SlideShare a Scribd company logo
CNIT 160:
Cybersecurity
Responsibilities
4. Information Security
Program Development
and Management

Part 5

Pages 275-296
• Security Program Operations
• Secure Engineering and Development
• Network Protection (p. 277)
• Endpoint Protection and Management 

(p. 288)
• Identity and Access Management (p. 292)
Topics
in this Lecture
• Security Program Operations
• Security Incident Management (p. 296)
• Security Awareness Training
• Managed Security Services Providers
• Data Security (p. 302)
• Business Continuity Planning
Chapter Topics
For Later Lectures
• IT Service Management (p. 322)
• Controls
• Metrics and Monitoring
• Continuous Improvement
Chapter Topics
For Later Lectures
Security Program Operations
Secure Engineering and Development
Role of Security
Management
• For decades, IT organizations employed no
security personnel
• Did not include security in design,
engineering, or development
• Now security should be invoved as early as
possible in development life cycle
Security in the Development
Cycle
• Consider data protection, regulations,
compliance, privacy and risk in each stage
• Conceptual
• Requirements
• Design
• Engineering and Development
• Testing
Computer Science
Programs
• None of the top ten require any security
class at all
• Many programs don't offer a single security
class as an option
Network Protection Topics
• Firewalls
• Application firewalls
• Intrusion prevention systems
• Network anomaly detection
• Packet sniffers
Network Protection Topics
(continued)
• Wireless network protection
• Web content filters
• Cloud access security broker
• DNS filter
• E-mail protection
• Network access control'
Firewalls
Firewalls
• Protect a network from
harmful traffic
• A DMZ (demilitarized
zone) is a semi-trusted
network
• For public servers
• Like Web and E-mail
servers
Firewall Rules
Application firewalls
• Control traffic to an application server
• Usually a web server
• Block attacks like SQL injection
Segmentation
• Partitioning a network into zones
• Layers of security: defense in depth
Intrusion Prevention
Systems
• Block malicious traffic
• By recognizing packet contents, or
• Known malicious IP addresses and
domains
• Include feeds of malicious data
• Threat intel feed
• Require vigilance
• May block useful traffic
Network Anomaly Detection
• Learns what normal traffic is like
• Alerts when unusual patterns of traffic flow
are detected
Network Anomaly
Standards
• Netflow from Cisco
• sFlow
• Remote Monitoring (RMON)
• An earlier protocol
Network Taps and Span
Ports
• Devices that send a copy of all packets
• to a monitoring system
Packet Sniffers
• Allow an analyst to see all traffic at a point
• Helpful filtering and packet dissection
features
• Wireshark is the leading tool
Wireless Network
Protection
• WEP is old and vulnerable
• WPA and WPA2 are much better
• Rogue access points
• Often set up by employees
• Not secure enough to satisfy security
policy
• A common attack point
Web Content Filters
• Block malicious sites
• Preventing employees from using them
• Block categories
• Games, porn, social networks, etc.
• Inline device only works on company
network
• Software agent on endpoint works in every
location
Cloud Access Security
Broker (CASB)
• Monitors and controls access to Internet
sites
• Example: your company uses Box, so it
blocks Dropbox
• Resembles web content filter
DNS Filter
• Block content by manipulating DNS queries
and responses
• Prevents access to known malicious sites
and other unwanted content
• Works on all DNS-based traffic, not just
web browsing
E-mail Protection
• Over 90% of successful network intrusions
• Begin with phishing messages
• CEO fraud targets executives
• May carry ransomware
Spam and Phishing Filters
• Use rules
• Quarantine blocked e-mails
• User can view and release them
• White lists and black lists
Types of Phishing
• Clone phishing
• Copying a legitimate email and modifying it
• Phishing
• Smishing (over SMS)
• Spear phishing
• Specially crafted to target
• Spim (via instant messaging)
• Whaling
• Targeting CEO or other key executive
Phishing Testing
• Sending fake phishing messages to test
employee's awareness
• Useful measure of vulnerability
Network Access Control
• Only allow certain devices to connect
Ch 4b
Endpoint Protection and
Management
Endpoint
• Smartphone
• Tablet
• Laptop
• Desktop computer
Reasons Attackers Target
Endpoints
• Often contain sensitive information
• Easily lost or stolen
• Often lack up-to-date anti-malware
protection
• Permitted to access internal company
networks
Reasons Attackers Target
Endpoints (continued)
• Users often open phishing attachments
• May lack current security patches
• Users may have local administrator
privileges
• May be powerful devices on fast networks
• Useful for sending spam or DDoS attacks
Configuration Management
• Image management
• Binary representation of a fully installed
and configured endpoint computer
• Configuration management
• Automated tools to deploy patches,
change configuration settings, and install
and remove software
Configuration Management
(continued)
• Remote control
• For assistance, troubleshooting, and
more
• Remote destruction (wipe)
• Data encryption
• Full-disk encryption
• Protects data stored on a mobile device
from a thief
Configuration Standards
• Documents that detail the operational and
security configuration for endpoints
• May also have a hardening document
Malware Prevention
Types of Malware
• Virus
• Attaches to EXE files (old, not common now)
• Trojan
• Deceives the user, pretending to be
something harmless like a game
• Macro
• Program within an document
• Usually MS Office (Excel, Word, etc.)
Types of Malware
(continued)
• Rootkit
• Hidden within the operating system
• Difficult to detect and remove
• Fileless
• Memory-resident
• Difficult for antivirus to detect
• Ransomware
• Encrypts files and demands payment
Types of Malware
(continued)
• Destructware
• Wipes or encrypts files to destroy them
• Remote Access Trojan (RAT)
• Keylogger
Anti-Malware Techniques
• Signatures
• Matches known byte patterns
• Process observation
• Detects suspicious behavior
• Sandbox
• Runs files in a virtual system to detect
malicious behevior
Deception
• Scrambles the memory map to block
malware attacks
The Death ot AV
• Traditional antivirus software using
signatures is much less effective now
• Malware can use packing to change the
signatures
Virtual Desktop
Infrastructure (VDI)
• Users connect to a desktop operating
system in the cloud
• Such as Azure
• All processing and data reside in the cloud
• Far smaller attack surface
Enterprise Anti-Malware
• Centralized console
• Allows engineers to observe and manage
anti-malware running on thousands of
endpoints
• Can run scans, reinstall anti-malware,
change configurations
• Can send alerts to SIEM systems or SOC
personnel when malware is detected
End-User Administrator
Rights
• Most users ran Windows XP as
Administrator all the time
• Microsoft's User Account Control is a safer
system
• User has limited privileges
• Only escalates briefly to administrator
when installing software
Security Program Operations
Identity and Access Management
Credentials
• In the past, when organizations had few
business applications
• Users had separate credentials for each app
• But as more apps were used, like cloud services
• Users had to remember too many passwords
• So they'd re-use passwords, or store them
insecurely
• And there were many password resets to
manage
Central Identity and Access
Management
• Reduced sign on or single sign-on
• Employees only need one password
• Easily locked out when an employee
leaves
• But that makes the password a high-value
theft target
• Solution: Multifactor authentication
Access Operations
Less Routine Events
Access Governance
• Ensuring that user accounts conform to
policy
• Access Reviews
• Segregation of Duties
• Priviliged Account Audits
• Activity Reviews
• Access Recertification
• User Behavior Analytics
Access Reviews
• Comfirm that all workers who need access
have it
• And that others do not
• Required by some regulations
Accumulation of Privileges
• Long-term employees move from one
position to another
• And may keep access from old role
• Difficult to prevent
• User may still be working with the
previous department
Segregation of Duties
• A single individual cannot perform a high-
risk action
• A second person must also take action
• Example: create a vendor, request
payment, approve payment
• Must be handled by different people
Segregation of Duties
Access Review
• Examine user rights to high-risk and high-
value roles
• Make sure no one person has two roles in
the same function
• If there are not enough personnel for true
segregation of duties
• Make reviews more frequent to
compensate
Priviliged Account Audits
• Audit the personnel approved for high
privileges
• Like Administrator or Domain Admin
• Limit the roles to the smallest number of
people possible
Activity Reviews
• Which users are active?
• Identify accounts that have been inactive
for a long time (such as 90 days)
• Remove or lock them
• This helps to reduce accumulation of
privilege
Access Recertification
• List users and roles
• Determine whether access is still required
• This helps to reduce accumulation of
privilege
User Behavior Analytics
• User activities are baselines
• Anomalous activity triggers events or
alarms
• May indicate unauthorized activity by users
• Or compromised accounts
Ch 4b

More Related Content

What's hot

7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
Sam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
Sam Bowne
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
Sam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
Sam Bowne
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
Sam Bowne
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
Sam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
Sam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
Karthikeyan Dhayalan
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
Sam Bowne
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
Karthikeyan Dhayalan
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
Sam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
Sam Bowne
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
Karthikeyan Dhayalan
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Sam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Sam Bowne
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
Sam Bowne
 

What's hot (20)

7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 

Similar to CNIT 160 4e Security Program Management (Part 5)

Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
David Lindner
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
Kabul Education University
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
ArthyR3
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
Precisely
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
Brian Pichman
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
Priyanka Aash
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
Muhib Ahmad Sherwani
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
Sam Bowne
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
Joel Aleburu
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
Precisely
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
 
Securing the cloud and your assets
Securing the cloud and your assetsSecuring the cloud and your assets
Securing the cloud and your assets
Marcus Dempsey
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
Scott Carlson
 

Similar to CNIT 160 4e Security Program Management (Part 5) (20)

Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Securing the cloud and your assets
Securing the cloud and your assetsSecuring the cloud and your assets
Securing the cloud and your assets
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 

More from Sam Bowne

Cyberwar
CyberwarCyberwar
Cyberwar
Sam Bowne
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne
 
10 RSA
10 RSA10 RSA
10 RSA
Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 

Recently uploaded (20)

Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 

CNIT 160 4e Security Program Management (Part 5)

  • 1. CNIT 160: Cybersecurity Responsibilities 4. Information Security Program Development and Management Part 5 Pages 275-296
  • 2. • Security Program Operations • Secure Engineering and Development • Network Protection (p. 277) • Endpoint Protection and Management 
 (p. 288) • Identity and Access Management (p. 292) Topics in this Lecture
  • 3. • Security Program Operations • Security Incident Management (p. 296) • Security Awareness Training • Managed Security Services Providers • Data Security (p. 302) • Business Continuity Planning Chapter Topics For Later Lectures
  • 4. • IT Service Management (p. 322) • Controls • Metrics and Monitoring • Continuous Improvement Chapter Topics For Later Lectures
  • 5. Security Program Operations Secure Engineering and Development
  • 6. Role of Security Management • For decades, IT organizations employed no security personnel • Did not include security in design, engineering, or development • Now security should be invoved as early as possible in development life cycle
  • 7. Security in the Development Cycle • Consider data protection, regulations, compliance, privacy and risk in each stage • Conceptual • Requirements • Design • Engineering and Development • Testing
  • 8. Computer Science Programs • None of the top ten require any security class at all • Many programs don't offer a single security class as an option
  • 9. Network Protection Topics • Firewalls • Application firewalls • Intrusion prevention systems • Network anomaly detection • Packet sniffers
  • 10. Network Protection Topics (continued) • Wireless network protection • Web content filters • Cloud access security broker • DNS filter • E-mail protection • Network access control'
  • 12. Firewalls • Protect a network from harmful traffic • A DMZ (demilitarized zone) is a semi-trusted network • For public servers • Like Web and E-mail servers
  • 14. Application firewalls • Control traffic to an application server • Usually a web server • Block attacks like SQL injection
  • 15. Segmentation • Partitioning a network into zones • Layers of security: defense in depth
  • 16. Intrusion Prevention Systems • Block malicious traffic • By recognizing packet contents, or • Known malicious IP addresses and domains • Include feeds of malicious data • Threat intel feed • Require vigilance • May block useful traffic
  • 17. Network Anomaly Detection • Learns what normal traffic is like • Alerts when unusual patterns of traffic flow are detected
  • 18. Network Anomaly Standards • Netflow from Cisco • sFlow • Remote Monitoring (RMON) • An earlier protocol
  • 19. Network Taps and Span Ports • Devices that send a copy of all packets • to a monitoring system
  • 20. Packet Sniffers • Allow an analyst to see all traffic at a point • Helpful filtering and packet dissection features • Wireshark is the leading tool
  • 21. Wireless Network Protection • WEP is old and vulnerable • WPA and WPA2 are much better • Rogue access points • Often set up by employees • Not secure enough to satisfy security policy • A common attack point
  • 22. Web Content Filters • Block malicious sites • Preventing employees from using them • Block categories • Games, porn, social networks, etc. • Inline device only works on company network • Software agent on endpoint works in every location
  • 23. Cloud Access Security Broker (CASB) • Monitors and controls access to Internet sites • Example: your company uses Box, so it blocks Dropbox • Resembles web content filter
  • 24. DNS Filter • Block content by manipulating DNS queries and responses • Prevents access to known malicious sites and other unwanted content • Works on all DNS-based traffic, not just web browsing
  • 25. E-mail Protection • Over 90% of successful network intrusions • Begin with phishing messages • CEO fraud targets executives • May carry ransomware
  • 26. Spam and Phishing Filters • Use rules • Quarantine blocked e-mails • User can view and release them • White lists and black lists
  • 27. Types of Phishing • Clone phishing • Copying a legitimate email and modifying it • Phishing • Smishing (over SMS) • Spear phishing • Specially crafted to target • Spim (via instant messaging) • Whaling • Targeting CEO or other key executive
  • 28. Phishing Testing • Sending fake phishing messages to test employee's awareness • Useful measure of vulnerability
  • 29. Network Access Control • Only allow certain devices to connect
  • 30. Ch 4b
  • 32. Endpoint • Smartphone • Tablet • Laptop • Desktop computer
  • 33. Reasons Attackers Target Endpoints • Often contain sensitive information • Easily lost or stolen • Often lack up-to-date anti-malware protection • Permitted to access internal company networks
  • 34. Reasons Attackers Target Endpoints (continued) • Users often open phishing attachments • May lack current security patches • Users may have local administrator privileges • May be powerful devices on fast networks • Useful for sending spam or DDoS attacks
  • 35. Configuration Management • Image management • Binary representation of a fully installed and configured endpoint computer • Configuration management • Automated tools to deploy patches, change configuration settings, and install and remove software
  • 36. Configuration Management (continued) • Remote control • For assistance, troubleshooting, and more • Remote destruction (wipe) • Data encryption • Full-disk encryption • Protects data stored on a mobile device from a thief
  • 37. Configuration Standards • Documents that detail the operational and security configuration for endpoints • May also have a hardening document
  • 39. Types of Malware • Virus • Attaches to EXE files (old, not common now) • Trojan • Deceives the user, pretending to be something harmless like a game • Macro • Program within an document • Usually MS Office (Excel, Word, etc.)
  • 40. Types of Malware (continued) • Rootkit • Hidden within the operating system • Difficult to detect and remove • Fileless • Memory-resident • Difficult for antivirus to detect • Ransomware • Encrypts files and demands payment
  • 41. Types of Malware (continued) • Destructware • Wipes or encrypts files to destroy them • Remote Access Trojan (RAT) • Keylogger
  • 42. Anti-Malware Techniques • Signatures • Matches known byte patterns • Process observation • Detects suspicious behavior • Sandbox • Runs files in a virtual system to detect malicious behevior
  • 43. Deception • Scrambles the memory map to block malware attacks
  • 44. The Death ot AV • Traditional antivirus software using signatures is much less effective now • Malware can use packing to change the signatures
  • 45. Virtual Desktop Infrastructure (VDI) • Users connect to a desktop operating system in the cloud • Such as Azure • All processing and data reside in the cloud • Far smaller attack surface
  • 46. Enterprise Anti-Malware • Centralized console • Allows engineers to observe and manage anti-malware running on thousands of endpoints • Can run scans, reinstall anti-malware, change configurations • Can send alerts to SIEM systems or SOC personnel when malware is detected
  • 47. End-User Administrator Rights • Most users ran Windows XP as Administrator all the time • Microsoft's User Account Control is a safer system • User has limited privileges • Only escalates briefly to administrator when installing software
  • 48. Security Program Operations Identity and Access Management
  • 49. Credentials • In the past, when organizations had few business applications • Users had separate credentials for each app • But as more apps were used, like cloud services • Users had to remember too many passwords • So they'd re-use passwords, or store them insecurely • And there were many password resets to manage
  • 50. Central Identity and Access Management • Reduced sign on or single sign-on • Employees only need one password • Easily locked out when an employee leaves • But that makes the password a high-value theft target • Solution: Multifactor authentication
  • 53. Access Governance • Ensuring that user accounts conform to policy • Access Reviews • Segregation of Duties • Priviliged Account Audits • Activity Reviews • Access Recertification • User Behavior Analytics
  • 54. Access Reviews • Comfirm that all workers who need access have it • And that others do not • Required by some regulations
  • 55. Accumulation of Privileges • Long-term employees move from one position to another • And may keep access from old role • Difficult to prevent • User may still be working with the previous department
  • 56. Segregation of Duties • A single individual cannot perform a high- risk action • A second person must also take action • Example: create a vendor, request payment, approve payment • Must be handled by different people
  • 57. Segregation of Duties Access Review • Examine user rights to high-risk and high- value roles • Make sure no one person has two roles in the same function • If there are not enough personnel for true segregation of duties • Make reviews more frequent to compensate
  • 58. Priviliged Account Audits • Audit the personnel approved for high privileges • Like Administrator or Domain Admin • Limit the roles to the smallest number of people possible
  • 59. Activity Reviews • Which users are active? • Identify accounts that have been inactive for a long time (such as 90 days) • Remove or lock them • This helps to reduce accumulation of privilege
  • 60. Access Recertification • List users and roles • Determine whether access is still required • This helps to reduce accumulation of privilege
  • 61. User Behavior Analytics • User activities are baselines • Anomalous activity triggers events or alarms • May indicate unauthorized activity by users • Or compromised accounts
  • 62. Ch 4b