■ All actions should be documented throughout the implementation process
  • 10. Copyright 2014 Pearson Education, Inc. 10 Why Is Patching Handled Differently ■ Patch ❑ Software or code designed to fix a problem ■ Security patching is the primary method of fixing security vulnerabilities ■ Patches need to be applied quickly ■ Patch management ❑ The process of scheduling, testing, approving, and applying security patches ❑ Patching could be unpredictable and disruptive ❑ User should be notified of potential downtime
  • 11. Malware Protection ■ Malware ❑ Short for malicious software ❑ Software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems and mobile devices ❑ It can be bundled with other programs or self- replicated ❑ Typically requires user interaction Copyright 2014 Pearson Education, Inc. 11
  • 12. Malware Protection cont. ■ Malware categories ❑ Virus ❑ Worm ❑ Trojans ❑ Bots ❑ Ransomware ❑ Rootkits ❑ Spyware/adware ❑ Hybrid Copyright 2014 Pearson Education, Inc. 12
  • 13. How Is Malware Controlled ■ Prevention controls ❑ Stop an attack before it occurs ■ Detection controls ❑ Identify the presence of malware, alert the user, and prevent the malware from carrying out its mission Copyright 2014 Pearson Education, Inc. 13
  • 14. What Is Antivirus Software? ■ Used to detect, contain, and in some cases eliminate malicious software ■ Most AV software employs two techniques ❑ Signature-based recognition ❑ Behavior-based (heuristic) recognition Copyright 2014 Pearson Education, Inc. 14
  • 15. Copyright 2014 Pearson Education, Inc. 15 Data Replication ■ Data Replication ❑ The process of copying data to a second location that is available for immediate or near-time use ■ Data backup ❑ The process of copying and storing data that can be restored to its original location ■ Failure to back up threatens data availability and data integrity ❑ Lost/corrupt data can also have a negative impact on the company: ■ Financially ■ Legally ■ PR-wise
  • 16. Copyright 2014 Pearson Education, Inc. 16 Is There a Recommended Backup or Replication Strategy? ❑ The following aspects should be considered when the strategy is designed: ■ Reliability ■ Speed ■ Simplicity ■ Ease of use ■ Security of the stored information ❑ Backed-up or replicated data should be stored at an off-site location in an environment secured from theft, the elements, and natural disasters
  • 17. Copyright 2014 Pearson Education, Inc. 17 The Importance of Testing ❑ If the company relies on backup to protect data integrity and availability, then it needs to be sure that the information stored on the backup media is restorable in case of an incident ❑ Just as it is important that a backup would take place according to a set schedule, test restores should also be officially scheduled
  • 18. Copyright 2014 Pearson Education, Inc. 18 Securing Messaging ❑ E-mail is, by default, an insecure way to transmit information ❑ Unless optional encryption is added to the e-mail solution, no confidential information should EVER be sent via e-mail ❑ Inherently, e-mail does not employ ANY encryption, and all information sent is sent in clear text
  • 19. Copyright 2014 Pearson Education, Inc. 19 Securing Messaging Cont. ■ Employees should not commit any information to email that they would not feel comfortable writing on company letterhead ■ Employees must be trained to understand the risks and responsibilities associated with using e-mail as a business tool in a corporate environment
  • 20. Copyright 2014 Pearson Education, Inc. 20 Securing Messaging Cont. ■ Documents sent as e-mail attachments might contain more information than the sender intended to share ❑ Metadata ■ Details about a file that describes or identifies it, such as title, author name, subjects, and keywords ■ E-mail is an effective method of distributing malware ❑ Can be embedded in an attachment ❑ Sent as a hyperlink
  • 21. Copyright 2014 Pearson Education, Inc. 21 Securing Messaging Cont. ■ Incoming attachments may contain a malicious payload: ❑ Virus ❑ Worm ❑ Trojan ❑ Other malicious scripts ❑ Hoax ■ Users must be trained to be suspicious toward attachments ■ Access to personal email accounts should not be allowed from the corporate network
  • 22. Copyright 2014 Pearson Education, Inc. 22 Securing Messaging Cont. ■ Common e-mail-related mistakes ❑ Hitting the wrong button: using “reply all” as opposed to “reply” or “forward” instead of “reply” ❑ Sending an e-mail to the wrong e-mail address because it is close to the intended recipient’s ❑ Leaving an entire string of replies in an e-mail forwarded to a third person who should not have been privy to some of the information discussed in earlier e-mails ■ Training users is paramount to e-mail security
  • 23. Copyright 2014 Pearson Education, Inc. 23 Are E-Mail Servers at Risk? ■ Compromising the e-mail server ❑ Relay abuse ■ Involves using the mail server to distribute spam and malware ❑ A denial of service attack against an e-mail is an attack against the availability of the service ❑ The e-mail server should be set up so that it does not allow an open relay of SMTP traffic. Failure do to so implies two issues: ■ The e-mail server will be used by unscrupulous spammers ■ The domain name used for e-mail purposes will be blacklisted
  • 24. Activity Monitoring and Log Analysis ■ Log: A record of the vents occurring within an organization’s systems and networks ■ Almost every device and application on the network can log activity ■ Log management ❑ Configuring the log sources, including log generation, storage, and security ❑ Performing analysis of log data ❑ Initiating appropriate responses to identified events ❑ Managing the long-term storage of log data Copyright 2014 Pearson Education, Inc. 24
  • 25. Analyzing Logs ■ Log analysis techniques ❑ Correlation ❑ Sequencing ❑ Signature ❑ Trend analysis Copyright 2014 Pearson Education, Inc. 25
  • 26. Service Provider Oversight ■ Service providers include vendors, contractors, business partners and affiliates who store, process, transmit, or access company information on company information systems ■ Service providers internal controls should meet or exceed those of the contracting organization ■ Due diligence is the process used to assess the adequacy of service providers ■ SSAE16 audit reports are the most widely accepted due diligence documentation Copyright 2014 Pearson Education, Inc. 26
  • 27. Copyright 2014 Pearson Education, Inc. 27 Summary ■ Day-to-day activities can have a huge impact on the security of the network and the data it contains. SOPs are important in providing a consistent framework across the company. ■ Change must be managed. Two mandatory components of a change management process are RFC documents and a change control plan. ■ Malware is becoming the tool of choice for criminals to exploit devices, operating systems, applications, and user vulnerabilities. Many types of malware exist and companies should protect against them. ■ Sound backup strategies should be developed, tested, authorized and implemented. E-mail, while being a fantastic business tool, is also a double-edge sword because of its inherent lack of built-in security and must be treated as such. ■ Operational security extends to service providers. Service provider controls should meet or exceed those of the company.