1 / 10

Comprehensive Security Management: Protecting, Responding, and Planning

This figure highlights the key aspects of security management, including the need for top-to-bottom commitment, the importance of closing all avenues of attack, the concept of defense in depth, and the use of security audits. It also outlines the general security goals of confidentiality, integrity, and availability. The figure then introduces the Plan-Protect-Respond cycle, which involves planning for comprehensive security, protecting against attacks, and responding effectively to incidents.

awoodruff
Télécharger la présentation

Comprehensive Security Management: Protecting, Responding, and Planning

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Figure 1-17: Security Management • Security is a Primarily a Management Issue, not a Technology Issue • Top-to-Bottom Commitment • Top-management commitment • Operational execution • Enforcement

  2. Figure 1-17: Security Management • Comprehensive Security • Closing all avenues of attack • Asymmetrical warfare • Attacker only has to find one opening • Defense in depth • Attacker must get past several defenses to succeed • Security audits • Run attacks against your own network

  3. Figure 1-17: Security Management • General Security Goals (CIA) • Confidentiality • Attackers cannot read messages if they intercept them • Integrity • If attackers change messages, this will be detected • Availability • System is able to server users

  4. Figure 1-18: The Plan—Protect—Respond Cycle • Planning • Need for comprehensive security (no gaps) • Risk analysis (see Figure 1-19) • Enumerating threats • Threat severity = estimated cost of attack X probability of attack • Value of protection = threat severity – cost of countermeasure • Prioritize countermeasures by value of prioritization

  5. Step Threat A B C D 1 Cost if attack succeeds $500,000 $10,000 $100,000 $10,000 2 Probability of occurrence 80% 20% 5% 70% 3 Threat severity $400,000 $2,000 $5,000 $7,000 4 Countermeasure cost $100,000 $3,000 $2,000 $20,000 5 Value of protection $300,000 ($1,000) $3,000 ($13,000) 6 Apply countermeasure? Yes No Yes No 7 Priority 1 NA 2 NA Figure 1-19: Threat Severity Analysis

  6. Figure 1-18: The Plan—Protect—Respond Cycle • Planning • Security policies drive subsequent specific actions (see Figure 1-20) • Selecting technology • Procedures to make technology effective • The testing of technology and procedures

  7. Figure 1-20: Policy-Driven Technology, Procedures, and Testing Only allow authorized personnel to use accounting webserver Policy Technology (Firewall, Hardened Webserver) Procedures (Configuration, Passwords, Etc.) Protection Testing (Test Security) Attempt to Connect to Unauthorized Webserver

  8. Figure 1-18: The Plan—Protect—Respond Cycle • Protecting • Installing protections: firewalls, IDSs, host hardening, etc. • Updating protections as the threat environment changes • Testing protections: security audits

  9. Figure 1-18: The Plan—Protect—Respond Cycle • Responding • Planning for response (Computer Emergency Response Team) • Incident detection and determination • Procedures for reporting suspicious situations • Determination that an attack really is occurring • Description of the attack to guide subsequent actions

  10. Figure 1-18: The Plan—Protect—Respond Cycle • Responding • Containment Recovery • Containment: stop the attack • Repair the damage • Punishment • Forensics • Prosecution • Employee Punishment • Fixing the vulnerability that allowed the attack

More Related