This document discusses several topics related to network security, including change control and outsourcing. It begins with an overview of network security and how it differs from computer security by protecting entry points and shared resources from attacks. Key aspects of network security are then defined, such as authentication, authorization, firewalls, intrusion prevention systems, antivirus software, honeypots, and security management approaches for small, medium, and large businesses as well as educational institutions and government. Change control processes and their importance for information security are also outlined. Finally, outsourcing related security issues and potential threats are identified along with some countermeasures for addressing them.
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Digital Bond
The Control System Security Center (CSSC) in Japan has an active project in their lab to apply process white list control and computer resource access control to Windows servers and workstations in an ICS. These security controls can be very effective in ICS computers that are relatively static as compared to corporate network systems.
The process white list control limits process creation with parent-child relation, SHA1 hash value of an executable file, and conflict of interest. The computer resource access control limits access from a process to file, network (IP address and port), and device. Attend this session learn how CSSC is applying this technology and lessons learned in the lab environment.
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
This session will cover the pro's and con's of virtualization as well as lessons learned from real world virtualization of DCS environments. Chris has deployed virtualization in ICS with and without ICS vendor cooperation.
Complete coverage of CISSP 7th Chapter - Security Operations. I have made sure to cover all topics from three books in this presentation. For corrections, clarifications, please feel free to reach me.
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Digital Bond
The Control System Security Center (CSSC) in Japan has an active project in their lab to apply process white list control and computer resource access control to Windows servers and workstations in an ICS. These security controls can be very effective in ICS computers that are relatively static as compared to corporate network systems.
The process white list control limits process creation with parent-child relation, SHA1 hash value of an executable file, and conflict of interest. The computer resource access control limits access from a process to file, network (IP address and port), and device. Attend this session learn how CSSC is applying this technology and lessons learned in the lab environment.
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
This session will cover the pro's and con's of virtualization as well as lessons learned from real world virtualization of DCS environments. Chris has deployed virtualization in ICS with and without ICS vendor cooperation.
Complete coverage of CISSP 7th Chapter - Security Operations. I have made sure to cover all topics from three books in this presentation. For corrections, clarifications, please feel free to reach me.
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Digital Bond
Each SCADA network, in a healthy state, presents a specific quality of service (QoS) which rarely changes given the repetitive process of the IACS operations. The continuous monitoring of QoS parameters of an automation network may anticipate problems such as malware contamination and equipment failures like switches and routers. It is very important to be aware of these changes in behavior in order to receive alerts and promptly handle them, avoiding incidents that could compromise the operation of the network and be financially or environmentally costly.
In this session Mr. Branquinho presents the results of tests to measure the performance of a simulated automation network parameters using a small SCADA network sandbox. First, the normal operating parameters of the network were measured. Next, several attacks were launched against the simulated automation network. At the conclusion of the work the graphs of the network in healthy state with the graphs of the network with the security incidents described above. The session will show how the network parameters were affected by each kind of incident and built a table showing the way the main parameters of an automation network were affected by the attacks.
Social Distance Your IBM i from Cybersecurity RiskPrecisely
The continuous news of personal information stolen from major retailers and financial institutions have driven consumers and regulatory bodies to demand that more action be taken to ensure data protection and privacy. Regulations such as PCI DSS, HIPAA, GDPR, and FISMA require that personal data be protected against unauthorized access using technologies like encryption, tokenization, masking, secure file transfer and more. With all the options available for securing IBM i data at rest and in motion, how do you know where to begin?
Register to get up to speed on the key concepts you need to know about assuring data privacy for your customers, business partners and employees.
Topics will include:
- Protecting data with encryption and the need for strong key management
- Use Cases that are best for tokenization
- Options for permanently deidentifying data
- Securing data in motion across networks
- Complete security solution for IBM I (AS/400)
Learn more about how organizations prevented downtime with #BigFix in the wake of #wannacry. References and Use Cases along with a review of our BigFix Solution.
https://www.ibm.com/connect/ibm/ca-en/resources/tomjs/
Basic Security Concepts of Computer, this presentation will cover the following topics
BASIC SECURITY CONCEPT OF COMPUTER.
THREATS.
THREATS TO COMPUTER HARDWARE.
THREATS TO COMPUTER USER.
THREATS TO COMPUTER DATA.
VULNERABILITY AND COUNTERMEASURE.
SOFTWARE SECURITY.
Data Security discusses about various practices, policies and security measures used for ensuring virtual and physical protection of a Data Center Facility
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
Presented: BSidesDC 2015, Washington, DC, October 18, 2015
YouTube Video @ https://youtu.be/v3LBywLthjY
Determining the overall health and security of an industrial control system (ICS) network is currently done by looking at the negative case. If the network infrastructure devices indicate that all the devices are connected and communicating, then the network must be operating correctly. If the controllers indicate that they are able to communicate with the other devices in the system, then the system must be operating correctly. If the network security monitoring (NSM) or security information and event management (SIEM) system are not indicating any security events, then the system must be operating correctly. In each of these cases, the assumption is that the system is operating correctly if there are no errors or events being indicated by any of the devices. In reality, the actual health and security of the system can only be determined by positive conditions. The communication streams need to be measured to determine that they are operating within certain limits based upon a desires set of conditions, like rate and maximum latency. Many controllers keep track of these factors for real-time communications, however they are often only recorded as averages and not high-fidelity measurements.
This paper presents an approach to analyzing the real-time network traffic performance of an ICS by measuring the jitter and latency associated with individual network traffic streams in the system. By using statistical and mathematical analysis of the high-fidelity jitter and latency data, a network reliability factor can be determined and used to indicate the health of those traffic streams. The author will present a method to combine the individual network reliability factors into a network reliability monitoring system. Lastly, the author will discuss how network reliability monitoring can be used to indicate potential security problems by observing the network traffic patterns.
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
Presented @ 2016 ISA Process Control & Safety Symposium, November 10, 2016
The exchange of key information between business operations, suppliers, customers, production, and ultimately the production equipment itself can provide significant financial and productivity advantages. This presentation will discuss some practical approaches to utilizing the cyber security principles from ISA/IEC 62443 in order to integrate the business and production environments. It will also present some of the different solutions for meeting a variety of scenarios, such as data historians, patching/updating, and remote maintenance.
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
This presentation reviews the spectrum of perimeter solutions based on unidirectional technology - solutions that are being deployed to protect the safety and reliability of industrial control systems. Learn why the technology is truly unidirectional based on physics and different ways it can be used in SCADA and DCS.
Many practitioners find parts of the spectrum to be counter-intuitive. Further, some parts of the spectrum are straightforward to deploy, and others require that practitioners take some care to ensure that the results really are as strong as they should be. Technologies and techniques covered include unidirectional gateways, secure bypass, temporary/programmed gateway reversals, opposing gateways, secure remote access, and parallel operations and IT WANs.
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
Donovan Tindall of Honeywell at the S4x15 Operations Technology Day (OTDay). A meaty, but practical technical session on how to use Active Directory to help manage and secure your ICS.
Inductive Automation’s Co-Director of Sales Engineering Kevin McClusky (presenter) and Chief Strategy Officer Don Pearson (moderator) discusses a prevention-focused approach that encompasses physical security as well as cybersecurity. As you’ll learn, an effective SCADA security plan doesn’t just safeguard the platform itself but also each network, device, and database connection.
Learn more about:
- Phishing and other common attack vectors
- Guarding against internal threats
- Locking down your operating system
- Leveraging encryption effectively
- Using Java safely
- Applying security guidelines in the Ignition industrial application platform
- And much more
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Digital Bond
Each SCADA network, in a healthy state, presents a specific quality of service (QoS) which rarely changes given the repetitive process of the IACS operations. The continuous monitoring of QoS parameters of an automation network may anticipate problems such as malware contamination and equipment failures like switches and routers. It is very important to be aware of these changes in behavior in order to receive alerts and promptly handle them, avoiding incidents that could compromise the operation of the network and be financially or environmentally costly.
In this session Mr. Branquinho presents the results of tests to measure the performance of a simulated automation network parameters using a small SCADA network sandbox. First, the normal operating parameters of the network were measured. Next, several attacks were launched against the simulated automation network. At the conclusion of the work the graphs of the network in healthy state with the graphs of the network with the security incidents described above. The session will show how the network parameters were affected by each kind of incident and built a table showing the way the main parameters of an automation network were affected by the attacks.
Social Distance Your IBM i from Cybersecurity RiskPrecisely
The continuous news of personal information stolen from major retailers and financial institutions have driven consumers and regulatory bodies to demand that more action be taken to ensure data protection and privacy. Regulations such as PCI DSS, HIPAA, GDPR, and FISMA require that personal data be protected against unauthorized access using technologies like encryption, tokenization, masking, secure file transfer and more. With all the options available for securing IBM i data at rest and in motion, how do you know where to begin?
Register to get up to speed on the key concepts you need to know about assuring data privacy for your customers, business partners and employees.
Topics will include:
- Protecting data with encryption and the need for strong key management
- Use Cases that are best for tokenization
- Options for permanently deidentifying data
- Securing data in motion across networks
- Complete security solution for IBM I (AS/400)
Learn more about how organizations prevented downtime with #BigFix in the wake of #wannacry. References and Use Cases along with a review of our BigFix Solution.
https://www.ibm.com/connect/ibm/ca-en/resources/tomjs/
Basic Security Concepts of Computer, this presentation will cover the following topics
BASIC SECURITY CONCEPT OF COMPUTER.
THREATS.
THREATS TO COMPUTER HARDWARE.
THREATS TO COMPUTER USER.
THREATS TO COMPUTER DATA.
VULNERABILITY AND COUNTERMEASURE.
SOFTWARE SECURITY.
Data Security discusses about various practices, policies and security measures used for ensuring virtual and physical protection of a Data Center Facility
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
Presented: BSidesDC 2015, Washington, DC, October 18, 2015
YouTube Video @ https://youtu.be/v3LBywLthjY
Determining the overall health and security of an industrial control system (ICS) network is currently done by looking at the negative case. If the network infrastructure devices indicate that all the devices are connected and communicating, then the network must be operating correctly. If the controllers indicate that they are able to communicate with the other devices in the system, then the system must be operating correctly. If the network security monitoring (NSM) or security information and event management (SIEM) system are not indicating any security events, then the system must be operating correctly. In each of these cases, the assumption is that the system is operating correctly if there are no errors or events being indicated by any of the devices. In reality, the actual health and security of the system can only be determined by positive conditions. The communication streams need to be measured to determine that they are operating within certain limits based upon a desires set of conditions, like rate and maximum latency. Many controllers keep track of these factors for real-time communications, however they are often only recorded as averages and not high-fidelity measurements.
This paper presents an approach to analyzing the real-time network traffic performance of an ICS by measuring the jitter and latency associated with individual network traffic streams in the system. By using statistical and mathematical analysis of the high-fidelity jitter and latency data, a network reliability factor can be determined and used to indicate the health of those traffic streams. The author will present a method to combine the individual network reliability factors into a network reliability monitoring system. Lastly, the author will discuss how network reliability monitoring can be used to indicate potential security problems by observing the network traffic patterns.
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
Presented @ 2016 ISA Process Control & Safety Symposium, November 10, 2016
The exchange of key information between business operations, suppliers, customers, production, and ultimately the production equipment itself can provide significant financial and productivity advantages. This presentation will discuss some practical approaches to utilizing the cyber security principles from ISA/IEC 62443 in order to integrate the business and production environments. It will also present some of the different solutions for meeting a variety of scenarios, such as data historians, patching/updating, and remote maintenance.
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
This presentation reviews the spectrum of perimeter solutions based on unidirectional technology - solutions that are being deployed to protect the safety and reliability of industrial control systems. Learn why the technology is truly unidirectional based on physics and different ways it can be used in SCADA and DCS.
Many practitioners find parts of the spectrum to be counter-intuitive. Further, some parts of the spectrum are straightforward to deploy, and others require that practitioners take some care to ensure that the results really are as strong as they should be. Technologies and techniques covered include unidirectional gateways, secure bypass, temporary/programmed gateway reversals, opposing gateways, secure remote access, and parallel operations and IT WANs.
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
Donovan Tindall of Honeywell at the S4x15 Operations Technology Day (OTDay). A meaty, but practical technical session on how to use Active Directory to help manage and secure your ICS.
Inductive Automation’s Co-Director of Sales Engineering Kevin McClusky (presenter) and Chief Strategy Officer Don Pearson (moderator) discusses a prevention-focused approach that encompasses physical security as well as cybersecurity. As you’ll learn, an effective SCADA security plan doesn’t just safeguard the platform itself but also each network, device, and database connection.
Learn more about:
- Phishing and other common attack vectors
- Guarding against internal threats
- Locking down your operating system
- Leveraging encryption effectively
- Using Java safely
- Applying security guidelines in the Ignition industrial application platform
- And much more
Inductive Automation’s Co-Director of Sales Engineering Kevin McClusky (presenter) and Chief Strategy Officer Don Pearson (moderator) discusses a prevention-focused approach that encompasses physical security as well as cybersecurity. As you’ll learn, an effective SCADA security plan doesn’t just safeguard the platform itself but also each network, device, and database connection.
Learn more about:
- Phishing and other common attack vectors
- Guarding against internal threats
- Locking down your operating system
- Leveraging encryption effectively
- Using Java safely
- Applying security guidelines in the Ignition industrial application platform
- And much more
A single change to a network device can have a far reaching effect on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!
This technical webinar will walk you a variety of use cases where device misconfigurations typically occur, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:
* Understand and map your enterprise infrastructure topology before you make a change
* Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
* Common mistakes to avoid when making changes to your network security devices
* How to better understand business requirements from the network security perspective
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
In today's ever-evolving cybersecurity landscape, organizations face an increasing number of threats. Conducting a NIST Cybersecurity Framework (CSF) assessment can be a valuable tool to identify, manage, and mitigate these risks. Let's explore how it can benefit your organization.
A NIST CSF assessment is not just about compliance; it's about proactively managing your cybersecurity posture. By identifying and addressing your vulnerabilities, you can reduce the likelihood and impact of cyberattacks. Additionally, the framework can help you communicate your security efforts effectively to internal and external stakeholders.
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
Today, is Information Systems 371, I am lecturing about Decision Support Systems. In addition to covering the basics at a conceptual level, I am trying to get the students to think about the impact of IoT, 5G, and Artificial Intelligence, in terms of how Decision Support Systems are changing and what the new demands placed upon them will be.
During the Spring semester, I teach a 3 credit survey course in software development, at UW-Madison (IS 371), which is the first in the series of courses in the Information Systems major track. As part of this course, I devote an entire lecture to discussing different types of software development (Agile, Waterfall, Extreme, Spiral, etc.) I hope it helps the students better understand the different types of software development styles, as well as the benefits and drawbacks of each. In my opinion, they need to learn early on that there is more than one way to go about a software development challenge, and they need to figure out which style works best for them.
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
Today, in class, I will be covering the topics of Cloud and BYOD Information Security. The intent of the lecture is to introduce students to the general issues surrounding information security in these two areas.
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
This is the security awareness presentation which I will be giving to Quartz Health Solutions, on October 24, 2018. If focuses in on three areas: information security best practices for work, at home, and also contains some tips for kids. Topics include: PHI, ePHI, HIPAA, Identity Theft, Social Engineering, phishing, password management, malware, insider threats, social networks, and mobile devices.
A presentation about cyberwar basics, the past, present and future directions of cyberwar and some needed changes in technology and long standing societal attitudes, to combat this escalating threat
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
Last day of lecture, a summary presentation of everything the students learned this semester, in the information security class I teach at the University of Wisconsin-Madison
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
Absorbing information does no good, unless you are able to apply what you have learned. Each semester, I give my information security students a team project, in which they must use all the knowledge acquired during the semester, in combination with their ability to do Internet research, to deliver an overall information security assessment of a company of their choosing. To make it a challenge, I make them grade all the other teams in the class, but only give them enough points to distribute so that the average is 90. In grading their peers, they must make decisions about which presentations are excellent, and which are not.
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
Horrible things happen on the Deep Web. It is important for information security professionals to know about this topic, so that we can help to stop the problem. Silence is acquiescence----If you see something horribly wrong, you have got to speak up and be part of the solution to stop it. Contact the FBI or local law enforcement.
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
The final assignment in the Information Security 365/765 course I teach at UW-Madison, is for teams of students to put together company focused IT security presentations, in which they take the concepts learned in class throughout the entire semester, and apply them to a real company. Here is a sample from Team Netflix! I am proud of the students, and feel that they have gained a solid foundation in the field of information security. Another semester come and gone!
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
This presentation is a summary, for the students of the IS 365/765 course I teach, at the University of Wisconsin-Madison, providing a 104 slide reminder of the most important topics in Information Security, which we covered throughout the semester. Today is the last day of course material. We have 4 days of student team presentations, to follow.
A general education presentation, created to teach employees of an organization about Phishing, what it is, how to recognize it, avoid becoming a phishing victim, how to recognize common social engineering techniques, and what to do if you think you have been phished.
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
Today's topic in the Information Security 365/765 class, which I teach at the University of Wisconsin-Madison.
Computer crimes and computer laws, Motives and profiles of attackers, Various types of evidence, Laws and acts to fight computer crime, Computer crime investigation process, Incident handling procedures, Ethics and best practices
2. Today’s Chocolate Bar
Snickers – AGAIN!
• In 1930, the
Mars family
introduced its
second
product,
Snickers,
named after
one of their
favorite horses
• Snickers is the
best selling
chocolate bar
of all time and
has annual
global sales of
US$2 billion
3. Nutty Cisco Video
• Watch video
• Think about what you would
do to protect you server area,
using your knowledge gained
so far in the class
• Split into groups of four, come
up with a mini presentation
• Talk to class for 3 minutes
4. Network Security
• Why didn’t we talk about this
on day one?
• Bringing it all together
• protect the network and the
network-accessible resources
from unauthorized access and
consistent and continuous
monitoring and measurement
of its effectiveness
5. Network Security vs. Computer
Security
• Securing network
infrastructure is like securing
possible entry points of
attacks on a country by
deploying appropriate
defense.
• Computer security is more like
providing means to protect a
single PC against outside
intrusion.
6. Network Security
• Prevents users from ever
being exposed to attacks
• Protection of all entry points
and shared resources
• Printers, Network attached
storage (NAS), Iphones, etc.
• Attacks stop at entry points,
BEFORE they spread
7. Computer Security
• Focused on an individual host
• A computer’s security is
vulnerable to people who have
higher access privileges than
the protection mechanism.
• While this is also true with
Network Security, it is less
likely.
8. Attributes Of A Secure Network
• Authentication
• Authorization
• Firewall
• Intrusion Prevention System
• Antivirus
• Honeypots
• Monitoring
10. Authorization
• Determining the level of
access that a given individual
should have
• Authorization is done after
authentication
11. Firewall
• An integrated collection of
security measures designed to
prevent unauthorized
electronic access to a
networked computer system.
It is also a device or set of
devices configured to permit,
deny, or proxy all computer
traffic between different
security domains based upon
a set of rules and other
criteria.
12. Intrusion Prevention System
• An intrusion prevention
system is a network security
device that monitors network
and/or system activities for
malicious or unwanted
behavior and can react, in
real-time, to block or prevent
those activities.
13. Antivirus and Anti-Malware
• Scans and cleanses data in
storage and as it travels
across the network, so end
users are not exposed to this
type of threat
14. Honeypots
• Essentially decoy network-
accessible resources, could be
deployed in a network as
surveillance and early-warning
tools.
15. Security Management
• Depends on environment
• Small, medium and large
businesses, educational
institutions, government.
16. Small Business
• A basic firewall.
• For Windows users, basic antivirus
and anti-spyware/anti-malware
software.
• When using a wireless connection,
use a robust password.
• Use the strongest security
supported by your wireless
devices, such as WPA or WPA2.
17. Medium Business
• A strong firewall
• Strong Antivirus software and
Internet Security Software.
• For authentication, use strong
passwords and change it on a
monthly basis.
• When using a wireless connection,
use a robust password.
• Raise awareness about physical
security to employees.
• Use an optional network analyzer
or network monitor.
18. Large Business
• A strong firewall and proxy to keep
unwanted people out.
• A strong Antivirus software
package and Internet Security
Software package.
• For authentication, use strong
passwords and change it on a
weekly/bi-weekly basis.
• When using a wireless connection,
use a robust password.
• Exercise physical security
precautions to employees.
19. Large Business
• Prepare a network analyzer or network
monitor and use it when needed.
• Implement physical security
management like closed circuit television
for entry areas and restricted zones.
• Security fencing to mark the company's
perimeter.
• Fire extinguishers for fire-sensitive areas
like server rooms and security rooms.
• Security guards can help to maximize
security.
20. Educational Institutions
• An adjustable firewall
• Strong Antivirus software and Internet
Security Software packages.
• Wireless connections that lead to
firewalls.
• Children's Internet Protection Act
compliance.
• Supervision of network to guarantee
updates and changes based on popular
site usage.
• Constant supervision by teachers,
librarians, and administrators to
guarantee protection against attacks by
both internet and sneakernet sources.
21. Federal Government
• A strong strong firewall and proxy to
keep unwanted people out.
• Strong Antivirus software and Internet
Security Software suites.
• Strong encryption, usually with a 256 bit
key.
• Whitelist authorized wireless connection,
block all else.
• All network hardware is in secure zones.
• All host should be on a private network
that is invisible from the outside.
• Put all servers in a DMZ, or a firewall
from the outside and from the inside.
• Security fencing to mark perimeter and
set wireless range to this.
22. Change Control
• A general term describing the
procedures used to ensure
that changes (normally, but
not necessarily, to IT systems)
are introduced in a controlled
and coordinated manner
23. Goals of Change Management
• Minimal disruption to services
• Reduction in back-out
activities
• Economic utilization of
resources involved in
implementing change
• Ensure that a product, service
or process is only modified in
line with the identified
necessary change
24. Why Is Change Control
Important In IS Security?
• It is particularly related to
software development
because of the danger of
unnecessary changes being
introduced without
forethought, introducing faults
(bugs) into the system or
undoing changes made by
other users of the software.
Later it became a fundamental
process in quality control.
25. The Change Control Process
• Record / Classify
• Assess
• Plan
• Build / Test
• Implement
• Close / Gain Acceptance.
26. Record and Classify
• A formal request is received for
something to be changed, known
as the "Change Initiation".
• Someone then records and
classifies or categorizes that
request. Part of the classification
would be to assign a Category to
the change, i.e. is the change a
"major business change", "normal
business change" or "minor
business change".
28. Assessment
• The impact assessor make
their risk analysis typically by
answering a set of questions
concerning risk, both to the
business and to the IT estate,
and follow this by making a
judgment on who or whom
should carry out the change.
29. Build and Test
• Plan their change in detail, and
also construct a regression plan, if
it all goes wrong
• The plan should be checked out by
an independent reviewer
• Build the solution, which will then
be tested
• Seek approval and maybe a review
and request a time and date to
carry out the implementation
phase.
30. Implementation
• The Change Manager
approves the change with an
“Authority to Implement” flag
• The change can then be
implemented but only at the
time and date agreed
• Following Implementation, it is
usual to carry out a “Post
Implementation Review”
• When the client agrees all is
OK, the change can be closed.
31. Outsourcing Related Security
Issues
• Two main issues with collaborative
design (outsourcing) revolve
around TRUST:
– Confidentiality (of product design data
in storage or in transit)
– Access Control (read, write, delete
privileges)
• Suppliers can be competitors, or
have close relationships with
competitors
32. Potential Threats of Outsourcing
• Theft of trade secrets, or
intellectual property
• Introduction of
viruses/malware to the
network
• Lack of understanding of
corporate systems could result
in damage or data loss
• Loss of control over sharing of
sensitive data
33. Potential Threats of Outsourcing
• Spoofing: A competitor uses
manager’s or outsourcer’s ID to
gain access to valuable product
data to use in their own designs
• Tampering: Changing the product
information in the database to ruin
the final product design. Changing
access controls allowing competing
companies access to each other’s
information
• Repudiation: User goes in and
performs a malicious act (submits
false product data) and says that it
was not him who did it
34. Countermeasures
• Electronic Vault
• Engineering Change Control
• Release-Management Process
• Flexible Access Control
• Data Set Access Control
• Scheduled Access Control
35. Electronic Vault
• Keeps files in native form
while still encrypting files
• End-to-end security
– Encryption
– Access Control
• Creates tamper-evident audit
trails (any and all access to a
document is logged)
36. Electronic Vault Advantages
Document accuracy
– Maintains print streams in native format
• Document quality
– Streams are compressed in electronic
vault without loss of resolution
• Flexibility
– Easy to enhance, modify, combine,
engineer streams
37. Electronic Vault Advantages
(cont.)
Speed
– Loaded into vault with almost no
disruption of operations
Long-term viability
– Since native format is allowed,
electronic vault can be used in the
future
38. Engineering Change Control
• Defines and controls the
process of reviewing and
approving changes to the
product data
• Prevents tampering with
accountability factor
• New version of data is
released in database to allow
for reversal if necessary
39. Release-Management
Process
• Data released when approved
• Access based on project,
password, and other controls
that user defines
• Allows for auditing and
tracking of information
• Creates relationships among
product data
• Prevents information leaking
of competing suppliers actions
40. Flexible Access Control
• Role-based
• Allows for project to have
users change groups and roles
• Enables distributed design
data access and sharing
41. Scheduled Access Control
• Schedule for suppliers to work
on certain resources
• Privileges granted at certain
periods when they are needed
in the design process
• Revoked when not needed
42. Data Set Access Control
• Data are assigned roles
• Different views of data based
on how organizations and
individuals behave in a task
• Least Privilege Security
Principle
44. Security Principles Applied
• Practice defense in depth
– Role based access control, data
based access control, electronic
vault, release management
• Follow the principle of least
privilege
– Access controls only allow
privileges to those who need it
45. Security Principles Applied
(cont.)
• Compartmentalize
– Various versions of data. Information
split up based on part of design for
users who will need access to it
• Promote privacy
– Accountability so users will want to
keep passwords and information
secret
• Be reluctant to trust
– System is based on least privilege and
does not disclose information until
necessary