SlideShare a Scribd company logo
Chapter # : 05 - CISAChapter # : 05 - CISA 11
Security of InformationSecurity of Information
ASSETSASSETS
Chapter # : 05 - CISAChapter # : 05 - CISA 22
• Logical Access ExposuresLogical Access Exposures
• Trojan HorsesTrojan Horses
• Rounding DownRounding Down
• Salami TechniquesSalami Techniques
• VirusVirus
• WormsWorms
• Logic BombsLogic Bombs
• Trap DoorsTrap Doors
• Asynchronous AttacksAsynchronous Attacks
• Data LeakageData Leakage
• Wire-TappingWire-Tapping
• PiggybackingPiggybacking
• Computer ShutdownComputer Shutdown
• Daniel of ServicesDaniel of Services
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
Chapter # : 05 - CISAChapter # : 05 - CISA 33
• Logical Access Control Software :Logical Access Control Software :
To prevent unauthorized access and modificationTo prevent unauthorized access and modification
to sensitive data and critical functions. It shouldto sensitive data and critical functions. It should
be applied to networks, operating systems,be applied to networks, operating systems,
databases and application systemsdatabases and application systems
• General OS Access Control Functions:General OS Access Control Functions:
• Apply user ID and authenticationApply user ID and authentication
• Logon on specific terminalLogon on specific terminal
• Multi-level accessMulti-level access
• Individual accountability and auditabilityIndividual accountability and auditability
• Create or change user profilesCreate or change user profiles
• Log EventsLog Events
• Log User ActivitiesLog User Activities
• Report capabilitiesReport capabilities
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
Chapter # : 05 - CISAChapter # : 05 - CISA 44
• Identification and Authentications :Identification and Authentications :
Based on, somethingBased on, something You KnowYou Know, something, something
You haveYou have and somethingand something You AreYou Are
– Logon-IDs and PasswordsLogon-IDs and Passwords
Something you knowSomething you know
– Token Devices, One Time Access ControlToken Devices, One Time Access Control
Something you haveSomething you have
– Biometrics Security Access Control (through FingerBiometrics Security Access Control (through Finger
Prints, Eye Retina)Prints, Eye Retina)
Something you areSomething you are
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
Chapter # : 05 - CISAChapter # : 05 - CISA 55
• Features of Passwords :Features of Passwords :
• It should be easy to remember for user butIt should be easy to remember for user but
• Difficult for perpetrator to guessDifficult for perpetrator to guess
• Initial Password should be changed on first time log-onInitial Password should be changed on first time log-on
• In result of entering wrong password ID should be heldIn result of entering wrong password ID should be held
• Re-activation of ID should be on writtenRe-activation of ID should be on written
request/approval by security administrator.request/approval by security administrator.
• Password encryption and should be shadowedPassword encryption and should be shadowed
• Changed periodicallyChanged periodically
• Must be unique to each user ID.Must be unique to each user ID.
• Unused IDs should be deactivated and logged offUnused IDs should be deactivated and logged off
• Ideally length of Password is 5 to 8 charactersIdeally length of Password is 5 to 8 characters
• Usage of Alphabets, Numeric, Lower case and specialUsage of Alphabets, Numeric, Lower case and special
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
Chapter # : 05 - CISAChapter # : 05 - CISA 66
• Token Devices, Once-Time PasswordsToken Devices, Once-Time Passwords
• Biometrics :Biometrics :
• Palm : ridges, valleys etcPalm : ridges, valleys etc
• Hand Geometry : 3 dim perspective of handHand Geometry : 3 dim perspective of hand
• Iris : Eyes colored portion surroundedIris : Eyes colored portion surrounded
• RetinaRetina
• Finger PrintsFinger Prints
• FaceFace
• SignaturesSignatures
• Voice RecognitionVoice Recognition
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
Chapter # : 05 - CISAChapter # : 05 - CISA 77
• Single Sign-on (SSO)Single Sign-on (SSO)
• Advantages :Advantages :
• No need to remember multiple PWDsNo need to remember multiple PWDs
• Improves administrators ability to manage user profilesImproves administrators ability to manage user profiles
• Reduces Administrative overheadsReduces Administrative overheads
• Reduces the time taken by userReduces the time taken by user
• Disadvantages :Disadvantages :
• Support for all major OS is difficultSupport for all major OS is difficult
• Significant cost associated with SSO developmentSignificant cost associated with SSO development
• Single point of failure and total compromise of anSingle point of failure and total compromise of an
organization’s IS assetsorganization’s IS assets
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
Chapter # : 05 - CISAChapter # : 05 - CISA 88
• ControlsControls
• Technical Qualified Operators,Technical Qualified Operators,
• Job rotation (wherever possible)Job rotation (wherever possible)
• Restricted operation of operators over operatorRestricted operation of operators over operator
activity logs etc.activity logs etc.
• Audit trail of all operator activities and itsAudit trail of all operator activities and its
periodical review by operations management.periodical review by operations management.
• Availability of documented Network operationsAvailability of documented Network operations
standards and protocols to operators andstandards and protocols to operators and
periodical review to ensure compliance.periodical review to ensure compliance.
• Analysis for workload balance, fast responseAnalysis for workload balance, fast response
time and system efficiencytime and system efficiency
• Encryption should be used wherever requiredEncryption should be used wherever required
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 99
• LAN SecurityLAN Security
– Threats :Threats : Loss of Data & Programs, less versionLoss of Data & Programs, less version
control, Exposure to external Activities, viruses,control, Exposure to external Activities, viruses,
Improper disclosure of data, Violating SoftwareImproper disclosure of data, Violating Software
License, Illegal access by impersonating orLicense, Illegal access by impersonating or
masquerading, Internal user's Spoofingmasquerading, Internal user's Spoofing
– Remedies :Remedies : Declaring ownership of programs,Declaring ownership of programs,
files and storage, Limiting access to read only,files and storage, Limiting access to read only,
Record and File locking, enforcingRecord and File locking, enforcing
ID/Passwords procedures.ID/Passwords procedures.
– Dial Up ControlDial Up Control : Encrypted Passwords, Dial-: Encrypted Passwords, Dial-
back modems for verificationback modems for verification
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1010
• Client Server Security :Client Server Security :
– Disabling the floppy drivesDisabling the floppy drives
– Network Monitoring devices to inspect activitiesNetwork Monitoring devices to inspect activities
– Data EncryptionData Encryption
– Application level Access control programsApplication level Access control programs
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1111
• Internet Threats :Internet Threats :
– DisclosureDisclosure
– Masquerade or Spoofing (Disguise IP address etc)Masquerade or Spoofing (Disguise IP address etc)
– Unauthorized accessUnauthorized access
– Loss of IntegrityLoss of Integrity
– Denial of service (Sys Flooding of messages / requests and keepDenial of service (Sys Flooding of messages / requests and keep
machines busy)machines busy)
– Theft of service and resourcesTheft of service and resources
• Internet Security Controls:Internet Security Controls:
– Risk assessment of web based application.Risk assessment of web based application.
– Security awarenessSecurity awareness
– Firewall standardsFirewall standards
– Intrusion Detection standards securityIntrusion Detection standards security
– Remote Access for coordinating and controlling centrallyRemote Access for coordinating and controlling centrally
– Encryption techniquesEncryption techniques
– Monitoring usage of unauthorized usage and notification to them.Monitoring usage of unauthorized usage and notification to them.
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1212
• Firewall Security SystemsFirewall Security Systems ::
• General FeaturesGeneral Features
• Firewall TypesFirewall Types
Router Packet FilteringRouter Packet Filtering
Application firewallApplication firewall
Stateful inspectionStateful inspection
• Firewall IssuesFirewall Issues
• Creates false sense of securityCreates false sense of security
• Other entry points, connections direct though ModemsOther entry points, connections direct though Modems
• Mis-configurationMis-configuration
• Firewall without screening router is uselessFirewall without screening router is useless
• Irregular monitoring of activitiesIrregular monitoring of activities
• Irregular maintenance of Firewall policiesIrregular maintenance of Firewall policies
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1313
• Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS) ::
• Components of IDSComponents of IDS
Sensor, Analyzer, An administrator ConsoleSensor, Analyzer, An administrator Console
A user interfaceA user interface
• FeaturesFeatures
Intrusion DetectionIntrusion Detection
Gathering EvidenceGathering Evidence
Automated responseAutomated response
Security PolicySecurity Policy
Interface with system toolsInterface with system tools
Security Policy managementSecurity Policy management
• LimitationsLimitations
Weaknesses in the policy definitionWeaknesses in the policy definition
Application level vulnerabilitiesApplication level vulnerabilities
Backdoors into applicationBackdoors into application
Weakness in identification and authentication schemesWeakness in identification and authentication schemes
• Honeypots and HoneynetsHoneypots and Honeynets
Software application pretend to be unfortunately hackedSoftware application pretend to be unfortunately hacked
Network of honeypots making a false network for hackers to hack andNetwork of honeypots making a false network for hackers to hack and
caughtcaught
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1414
• EncryptionEncryption::
• Is a process of converting a plaintext into a secureIs a process of converting a plaintext into a secure
coded form of text (Cipher General Features)coded form of text (Cipher General Features)
• Key Elements of Encryption SystemsKey Elements of Encryption Systems
Encryption AlgorithmEncryption Algorithm
Encryption KeysEncryption Keys
Key LengthKey Length
• Private Key Cryptographic systemPrivate Key Cryptographic system
• Public Key Cryptographic SystemPublic Key Cryptographic System
• Digital SignaturesDigital Signatures
• Digital EnvalopDigital Envalop
• Is used to send encrypted information and relevantIs used to send encrypted information and relevant
keys along with it.keys along with it.
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1515
Review network DiagramReview network Diagram
Identify Network DesignIdentify Network Design
Dissemination of policies and standardsDissemination of policies and standards
Experience/knowledge of security operators for internetExperience/knowledge of security operators for internet
legislative issues are considered against usage of internetlegislative issues are considered against usage of internet
based applicationbased application
Review of service level contract in case of outsourcing.Review of service level contract in case of outsourcing.
Hardware and software are well upgraded to counter newHardware and software are well upgraded to counter new
vulnerabilitiesvulnerabilities
– Auditing Remote AccessAuditing Remote Access
– Auditing internet “point of presence”Auditing internet “point of presence”
– Network penetration testsNetwork penetration tests
– Full network assessment reviewsFull network assessment reviews
– LAN network assessmentLAN network assessment
– Development and Authorization of network changeDevelopment and Authorization of network change
– Unauthorized changesUnauthorized changes
– Computer forensicsComputer forensics
AUDITING NETWORK INFRASTRUCTURE SECURITYAUDITING NETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1616
• Environmental Issues and ExposuresEnvironmental Issues and Exposures ::
– Fire, Natural Disasters,Fire, Natural Disasters,
– Power FailurePower Failure
Total FailureTotal Failure
Severely reduced voltageSeverely reduced voltage
Sages, spikes and surgesSages, spikes and surges
Electromagnetic interferenceElectromagnetic interference
– Power SpikePower Spike
– Air conditioning FailureAir conditioning Failure
– Electric ShockElectric Shock
– Equipment FailureEquipment Failure
– Water Damage / FloodingWater Damage / Flooding
– Bomb Threat/attackBomb Threat/attack
ENVIRONMENTAL EXPOSURES AND CONTORLS:ENVIRONMENTAL EXPOSURES AND CONTORLS:
Chapter # : 05 - CISAChapter # : 05 - CISA 1717
ENVIRONMENTAL EXPOSURES AND CONTORLS:ENVIRONMENTAL EXPOSURES AND CONTORLS:
Controls for Environmental exposuresControls for Environmental exposures ::
– Alarm Control PanelAlarm Control Panel
– Water DetectorsWater Detectors
– Handheld Fire ExtinguishersHandheld Fire Extinguishers
– Manual Fire alarmsManual Fire alarms
– Smoke detectorsSmoke detectors
– Fire Suppression SystemFire Suppression System
Water-based, Halon system, FM-200, COWater-based, Halon system, FM-200, CO22 systemsystem
– Logically Locating the Computer RoomLogically Locating the Computer Room
– Regular Inspection by Fire DepartmentRegular Inspection by Fire Department
– Fire Proof Walls Floors and Ceilings surrounding the computer roomFire Proof Walls Floors and Ceilings surrounding the computer room
– Electrical surge ProtectorElectrical surge Protector
– UPS / GeneratorsUPS / Generators
– Emergency Power Off SwitchEmergency Power Off Switch
– Power leads from two substationsPower leads from two substations
– Wiring in electrical panels and conduitWiring in electrical panels and conduit
– Prohibiting against eating, drinking and smoking within theProhibiting against eating, drinking and smoking within the
information processing facilityinformation processing facility
– Fire resistant office materialFire resistant office material
– Documented and tested emergency Evacuation Plans.Documented and tested emergency Evacuation Plans.

More Related Content

What's hot

VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
Idps technology starter v2.0
Idps technology starter v2.0Idps technology starter v2.0
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
Digital Bond
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
Sameer Paradia
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
Denim Group
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
henkpieper
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
Precisely
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
Digital Bond
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
Digital Bond
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
Digital Bond
 
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Digital Bond
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
Fuad Khan
 
Confidentiality policies UNIT 2 (CSS)
Confidentiality policies UNIT 2 (CSS)Confidentiality policies UNIT 2 (CSS)
Confidentiality policies UNIT 2 (CSS)
SURBHI SAROHA
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
Priyanka Aash
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
"EL ATAQUE INTERNO"
"EL ATAQUE INTERNO""EL ATAQUE INTERNO"
"EL ATAQUE INTERNO"
Jose Luis Balbiano
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Digital Bond
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
Andris Soroka
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
Camilo Fandiño Gómez
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 

What's hot (20)

VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
Idps technology starter v2.0
Idps technology starter v2.0Idps technology starter v2.0
Idps technology starter v2.0
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
 
Confidentiality policies UNIT 2 (CSS)
Confidentiality policies UNIT 2 (CSS)Confidentiality policies UNIT 2 (CSS)
Confidentiality policies UNIT 2 (CSS)
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
"EL ATAQUE INTERNO"
"EL ATAQUE INTERNO""EL ATAQUE INTERNO"
"EL ATAQUE INTERNO"
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 

Viewers also liked

Wireless Security Basics
Wireless Security BasicsWireless Security Basics
Wireless Security Basics
SecurityTube.Net
 
hackers
hackershackers
hackers
Aya Eltayed
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
Oliver Pfaff
 
Evolution Of Web Security
Evolution Of Web SecurityEvolution Of Web Security
Evolution Of Web Security
Chris Shiflett
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
Shreedevi Tharanidharan
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
Mohamed Elabnody
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
Fabio Pietrosanti
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
Oles Seheda
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
Ajay Dhamija
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 

Viewers also liked (20)

Wireless Security Basics
Wireless Security BasicsWireless Security Basics
Wireless Security Basics
 
hackers
hackershackers
hackers
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
 
Evolution Of Web Security
Evolution Of Web SecurityEvolution Of Web Security
Evolution Of Web Security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Information security
Information securityInformation security
Information security
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Web Security
Web SecurityWeb Security
Web Security
 

Similar to Security of information asset

Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Võ Thái Lâm
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Security Bootcamp
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
ERPScan
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
BeyondTrust
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
Adrian Sanabria
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
David Perkins
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
ERPScan
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
Network Intelligence India
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions
 
Grc tao.4
Grc tao.4Grc tao.4
Grc tao.4
Flaskdata.io
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
Jürgen Ambrosi
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
North Texas Chapter of the ISSA
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
Zoho Corporation
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
Fahad Al-Hasan
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
Vladyslav Radetsky
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Emrah Alpa, CISSP CEH CCSK
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
FRSecure
 

Similar to Security of information asset (20)

Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Grc tao.4
Grc tao.4Grc tao.4
Grc tao.4
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 

More from University of Central Punjab

3G,4G
3G,4G3G,4G
Microsoft windows
Microsoft windowsMicrosoft windows
Microsoft windows
University of Central Punjab
 
Firewalls
FirewallsFirewalls
Remote desktop and print server
Remote desktop and print serverRemote desktop and print server
Remote desktop and print server
University of Central Punjab
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
University of Central Punjab
 
Need for security
Need for securityNeed for security
Need for security
University of Central Punjab
 
VIOP , SKYPE and OOVOO
VIOP , SKYPE and OOVOOVIOP , SKYPE and OOVOO
VIOP , SKYPE and OOVOO
University of Central Punjab
 

More from University of Central Punjab (7)

3G,4G
3G,4G3G,4G
3G,4G
 
Microsoft windows
Microsoft windowsMicrosoft windows
Microsoft windows
 
Firewalls
FirewallsFirewalls
Firewalls
 
Remote desktop and print server
Remote desktop and print serverRemote desktop and print server
Remote desktop and print server
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Need for security
Need for securityNeed for security
Need for security
 
VIOP , SKYPE and OOVOO
VIOP , SKYPE and OOVOOVIOP , SKYPE and OOVOO
VIOP , SKYPE and OOVOO
 

Recently uploaded

Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
Pinta Partners
 
Credit Management training seminar power point presentation
Credit Management training seminar power point presentationCredit Management training seminar power point presentation
Credit Management training seminar power point presentation
bernanbumatay1
 
Credit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentationCredit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentation
bernanbumatay1
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
Strategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptxStrategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptx
KarthikRaghu8
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
Alberto Brandolini
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
Ram V Chary
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
stuwilson.co.uk
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
spandane
 
Resource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdfResource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdf
FeteneA
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
strikingabalance
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
8p28uk6g
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
Dr. Christine Ngari ,Ph.D (HRM)
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
Pierre E. NEIS
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
GanpatiKumarChoudhar
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 

Recently uploaded (20)

Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
 
Credit Management training seminar power point presentation
Credit Management training seminar power point presentationCredit Management training seminar power point presentation
Credit Management training seminar power point presentation
 
Credit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentationCredit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentation
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
Strategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptxStrategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptx
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
 
Resource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdfResource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdf
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 

Security of information asset

  • 1. Chapter # : 05 - CISAChapter # : 05 - CISA 11 Security of InformationSecurity of Information ASSETSASSETS
  • 2. Chapter # : 05 - CISAChapter # : 05 - CISA 22 • Logical Access ExposuresLogical Access Exposures • Trojan HorsesTrojan Horses • Rounding DownRounding Down • Salami TechniquesSalami Techniques • VirusVirus • WormsWorms • Logic BombsLogic Bombs • Trap DoorsTrap Doors • Asynchronous AttacksAsynchronous Attacks • Data LeakageData Leakage • Wire-TappingWire-Tapping • PiggybackingPiggybacking • Computer ShutdownComputer Shutdown • Daniel of ServicesDaniel of Services LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
  • 3. Chapter # : 05 - CISAChapter # : 05 - CISA 33 • Logical Access Control Software :Logical Access Control Software : To prevent unauthorized access and modificationTo prevent unauthorized access and modification to sensitive data and critical functions. It shouldto sensitive data and critical functions. It should be applied to networks, operating systems,be applied to networks, operating systems, databases and application systemsdatabases and application systems • General OS Access Control Functions:General OS Access Control Functions: • Apply user ID and authenticationApply user ID and authentication • Logon on specific terminalLogon on specific terminal • Multi-level accessMulti-level access • Individual accountability and auditabilityIndividual accountability and auditability • Create or change user profilesCreate or change user profiles • Log EventsLog Events • Log User ActivitiesLog User Activities • Report capabilitiesReport capabilities LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
  • 4. Chapter # : 05 - CISAChapter # : 05 - CISA 44 • Identification and Authentications :Identification and Authentications : Based on, somethingBased on, something You KnowYou Know, something, something You haveYou have and somethingand something You AreYou Are – Logon-IDs and PasswordsLogon-IDs and Passwords Something you knowSomething you know – Token Devices, One Time Access ControlToken Devices, One Time Access Control Something you haveSomething you have – Biometrics Security Access Control (through FingerBiometrics Security Access Control (through Finger Prints, Eye Retina)Prints, Eye Retina) Something you areSomething you are LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
  • 5. Chapter # : 05 - CISAChapter # : 05 - CISA 55 • Features of Passwords :Features of Passwords : • It should be easy to remember for user butIt should be easy to remember for user but • Difficult for perpetrator to guessDifficult for perpetrator to guess • Initial Password should be changed on first time log-onInitial Password should be changed on first time log-on • In result of entering wrong password ID should be heldIn result of entering wrong password ID should be held • Re-activation of ID should be on writtenRe-activation of ID should be on written request/approval by security administrator.request/approval by security administrator. • Password encryption and should be shadowedPassword encryption and should be shadowed • Changed periodicallyChanged periodically • Must be unique to each user ID.Must be unique to each user ID. • Unused IDs should be deactivated and logged offUnused IDs should be deactivated and logged off • Ideally length of Password is 5 to 8 charactersIdeally length of Password is 5 to 8 characters • Usage of Alphabets, Numeric, Lower case and specialUsage of Alphabets, Numeric, Lower case and special LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
  • 6. Chapter # : 05 - CISAChapter # : 05 - CISA 66 • Token Devices, Once-Time PasswordsToken Devices, Once-Time Passwords • Biometrics :Biometrics : • Palm : ridges, valleys etcPalm : ridges, valleys etc • Hand Geometry : 3 dim perspective of handHand Geometry : 3 dim perspective of hand • Iris : Eyes colored portion surroundedIris : Eyes colored portion surrounded • RetinaRetina • Finger PrintsFinger Prints • FaceFace • SignaturesSignatures • Voice RecognitionVoice Recognition LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
  • 7. Chapter # : 05 - CISAChapter # : 05 - CISA 77 • Single Sign-on (SSO)Single Sign-on (SSO) • Advantages :Advantages : • No need to remember multiple PWDsNo need to remember multiple PWDs • Improves administrators ability to manage user profilesImproves administrators ability to manage user profiles • Reduces Administrative overheadsReduces Administrative overheads • Reduces the time taken by userReduces the time taken by user • Disadvantages :Disadvantages : • Support for all major OS is difficultSupport for all major OS is difficult • Significant cost associated with SSO developmentSignificant cost associated with SSO development • Single point of failure and total compromise of anSingle point of failure and total compromise of an organization’s IS assetsorganization’s IS assets LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
  • 8. Chapter # : 05 - CISAChapter # : 05 - CISA 88 • ControlsControls • Technical Qualified Operators,Technical Qualified Operators, • Job rotation (wherever possible)Job rotation (wherever possible) • Restricted operation of operators over operatorRestricted operation of operators over operator activity logs etc.activity logs etc. • Audit trail of all operator activities and itsAudit trail of all operator activities and its periodical review by operations management.periodical review by operations management. • Availability of documented Network operationsAvailability of documented Network operations standards and protocols to operators andstandards and protocols to operators and periodical review to ensure compliance.periodical review to ensure compliance. • Analysis for workload balance, fast responseAnalysis for workload balance, fast response time and system efficiencytime and system efficiency • Encryption should be used wherever requiredEncryption should be used wherever required NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 9. Chapter # : 05 - CISAChapter # : 05 - CISA 99 • LAN SecurityLAN Security – Threats :Threats : Loss of Data & Programs, less versionLoss of Data & Programs, less version control, Exposure to external Activities, viruses,control, Exposure to external Activities, viruses, Improper disclosure of data, Violating SoftwareImproper disclosure of data, Violating Software License, Illegal access by impersonating orLicense, Illegal access by impersonating or masquerading, Internal user's Spoofingmasquerading, Internal user's Spoofing – Remedies :Remedies : Declaring ownership of programs,Declaring ownership of programs, files and storage, Limiting access to read only,files and storage, Limiting access to read only, Record and File locking, enforcingRecord and File locking, enforcing ID/Passwords procedures.ID/Passwords procedures. – Dial Up ControlDial Up Control : Encrypted Passwords, Dial-: Encrypted Passwords, Dial- back modems for verificationback modems for verification NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 10. Chapter # : 05 - CISAChapter # : 05 - CISA 1010 • Client Server Security :Client Server Security : – Disabling the floppy drivesDisabling the floppy drives – Network Monitoring devices to inspect activitiesNetwork Monitoring devices to inspect activities – Data EncryptionData Encryption – Application level Access control programsApplication level Access control programs NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 11. Chapter # : 05 - CISAChapter # : 05 - CISA 1111 • Internet Threats :Internet Threats : – DisclosureDisclosure – Masquerade or Spoofing (Disguise IP address etc)Masquerade or Spoofing (Disguise IP address etc) – Unauthorized accessUnauthorized access – Loss of IntegrityLoss of Integrity – Denial of service (Sys Flooding of messages / requests and keepDenial of service (Sys Flooding of messages / requests and keep machines busy)machines busy) – Theft of service and resourcesTheft of service and resources • Internet Security Controls:Internet Security Controls: – Risk assessment of web based application.Risk assessment of web based application. – Security awarenessSecurity awareness – Firewall standardsFirewall standards – Intrusion Detection standards securityIntrusion Detection standards security – Remote Access for coordinating and controlling centrallyRemote Access for coordinating and controlling centrally – Encryption techniquesEncryption techniques – Monitoring usage of unauthorized usage and notification to them.Monitoring usage of unauthorized usage and notification to them. NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 12. Chapter # : 05 - CISAChapter # : 05 - CISA 1212 • Firewall Security SystemsFirewall Security Systems :: • General FeaturesGeneral Features • Firewall TypesFirewall Types Router Packet FilteringRouter Packet Filtering Application firewallApplication firewall Stateful inspectionStateful inspection • Firewall IssuesFirewall Issues • Creates false sense of securityCreates false sense of security • Other entry points, connections direct though ModemsOther entry points, connections direct though Modems • Mis-configurationMis-configuration • Firewall without screening router is uselessFirewall without screening router is useless • Irregular monitoring of activitiesIrregular monitoring of activities • Irregular maintenance of Firewall policiesIrregular maintenance of Firewall policies NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 13. Chapter # : 05 - CISAChapter # : 05 - CISA 1313 • Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS) :: • Components of IDSComponents of IDS Sensor, Analyzer, An administrator ConsoleSensor, Analyzer, An administrator Console A user interfaceA user interface • FeaturesFeatures Intrusion DetectionIntrusion Detection Gathering EvidenceGathering Evidence Automated responseAutomated response Security PolicySecurity Policy Interface with system toolsInterface with system tools Security Policy managementSecurity Policy management • LimitationsLimitations Weaknesses in the policy definitionWeaknesses in the policy definition Application level vulnerabilitiesApplication level vulnerabilities Backdoors into applicationBackdoors into application Weakness in identification and authentication schemesWeakness in identification and authentication schemes • Honeypots and HoneynetsHoneypots and Honeynets Software application pretend to be unfortunately hackedSoftware application pretend to be unfortunately hacked Network of honeypots making a false network for hackers to hack andNetwork of honeypots making a false network for hackers to hack and caughtcaught NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 14. Chapter # : 05 - CISAChapter # : 05 - CISA 1414 • EncryptionEncryption:: • Is a process of converting a plaintext into a secureIs a process of converting a plaintext into a secure coded form of text (Cipher General Features)coded form of text (Cipher General Features) • Key Elements of Encryption SystemsKey Elements of Encryption Systems Encryption AlgorithmEncryption Algorithm Encryption KeysEncryption Keys Key LengthKey Length • Private Key Cryptographic systemPrivate Key Cryptographic system • Public Key Cryptographic SystemPublic Key Cryptographic System • Digital SignaturesDigital Signatures • Digital EnvalopDigital Envalop • Is used to send encrypted information and relevantIs used to send encrypted information and relevant keys along with it.keys along with it. NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 15. Chapter # : 05 - CISAChapter # : 05 - CISA 1515 Review network DiagramReview network Diagram Identify Network DesignIdentify Network Design Dissemination of policies and standardsDissemination of policies and standards Experience/knowledge of security operators for internetExperience/knowledge of security operators for internet legislative issues are considered against usage of internetlegislative issues are considered against usage of internet based applicationbased application Review of service level contract in case of outsourcing.Review of service level contract in case of outsourcing. Hardware and software are well upgraded to counter newHardware and software are well upgraded to counter new vulnerabilitiesvulnerabilities – Auditing Remote AccessAuditing Remote Access – Auditing internet “point of presence”Auditing internet “point of presence” – Network penetration testsNetwork penetration tests – Full network assessment reviewsFull network assessment reviews – LAN network assessmentLAN network assessment – Development and Authorization of network changeDevelopment and Authorization of network change – Unauthorized changesUnauthorized changes – Computer forensicsComputer forensics AUDITING NETWORK INFRASTRUCTURE SECURITYAUDITING NETWORK INFRASTRUCTURE SECURITY ::
  • 16. Chapter # : 05 - CISAChapter # : 05 - CISA 1616 • Environmental Issues and ExposuresEnvironmental Issues and Exposures :: – Fire, Natural Disasters,Fire, Natural Disasters, – Power FailurePower Failure Total FailureTotal Failure Severely reduced voltageSeverely reduced voltage Sages, spikes and surgesSages, spikes and surges Electromagnetic interferenceElectromagnetic interference – Power SpikePower Spike – Air conditioning FailureAir conditioning Failure – Electric ShockElectric Shock – Equipment FailureEquipment Failure – Water Damage / FloodingWater Damage / Flooding – Bomb Threat/attackBomb Threat/attack ENVIRONMENTAL EXPOSURES AND CONTORLS:ENVIRONMENTAL EXPOSURES AND CONTORLS:
  • 17. Chapter # : 05 - CISAChapter # : 05 - CISA 1717 ENVIRONMENTAL EXPOSURES AND CONTORLS:ENVIRONMENTAL EXPOSURES AND CONTORLS: Controls for Environmental exposuresControls for Environmental exposures :: – Alarm Control PanelAlarm Control Panel – Water DetectorsWater Detectors – Handheld Fire ExtinguishersHandheld Fire Extinguishers – Manual Fire alarmsManual Fire alarms – Smoke detectorsSmoke detectors – Fire Suppression SystemFire Suppression System Water-based, Halon system, FM-200, COWater-based, Halon system, FM-200, CO22 systemsystem – Logically Locating the Computer RoomLogically Locating the Computer Room – Regular Inspection by Fire DepartmentRegular Inspection by Fire Department – Fire Proof Walls Floors and Ceilings surrounding the computer roomFire Proof Walls Floors and Ceilings surrounding the computer room – Electrical surge ProtectorElectrical surge Protector – UPS / GeneratorsUPS / Generators – Emergency Power Off SwitchEmergency Power Off Switch – Power leads from two substationsPower leads from two substations – Wiring in electrical panels and conduitWiring in electrical panels and conduit – Prohibiting against eating, drinking and smoking within theProhibiting against eating, drinking and smoking within the information processing facilityinformation processing facility – Fire resistant office materialFire resistant office material – Documented and tested emergency Evacuation Plans.Documented and tested emergency Evacuation Plans.