SlideShare a Scribd company logo
Information Networking Security and Assurance Lab
National Chung Cheng University
2014/12/3 Kai, 2004 insa 1
RFC 2196 –
Site Security Handbook
a guide to developing computer security policies and
procedures for sites that have systems on the Internet
B. Fraser SEI/CMU
Information Networking Security and Assurance Lab
National Chung Cheng University 2
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 3
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 4
Kai, 2004 insa
1 Introduction
 This handbook is a guide to setting computer security policies
and procedures for sites that have system on the internet.
 Definitions
Site – any organization that owns computer or network-
related resources.
Internet – RFC 1594
Administrator
Security administrator
Decision maker – refers to those people at a site who set or
approve policy.
A collection of thousands of networks linked by
a common set of technical protocols which
make it possible for users of any one of the
networks to communicate with, or use the
services located on, any of the other networks
Information Networking Security and Assurance Lab
National Chung Cheng University 5
Kai, 2004 insa
1.5 Basic Approach
 Steps to develop a security plan for your site
1. Identify what you
trying to protect
2. Determine what you are
trying to protect it from.
3. Determine how
likely the threats are.
4. Implement measures which will protect
your assets in a cost-effective manner
5. Review the process
continuously and
make improvements
each time a
weakness is found.
The cost of protecting yourself against a
threat should be less than the cost of
recovering if the threat were to strike you.
Information Networking Security and Assurance Lab
National Chung Cheng University 6
Kai, 2004 insa
1.6 Risk Assessment
 It is possible to be mislead
about where the effort is needed.
 Risk analysis
 Determining what you need to protect, what you
need to protect it from, and how to protect it.
1. Identifying the assets
– the basic goals of security are availability,
confidentiality, and integrity
2. Identifying the threats
– Each threat should be examined with an eye to how the
threat could affect these areas
Information Networking Security and Assurance Lab
National Chung Cheng University 7
Kai, 2004 insa
1.6.2 Identifying the Assets
Hardware CPUs, boards, keyboards, terminals, workstations, personal
computers, printers, disk drivers, communication lines,
terminal server, routers
Software source programs, object programs, utilities, diagnostic
programs, operating systems, communication programs
data During execution, stored on-line, archived off-line, backups,
audit logs, databases, in transit over communication media.
People User, administrators, hardware maintainers
Documentation On programs, hardware, systems, local administrative
procedures.
Supplies Paper, forms, ribbons, magnetic media.
Information Networking Security and Assurance Lab
National Chung Cheng University 8
Kai, 2004 insa
1.6.3 Identifying the Threats
• The following are classic threats that should
be considered
1. Unauthorized access to resources and/or
information
2. Unintented and/or unauthorized disclosure of
information
3. Denial of service
Information Networking Security and Assurance Lab
National Chung Cheng University 9
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 10
Kai, 2004 insa
2 Security Policies
 What is a security policy and why have one?
 A security policy is a formal statement of the rules by
which people who are given access to an organization’s
technology and information assets must abide.
 Purposes of a security policy
 To inform users, staff and managers of their
obligatory requirements for protecting technology
and information assets.
 Appropriate Use Policy
AUP
spell out what users shall and
shall not do on the various
components of the system,
including the type of traffic
allowed on the networks.
Information Networking Security and Assurance Lab
National Chung Cheng University 11
Kai, 2004 insa
2 Security Policies
 Determined by the following Key tradeoff
1.Services Offered versus Security Provided
2.Ease of Use versus Security
3.Cost of Security versus Risk of Loss
 Who should be involved when forming policy
1.Site security administrator
2.Information technology technical staff
3.Administrator of large use groups within the organization
4.Security incident response team
5.Representative of the user groups affected by the security policy
6.Responsible management
7.Legal counsel
Loss of privacy
Loss of data
Loss of service
Monetary
Performance
Ease of use
Information Networking Security and Assurance Lab
National Chung Cheng University 12
Kai, 2004 insa
2.2 What Makes a Good Security Policy?
 The characteristics of a good security policy
1. Be implementable through system administration procedures
2. Be enforceable with security tools
3. Cleary define the area of responsibility for the users and
management.
 The component of a good security policy
1. Computer technology purchasing Guidelines which specify
required, or preferred, security features
2. A privacy policy which defines reasonable expectations of
privacy regarding.
3. An access policy which defines access rights and privileges to
protect assets for users.
Information Networking Security and Assurance Lab
National Chung Cheng University 13
Kai, 2004 insa
2.2 What Makes a Good Security Policy?
 The component of a good security policy
4. An accountability policy which defines the responsibilities of users.
5. An authentication policy which established trust through an effective
password policy.
6. An Availability statement which sets users' expectations for the
availability of resources.
7. An Information Technology System & Network Maintenance Policy
which describes how both internal and external maintenance people
are allowed to handle and access technology.
8. A Violations Reporting Policy that indicates which types of
violations must be reported and to whom the reports are made.
9. Supporting Information which provides users, staff, and management
with contact information for each type of policy violation
Information Networking Security and Assurance Lab
National Chung Cheng University 14
Kai, 2004 insa
2.3 Keeping the Policy Flexible
 In order for a security policy to be viable for the long
term, it requires a lot of flexibility based upon an
architectural security concept.
 It is important to recognize that there are exceptions
to every rule.
the policy should spell out what exceptions to the
general policy exist.
 Garbage Truck Syndrome
This refers to what would happen to a site if a key person
was suddenly unavailable for his/her job function.
Information Networking Security and Assurance Lab
National Chung Cheng University 15
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 16
Kai, 2004 insa
3 Architecture
1. Objectives
1. Completely defined security plans
1. the list of network services that will be provided
2. which areas of the organization will provide the services
3. who will have access to those services
4. how access will be provided
5. who will administer those services.
2. Separation of services
 to distinguish between hosts which operate within different
models of trust
3. Deny all/ Allow all
4. Identify real need for services
Individual policies can be consistent with the overall site security
host or
network
level Router level
the theory of a hard "crunchy"
shell and a soft "squishy“ middle.
security complexity can grow exponentially with the number of services provided.
Information Networking Security and Assurance Lab
National Chung Cheng University 17
Kai, 2004 insa
3.2 Network and Service Configuration
1. Protecting the infrastructure
2. Protecting the network
1. DoS
 attacking the routers
 Flooding the network with extraneous traffic
2. Spoofing
3. Solutions
1. Clear-text password
2. Cryptographic checksum
3. Encryption
3. Protecting the services
 Name servers (DNS and NIS(+))
 Password/key servers (NIS(+) and KDC)
 Authentication/proxy servers (SOCKS, FWTK)
 Electronic Mail
 World Wide Web (WWW)
 File Transfer (FTP, TFTP)
 NFS
4. Protecting the Protection
Information Networking Security and Assurance Lab
National Chung Cheng University 18
Kai, 2004 insa
3.3 firewalls
Filtering routers
Filtering policy: source and destination IP address,
source and destination TCP port numbers, state of
the TCP "ack" bit, UDP source and destination port
numbers, and direction of packet flow
Proxy servers
Application Layer Gateway
Combine with VPN
Logging function in Firewall
Information Networking Security and Assurance Lab
National Chung Cheng University 19
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 20
Kai, 2004 insa
4 Security services and procedures
1. Authentication
 One-time password
 Kerberos: V4 and V5
 Choosing and protecting Secret tokens and PINs
 Password Assurance
 The importance of robust passwords: Spider ->5p1der
 Changing default passwords
 Restricting access to the password file
 Password aging
 Password/account blocking
 A word about the finger daemon
Information Networking Security and Assurance Lab
National Chung Cheng University 21
Kai, 2004 insa
4 Security services and procedures
2. Confidentiality
 Encryption
3. Integrity
 Checksum: MD5
4. Authorization
 The privileges, rights, property, and permissible
actions
 ACL
Information Networking Security and Assurance Lab
National Chung Cheng University 22
Kai, 2004 insa
4.5 Access
 Physical Access
 Walk-up Network Connections
 Other network technologies
 Modems
 Modem lines must be managed
 Dial-in user must be authentication
 Call-back capability
 All logins should be logged
 Choose your opening banner carefully
 Dial-out authentication
 Make your modem programming as “Bullet-proof” as Possible
Information Networking Security and Assurance Lab
National Chung Cheng University 23
Kai, 2004 insa
4.6 Auditing
 What to collect
 Login and logout, super user access, ticket generation, and
any other change of access or status.
 Collection process
1. Read/write file
2. Write-once/read-many
3. Write-only
 Collection load
 Data compressed or batch capture
 Handling and preserving audit data
 Legal considerations
Do not gather passwords
Information Networking Security and Assurance Lab
National Chung Cheng University 24
Kai, 2004 insa
4.7 securing backups
1. Make sure your site is creating backups
2. Make sure your site is using offsite storage for
backups
3. Consider encrypting your backups to provide
additional protection of the information once it is
off-site.
4. Don’t always assume that your backups are good.
5. Periodically verify the correctness and
completeness of your backups
Information Networking Security and Assurance Lab
National Chung Cheng University 25
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 26
Kai, 2004 insa
5 Security incident handling
1. Preparing and planning
2. Notification
3. Identifying an incident
4. Handling
5. Aftermath
6. Administrative response to incident
Information Networking Security and Assurance Lab
National Chung Cheng University 27
Kai, 2004 insa
5.1 preparing and planning for incident
handling
 Why learning to respond efficiently to an incident?
1. Protecting the asset which could be compromised
2. Protecting resources which could be utilized more
profitably if an incident did not require their services
3. Complying with (government or other) regulations
4. Preventing the use of your systems in attacks against
other systems
5. Minimizing the potential for negative exposure.
Information Networking Security and Assurance Lab
National Chung Cheng University 28
Kai, 2004 insa
5.1 preparing and planning for incident
handling
 A set of objective can be identified for dealing with
incidents
1. Figure out how it happened
2. Find out how to avoid further exploitation of the same
vulnerability.
3. Avoid escalation and further incidents
4. Assess the impact and damage of the incident
5. Recover from the incident
6. Update policies and procedures as needed
7. Find out who did it
Information Networking Security and Assurance Lab
National Chung Cheng University 29
Kai, 2004 insa
5.1 preparing and planning for incident
handling
 Suggested priorities may serve as a starting point
for defining your organization’s response
1. Priority one – protect human life people’s safety
2. Priority two – protect classified and sensitive data. Prevent
exploitation of classified and sensitive systems.
3. Priority three – protect other data, including proprietary,
scientific, managerial and other data.
4. Priority four – prevent damage to systems.
5. Priority five – minimize disruption of computing resources.
Information Networking Security and Assurance Lab
National Chung Cheng University 30
Kai, 2004 insa
5.2 Notification and points of contact
1. Local managers and personnel
2. Law enforcement and investigative agencies
– legal and practical issues
1. Whether your site or organization is willing to risk
negative publicity or exposure to cooperate with legal
prosecution efforts.
2. Downstream liability
3. Distribution of information
4. Liabilities due to monitoring
Information Networking Security and Assurance Lab
National Chung Cheng University 31
Kai, 2004 insa
5.2 Notification and points of contact
3. Computer security incident handling (response)
teams
4. Affected and involved sites
5. Internal communications
6. Public relations – press releases
 Guidelines to provide to the press
1. Keep the technical level of detail low.
2. Keep the speculation out of press statements.
3. Work with law enforcement professionals to assure that
evidence is protected.
4. Try not to be forced into a press interview before you are
prepared.
5. Do not allow the press attention to detract from the handling
of the event.
Information Networking Security and Assurance Lab
National Chung Cheng University 32
Kai, 2004 insa
5.3 Identifying an incident
1. Is it real?
 Certain indications or symptoms of an incident that deserve special attention
1. System crashes
2. New user accounts
3. New files, or strange file names
4. Accounting discrepancies
5. Changes in file lengths or dates.
6. Attempts to write to system
7. Data modification or deletion
8. Denial of service
9. Unexplained, poor system performance
10. Anomalies
11. Suspicious probes
12. Suspicious browsing
13. Inability of a use to log in due to modifications of his account.
Information Networking Security and Assurance Lab
National Chung Cheng University 33
Kai, 2004 insa
5.3 Identifying an incident
2. Types and scope of incidents
1. Is this a multi-site incident?
2. Are many computer at your site affected by this
incident?
3. Is sensitive information involved?
4. What is the entry point of the incident?
5. Is the press involved?
6. What is the potential damage of the incident?
7. What is the estimated time to close out the incident
8. What resource could be required to handle the incident?
9. Is law enforcement involved?
3. Assessing the damage and extent
Information Networking Security and Assurance Lab
National Chung Cheng University 34
Kai, 2004 insa
5.4 Handling an incident
1. Types of notification and exchange of information
 The following minimum information should be provided
1. Timezone of logs, … in GMT or local time
2. Information about the remote system
3. All log entries relevant for the remote site
4. Type of incident
2. Protecting evidence and activity logs
 Gathering evidence
1. All system event
2. All actions you take
3. All external conversations
Information Networking Security and Assurance Lab
National Chung Cheng University 35
Kai, 2004 insa
5.4 handling an incident
3. Containment
4. Eradication
5. Recovery
6. Follow-up
 to write a report describing the exact sequence of
events:
1. the method of discovery
2. Correction procedure
3. monitoring procedure
4. a summary of lesson learned
Information Networking Security and Assurance Lab
National Chung Cheng University 36
Kai, 2004 insa
5.5 Aftermath of an incident
 In the wake of an incident, several actions
should take place.
1. An inventory should be taken of the systems’ assets
2. The lessons learned as a result of the incident
should be included in revised security plan to
prevent the incident from re-occurring
3. A new risk analysis should be developed in light of
the incident.
4. An investigation and prosecution of the individuals
who caused the incident should commence, if it is
deemed desirable
Information Networking Security and Assurance Lab
National Chung Cheng University 37
Kai, 2004 insa
5.6 Responsibilities
1. Not crossing the line
2. Good internet citizenship
3. Administrative response to incidents
Information Networking Security and Assurance Lab
National Chung Cheng University 38
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 39
Kai, 2004 insa
6 Ongoing activities
1. Subscribe to advisories that are issued by various security
incident response teams.
2. Monitor security patches that are produced by the vendors of
your equipment, and obtain and install all that apply.
3. Actively watch the configurations of your systems to
identify any changes.
4. Review all security policies and procedures annually
5. Read relevant mailing lists and USENET newsgroups to
keep up the date with the latest information being shared by
fellow administrators
6. Regularly check for compliance with policies and
procedures.
Information Networking Security and Assurance Lab
National Chung Cheng University 40
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 41
Kai, 2004 insa
7 Tools and locations
 COPS, DES, Drawbridge, identd, ISS, Kerberos,
logdaemon, lsof, MD5, PEM, PGP,
rpcbind/portmapper replacement, SATAN, sfingerd,
S/KEY, smarsh, ssh, Swatch, TCP-Wrapper, tiger,
Tripwire, TROJAN.PL
1. CERT Coordination Center
• ftp://info.cert.org:/pub/tools
2. DFN-CERT
• ftp://ftp.cert.dfn.de/pub/tools
3. Computer operations, audit, and security tools
(COAST)
• soast.cs.purdue.edu:/pub/tools
Information Networking Security and Assurance Lab
National Chung Cheng University 42
Kai, 2004 insa
Agenda
1. Introduction
2. Security policies
3. Architecture
4. Security service and procedures
5. Security incident handling
6. Ongoing activities
7. Tools and locations
8. Mailing list and other resources
Information Networking Security and Assurance Lab
National Chung Cheng University 43
Kai, 2004 insa
8 Mailing lists and other resources
 Mailing lists
1. CERT advisory
– mailto: cert-advisory-request@cert.org
– Body: subscribe cert <FIRST NAME> <LAST NAME>
2. VIRUS-L List
– mailto: listserv%lehiibm1.bitnet@mitvma.mit.edu
– Body: subscribe virus-L FIRSTNAME LASTNAME
3. Internet Firewalls
– mailto: majordomo@greatcircle.com
– Body: subscribe firewalls user@host
 USENET newsgroups
1. comp.security.announce
2. comp.security.misc
3. alt.security
4. comp.virus
5. comp.risks
 World-Wide Web Pages
1. http://www.first.org
2. http://www.alw.nih.gov/Security/security.html
3. http://csrc.ncsl.nist.gov
Information Networking Security and Assurance Lab
National Chung Cheng University 44
Kai, 2004 insa

More Related Content

What's hot

L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
Bhupeshkumar Nanhe
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
rajarose89
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
(PART-I)-Development of latent fingerprints by powders method.pptx
(PART-I)-Development of latent fingerprints by powders method.pptx(PART-I)-Development of latent fingerprints by powders method.pptx
(PART-I)-Development of latent fingerprints by powders method.pptx
Applied Forensic Research Sciences
 
Principles of fingerprints
Principles of fingerprintsPrinciples of fingerprints
Principles of fingerprints
Applied Forensic Research Sciences
 
Database forensics
Database forensicsDatabase forensics
Database forensics
Denys A. Flores, PhD
 
Forensic diatomology
Forensic diatomologyForensic diatomology
Forensic diatomology
Shabnamkhan113
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
INVESTIGATING UNIX SYSTEMS.pptx
INVESTIGATING UNIX SYSTEMS.pptxINVESTIGATING UNIX SYSTEMS.pptx
INVESTIGATING UNIX SYSTEMS.pptx
AmAngel1
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
Cebu Normal University
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
A Brief History of Secret Writing
A Brief History of Secret WritingA Brief History of Secret Writing
A Brief History of Secret Writing
Elliot Ward
 
L5 Cyber Crime.pptx
L5 Cyber Crime.pptxL5 Cyber Crime.pptx
L5 Cyber Crime.pptx
Bhupeshkumar Nanhe
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writting
ShanmukhaValli3
 
How to Recover Deleted Files for Free with Recuva
How to Recover Deleted Files for Free with RecuvaHow to Recover Deleted Files for Free with Recuva
How to Recover Deleted Files for Free with Recuva
maggiemiao
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
BlancoScience
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
Applied Forensic Research Sciences
 
collection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencescollection and packing of biological and firearm evidences
collection and packing of biological and firearm evidences
Sandeep Kumar Pathak
 

What's hot (20)

L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
(PART-I)-Development of latent fingerprints by powders method.pptx
(PART-I)-Development of latent fingerprints by powders method.pptx(PART-I)-Development of latent fingerprints by powders method.pptx
(PART-I)-Development of latent fingerprints by powders method.pptx
 
Principles of fingerprints
Principles of fingerprintsPrinciples of fingerprints
Principles of fingerprints
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Forensic diatomology
Forensic diatomologyForensic diatomology
Forensic diatomology
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
INVESTIGATING UNIX SYSTEMS.pptx
INVESTIGATING UNIX SYSTEMS.pptxINVESTIGATING UNIX SYSTEMS.pptx
INVESTIGATING UNIX SYSTEMS.pptx
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
A Brief History of Secret Writing
A Brief History of Secret WritingA Brief History of Secret Writing
A Brief History of Secret Writing
 
L5 Cyber Crime.pptx
L5 Cyber Crime.pptxL5 Cyber Crime.pptx
L5 Cyber Crime.pptx
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writting
 
How to Recover Deleted Files for Free with Recuva
How to Recover Deleted Files for Free with RecuvaHow to Recover Deleted Files for Free with Recuva
How to Recover Deleted Files for Free with Recuva
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
collection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencescollection and packing of biological and firearm evidences
collection and packing of biological and firearm evidences
 

Viewers also liked

Rfc ppt ponderosa
Rfc ppt  ponderosaRfc ppt  ponderosa
Rfc ppt ponderosaRay Bryant
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
David Sweigert
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
David Sweigert
 
Use of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisUse of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysis
David Sweigert
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
David Sweigert
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA framework
David Sweigert
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication Attacks
David Sweigert
 
Healthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRHealthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPR
David Sweigert
 
Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional Warfare
David Sweigert
 
Cyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureCyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy Infrastructure
David Sweigert
 
Developing Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to RecoveryDeveloping Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to Recovery
David Sweigert
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
David Sweigert
 
Russian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureRussian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting Infrastructure
David Sweigert
 
Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017
David Sweigert
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
David Sweigert
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefing
David Sweigert
 
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
David Sweigert
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
David Sweigert
 
TDL3 Rootkit Background
TDL3 Rootkit BackgroundTDL3 Rootkit Background
TDL3 Rootkit Background
David Sweigert
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
David Sweigert
 

Viewers also liked (20)

Rfc ppt ponderosa
Rfc ppt  ponderosaRfc ppt  ponderosa
Rfc ppt ponderosa
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Use of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisUse of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysis
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA framework
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication Attacks
 
Healthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRHealthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPR
 
Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional Warfare
 
Cyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureCyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy Infrastructure
 
Developing Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to RecoveryDeveloping Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to Recovery
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
 
Russian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureRussian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting Infrastructure
 
Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefing
 
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
TDL3 Rootkit Background
TDL3 Rootkit BackgroundTDL3 Rootkit Background
TDL3 Rootkit Background
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 

Similar to RFC 2196 Site Security Handbook

An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
Jude Rainer
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
IRJET Journal
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
Dotha Keller
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
Power System Operation
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
JeganathanJayaran
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
Dr. Shivashankar
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
jenkinsmandie
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
sachazerbelq9l
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
TRSrinidi
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
IJERA Editor
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
Mohammed Mahfouz Alhassan
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
OPSWAT
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 

Similar to RFC 2196 Site Security Handbook (20)

An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
Mohammed325561
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 

Recently uploaded (20)

2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 

RFC 2196 Site Security Handbook

  • 1. Information Networking Security and Assurance Lab National Chung Cheng University 2014/12/3 Kai, 2004 insa 1 RFC 2196 – Site Security Handbook a guide to developing computer security policies and procedures for sites that have systems on the Internet B. Fraser SEI/CMU
  • 2. Information Networking Security and Assurance Lab National Chung Cheng University 2 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 3. Information Networking Security and Assurance Lab National Chung Cheng University 3 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 4. Information Networking Security and Assurance Lab National Chung Cheng University 4 Kai, 2004 insa 1 Introduction  This handbook is a guide to setting computer security policies and procedures for sites that have system on the internet.  Definitions Site – any organization that owns computer or network- related resources. Internet – RFC 1594 Administrator Security administrator Decision maker – refers to those people at a site who set or approve policy. A collection of thousands of networks linked by a common set of technical protocols which make it possible for users of any one of the networks to communicate with, or use the services located on, any of the other networks
  • 5. Information Networking Security and Assurance Lab National Chung Cheng University 5 Kai, 2004 insa 1.5 Basic Approach  Steps to develop a security plan for your site 1. Identify what you trying to protect 2. Determine what you are trying to protect it from. 3. Determine how likely the threats are. 4. Implement measures which will protect your assets in a cost-effective manner 5. Review the process continuously and make improvements each time a weakness is found. The cost of protecting yourself against a threat should be less than the cost of recovering if the threat were to strike you.
  • 6. Information Networking Security and Assurance Lab National Chung Cheng University 6 Kai, 2004 insa 1.6 Risk Assessment  It is possible to be mislead about where the effort is needed.  Risk analysis  Determining what you need to protect, what you need to protect it from, and how to protect it. 1. Identifying the assets – the basic goals of security are availability, confidentiality, and integrity 2. Identifying the threats – Each threat should be examined with an eye to how the threat could affect these areas
  • 7. Information Networking Security and Assurance Lab National Chung Cheng University 7 Kai, 2004 insa 1.6.2 Identifying the Assets Hardware CPUs, boards, keyboards, terminals, workstations, personal computers, printers, disk drivers, communication lines, terminal server, routers Software source programs, object programs, utilities, diagnostic programs, operating systems, communication programs data During execution, stored on-line, archived off-line, backups, audit logs, databases, in transit over communication media. People User, administrators, hardware maintainers Documentation On programs, hardware, systems, local administrative procedures. Supplies Paper, forms, ribbons, magnetic media.
  • 8. Information Networking Security and Assurance Lab National Chung Cheng University 8 Kai, 2004 insa 1.6.3 Identifying the Threats • The following are classic threats that should be considered 1. Unauthorized access to resources and/or information 2. Unintented and/or unauthorized disclosure of information 3. Denial of service
  • 9. Information Networking Security and Assurance Lab National Chung Cheng University 9 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 10. Information Networking Security and Assurance Lab National Chung Cheng University 10 Kai, 2004 insa 2 Security Policies  What is a security policy and why have one?  A security policy is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide.  Purposes of a security policy  To inform users, staff and managers of their obligatory requirements for protecting technology and information assets.  Appropriate Use Policy AUP spell out what users shall and shall not do on the various components of the system, including the type of traffic allowed on the networks.
  • 11. Information Networking Security and Assurance Lab National Chung Cheng University 11 Kai, 2004 insa 2 Security Policies  Determined by the following Key tradeoff 1.Services Offered versus Security Provided 2.Ease of Use versus Security 3.Cost of Security versus Risk of Loss  Who should be involved when forming policy 1.Site security administrator 2.Information technology technical staff 3.Administrator of large use groups within the organization 4.Security incident response team 5.Representative of the user groups affected by the security policy 6.Responsible management 7.Legal counsel Loss of privacy Loss of data Loss of service Monetary Performance Ease of use
  • 12. Information Networking Security and Assurance Lab National Chung Cheng University 12 Kai, 2004 insa 2.2 What Makes a Good Security Policy?  The characteristics of a good security policy 1. Be implementable through system administration procedures 2. Be enforceable with security tools 3. Cleary define the area of responsibility for the users and management.  The component of a good security policy 1. Computer technology purchasing Guidelines which specify required, or preferred, security features 2. A privacy policy which defines reasonable expectations of privacy regarding. 3. An access policy which defines access rights and privileges to protect assets for users.
  • 13. Information Networking Security and Assurance Lab National Chung Cheng University 13 Kai, 2004 insa 2.2 What Makes a Good Security Policy?  The component of a good security policy 4. An accountability policy which defines the responsibilities of users. 5. An authentication policy which established trust through an effective password policy. 6. An Availability statement which sets users' expectations for the availability of resources. 7. An Information Technology System & Network Maintenance Policy which describes how both internal and external maintenance people are allowed to handle and access technology. 8. A Violations Reporting Policy that indicates which types of violations must be reported and to whom the reports are made. 9. Supporting Information which provides users, staff, and management with contact information for each type of policy violation
  • 14. Information Networking Security and Assurance Lab National Chung Cheng University 14 Kai, 2004 insa 2.3 Keeping the Policy Flexible  In order for a security policy to be viable for the long term, it requires a lot of flexibility based upon an architectural security concept.  It is important to recognize that there are exceptions to every rule. the policy should spell out what exceptions to the general policy exist.  Garbage Truck Syndrome This refers to what would happen to a site if a key person was suddenly unavailable for his/her job function.
  • 15. Information Networking Security and Assurance Lab National Chung Cheng University 15 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 16. Information Networking Security and Assurance Lab National Chung Cheng University 16 Kai, 2004 insa 3 Architecture 1. Objectives 1. Completely defined security plans 1. the list of network services that will be provided 2. which areas of the organization will provide the services 3. who will have access to those services 4. how access will be provided 5. who will administer those services. 2. Separation of services  to distinguish between hosts which operate within different models of trust 3. Deny all/ Allow all 4. Identify real need for services Individual policies can be consistent with the overall site security host or network level Router level the theory of a hard "crunchy" shell and a soft "squishy“ middle. security complexity can grow exponentially with the number of services provided.
  • 17. Information Networking Security and Assurance Lab National Chung Cheng University 17 Kai, 2004 insa 3.2 Network and Service Configuration 1. Protecting the infrastructure 2. Protecting the network 1. DoS  attacking the routers  Flooding the network with extraneous traffic 2. Spoofing 3. Solutions 1. Clear-text password 2. Cryptographic checksum 3. Encryption 3. Protecting the services  Name servers (DNS and NIS(+))  Password/key servers (NIS(+) and KDC)  Authentication/proxy servers (SOCKS, FWTK)  Electronic Mail  World Wide Web (WWW)  File Transfer (FTP, TFTP)  NFS 4. Protecting the Protection
  • 18. Information Networking Security and Assurance Lab National Chung Cheng University 18 Kai, 2004 insa 3.3 firewalls Filtering routers Filtering policy: source and destination IP address, source and destination TCP port numbers, state of the TCP "ack" bit, UDP source and destination port numbers, and direction of packet flow Proxy servers Application Layer Gateway Combine with VPN Logging function in Firewall
  • 19. Information Networking Security and Assurance Lab National Chung Cheng University 19 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 20. Information Networking Security and Assurance Lab National Chung Cheng University 20 Kai, 2004 insa 4 Security services and procedures 1. Authentication  One-time password  Kerberos: V4 and V5  Choosing and protecting Secret tokens and PINs  Password Assurance  The importance of robust passwords: Spider ->5p1der  Changing default passwords  Restricting access to the password file  Password aging  Password/account blocking  A word about the finger daemon
  • 21. Information Networking Security and Assurance Lab National Chung Cheng University 21 Kai, 2004 insa 4 Security services and procedures 2. Confidentiality  Encryption 3. Integrity  Checksum: MD5 4. Authorization  The privileges, rights, property, and permissible actions  ACL
  • 22. Information Networking Security and Assurance Lab National Chung Cheng University 22 Kai, 2004 insa 4.5 Access  Physical Access  Walk-up Network Connections  Other network technologies  Modems  Modem lines must be managed  Dial-in user must be authentication  Call-back capability  All logins should be logged  Choose your opening banner carefully  Dial-out authentication  Make your modem programming as “Bullet-proof” as Possible
  • 23. Information Networking Security and Assurance Lab National Chung Cheng University 23 Kai, 2004 insa 4.6 Auditing  What to collect  Login and logout, super user access, ticket generation, and any other change of access or status.  Collection process 1. Read/write file 2. Write-once/read-many 3. Write-only  Collection load  Data compressed or batch capture  Handling and preserving audit data  Legal considerations Do not gather passwords
  • 24. Information Networking Security and Assurance Lab National Chung Cheng University 24 Kai, 2004 insa 4.7 securing backups 1. Make sure your site is creating backups 2. Make sure your site is using offsite storage for backups 3. Consider encrypting your backups to provide additional protection of the information once it is off-site. 4. Don’t always assume that your backups are good. 5. Periodically verify the correctness and completeness of your backups
  • 25. Information Networking Security and Assurance Lab National Chung Cheng University 25 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 26. Information Networking Security and Assurance Lab National Chung Cheng University 26 Kai, 2004 insa 5 Security incident handling 1. Preparing and planning 2. Notification 3. Identifying an incident 4. Handling 5. Aftermath 6. Administrative response to incident
  • 27. Information Networking Security and Assurance Lab National Chung Cheng University 27 Kai, 2004 insa 5.1 preparing and planning for incident handling  Why learning to respond efficiently to an incident? 1. Protecting the asset which could be compromised 2. Protecting resources which could be utilized more profitably if an incident did not require their services 3. Complying with (government or other) regulations 4. Preventing the use of your systems in attacks against other systems 5. Minimizing the potential for negative exposure.
  • 28. Information Networking Security and Assurance Lab National Chung Cheng University 28 Kai, 2004 insa 5.1 preparing and planning for incident handling  A set of objective can be identified for dealing with incidents 1. Figure out how it happened 2. Find out how to avoid further exploitation of the same vulnerability. 3. Avoid escalation and further incidents 4. Assess the impact and damage of the incident 5. Recover from the incident 6. Update policies and procedures as needed 7. Find out who did it
  • 29. Information Networking Security and Assurance Lab National Chung Cheng University 29 Kai, 2004 insa 5.1 preparing and planning for incident handling  Suggested priorities may serve as a starting point for defining your organization’s response 1. Priority one – protect human life people’s safety 2. Priority two – protect classified and sensitive data. Prevent exploitation of classified and sensitive systems. 3. Priority three – protect other data, including proprietary, scientific, managerial and other data. 4. Priority four – prevent damage to systems. 5. Priority five – minimize disruption of computing resources.
  • 30. Information Networking Security and Assurance Lab National Chung Cheng University 30 Kai, 2004 insa 5.2 Notification and points of contact 1. Local managers and personnel 2. Law enforcement and investigative agencies – legal and practical issues 1. Whether your site or organization is willing to risk negative publicity or exposure to cooperate with legal prosecution efforts. 2. Downstream liability 3. Distribution of information 4. Liabilities due to monitoring
  • 31. Information Networking Security and Assurance Lab National Chung Cheng University 31 Kai, 2004 insa 5.2 Notification and points of contact 3. Computer security incident handling (response) teams 4. Affected and involved sites 5. Internal communications 6. Public relations – press releases  Guidelines to provide to the press 1. Keep the technical level of detail low. 2. Keep the speculation out of press statements. 3. Work with law enforcement professionals to assure that evidence is protected. 4. Try not to be forced into a press interview before you are prepared. 5. Do not allow the press attention to detract from the handling of the event.
  • 32. Information Networking Security and Assurance Lab National Chung Cheng University 32 Kai, 2004 insa 5.3 Identifying an incident 1. Is it real?  Certain indications or symptoms of an incident that deserve special attention 1. System crashes 2. New user accounts 3. New files, or strange file names 4. Accounting discrepancies 5. Changes in file lengths or dates. 6. Attempts to write to system 7. Data modification or deletion 8. Denial of service 9. Unexplained, poor system performance 10. Anomalies 11. Suspicious probes 12. Suspicious browsing 13. Inability of a use to log in due to modifications of his account.
  • 33. Information Networking Security and Assurance Lab National Chung Cheng University 33 Kai, 2004 insa 5.3 Identifying an incident 2. Types and scope of incidents 1. Is this a multi-site incident? 2. Are many computer at your site affected by this incident? 3. Is sensitive information involved? 4. What is the entry point of the incident? 5. Is the press involved? 6. What is the potential damage of the incident? 7. What is the estimated time to close out the incident 8. What resource could be required to handle the incident? 9. Is law enforcement involved? 3. Assessing the damage and extent
  • 34. Information Networking Security and Assurance Lab National Chung Cheng University 34 Kai, 2004 insa 5.4 Handling an incident 1. Types of notification and exchange of information  The following minimum information should be provided 1. Timezone of logs, … in GMT or local time 2. Information about the remote system 3. All log entries relevant for the remote site 4. Type of incident 2. Protecting evidence and activity logs  Gathering evidence 1. All system event 2. All actions you take 3. All external conversations
  • 35. Information Networking Security and Assurance Lab National Chung Cheng University 35 Kai, 2004 insa 5.4 handling an incident 3. Containment 4. Eradication 5. Recovery 6. Follow-up  to write a report describing the exact sequence of events: 1. the method of discovery 2. Correction procedure 3. monitoring procedure 4. a summary of lesson learned
  • 36. Information Networking Security and Assurance Lab National Chung Cheng University 36 Kai, 2004 insa 5.5 Aftermath of an incident  In the wake of an incident, several actions should take place. 1. An inventory should be taken of the systems’ assets 2. The lessons learned as a result of the incident should be included in revised security plan to prevent the incident from re-occurring 3. A new risk analysis should be developed in light of the incident. 4. An investigation and prosecution of the individuals who caused the incident should commence, if it is deemed desirable
  • 37. Information Networking Security and Assurance Lab National Chung Cheng University 37 Kai, 2004 insa 5.6 Responsibilities 1. Not crossing the line 2. Good internet citizenship 3. Administrative response to incidents
  • 38. Information Networking Security and Assurance Lab National Chung Cheng University 38 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 39. Information Networking Security and Assurance Lab National Chung Cheng University 39 Kai, 2004 insa 6 Ongoing activities 1. Subscribe to advisories that are issued by various security incident response teams. 2. Monitor security patches that are produced by the vendors of your equipment, and obtain and install all that apply. 3. Actively watch the configurations of your systems to identify any changes. 4. Review all security policies and procedures annually 5. Read relevant mailing lists and USENET newsgroups to keep up the date with the latest information being shared by fellow administrators 6. Regularly check for compliance with policies and procedures.
  • 40. Information Networking Security and Assurance Lab National Chung Cheng University 40 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 41. Information Networking Security and Assurance Lab National Chung Cheng University 41 Kai, 2004 insa 7 Tools and locations  COPS, DES, Drawbridge, identd, ISS, Kerberos, logdaemon, lsof, MD5, PEM, PGP, rpcbind/portmapper replacement, SATAN, sfingerd, S/KEY, smarsh, ssh, Swatch, TCP-Wrapper, tiger, Tripwire, TROJAN.PL 1. CERT Coordination Center • ftp://info.cert.org:/pub/tools 2. DFN-CERT • ftp://ftp.cert.dfn.de/pub/tools 3. Computer operations, audit, and security tools (COAST) • soast.cs.purdue.edu:/pub/tools
  • 42. Information Networking Security and Assurance Lab National Chung Cheng University 42 Kai, 2004 insa Agenda 1. Introduction 2. Security policies 3. Architecture 4. Security service and procedures 5. Security incident handling 6. Ongoing activities 7. Tools and locations 8. Mailing list and other resources
  • 43. Information Networking Security and Assurance Lab National Chung Cheng University 43 Kai, 2004 insa 8 Mailing lists and other resources  Mailing lists 1. CERT advisory – mailto: cert-advisory-request@cert.org – Body: subscribe cert <FIRST NAME> <LAST NAME> 2. VIRUS-L List – mailto: listserv%lehiibm1.bitnet@mitvma.mit.edu – Body: subscribe virus-L FIRSTNAME LASTNAME 3. Internet Firewalls – mailto: majordomo@greatcircle.com – Body: subscribe firewalls user@host  USENET newsgroups 1. comp.security.announce 2. comp.security.misc 3. alt.security 4. comp.virus 5. comp.risks  World-Wide Web Pages 1. http://www.first.org 2. http://www.alw.nih.gov/Security/security.html 3. http://csrc.ncsl.nist.gov
  • 44. Information Networking Security and Assurance Lab National Chung Cheng University 44 Kai, 2004 insa