Cyber Security M1 & M2
Cyber Security M1 & M2
Module 1
Effective cybersecurity -defense.
defect in one part of the software could affect any other part of the system
Many of the defects in patch updates are security related, either discovered
by the vendor, external security researchers, or from malware caught in the
wild.
Add-on applications such as QuickTime for Windows, Acrobat, Chrome, and many
others are frequent sources of security warnings
The lag between the patch release and the installed update creates a vulnerability
window for attackers.
Announcement of the vulnerability and the binary patch gives attackers clues
about how to exploit the weakness.
Known Exceptions
If software product support has expired and there are no further vendor
updates, migration to a supported version is strongly recommended.
Some vendors, will continue to support the product with security patches for
an additional fee
Refactored Solution and Examples
A first step toward managing your patches is obtaining an inventory of systems and
installed software packages
small networks, you can enable automatic updates on Windows and applications
such as Acrobat and Firefox
For other applications, such as video drivers, you might have to update from the
vendor’s website
If there are serious vulnerabilities announced for your applications, follow the
Patch Available links and install the patches
many shops are adopting vulnerability scanning tools, such as Retina from
eEye, Nessus from Tenable, and NeXpose from Rapid7.
Tools are often used for security certification testing prior to system release.
By creating locked-down standard system images, data centers are able to deploy
virtual servers which conform to security baselines, and perform mass updates to
these configurations to apply patches and other changes.
3. Never Read the Logs
Antipattern Solution
Network operating centers (NOC) are facilities with large colorful displays of
system and network status are monitored .
The alerting rules are usually set to eliminate false positive alarms.
For example, Intrusion Detection System (IDS) rules and Intrusion Prevention
Systems (IPS) that cause false alarms are disabled
A network operations center (NOC) is a centralized location where
computer, telecommunications, or satellite networks systems are monitored and
managed 24x7.
It is the first line of defense against network disruptions and failures.
Refactored Solution and Examples
Reading the logs is an essential periodic activity; without it, you miss a lot of
unusual, suspicious, and erroneous activity on your networks.
Review the system security event logs, system logs, network device logs, and
IDS/IPS logs regularly.
Do not always depend on the versions in the centralized log manager, but
periodically audit the local logs and make sure that they are accurately
reflected in the central logs.
An event log is a file that contains information about usage and operations of
operating systems, applications or devices
System Log (syslog): a record of operating system events. It includes startup
messages, system changes, unexpected shutdowns, errors and warnings, and other
important processes.
Network device logging is the process of documenting every event that
takes place on a device
4 Networks Always Play by the Rules
Antipattern Solution
The Internet was not designed with security in mind
What you can do is use cybersecurity best practices to make your systems
hard targets.
For example, harden system configurations according to best-practice
guidelines.
How internet continue to evolve and what implications does this have for
future business models?
explore the impact of the internet on business models, the role of public and
private collaborations in enabling innovation, the key policy, governance and
security considerations that need to be addressed, and future implications
of the internet evolution
Hard on the Outside, Gooey in the Middle
Antipattern Solution
Between the DMZ and intranet, there are network security devices,
including a firewall and possibly an IDS/IPS
most packet traffic is concentrated on very few outgoing ports, primarily:
For larger networks, with extensive information assets, intranet security should
be carefully designed.
Antipattern Solution
Stuxnet worm—which proliferated widely in the Middle East and Asia but only
targeted very specific SCADA devices—proved that targeted attacks on SCADA
systems are much more than theoretical.
Web browsers are a user interface platform for applications, called thin clients.
Users are in the habit of opening multiple browser tabs and connecting with
multiple websites.
VPNs are a widely deployed technology; one wonders why VPNs aren’t used
universally.
Related Solutions
To prevent XSS and other attacks, the American Banker’s Association recommends
using a dedicated, physically separate computer for all financial transaction.
No Time for Security
Background
Security is usually the final consideration in the development of a system.
Sometimes security is left out altogether in the rush to get products out the door.
Antipattern Solution
developers, often wait until the end of the development lifecycle to address
security.
Near the date that the enterprise release process will test security vulnerabilities,
managers and developers begin a madcap cover-up process to obscure inherently
insecure software, user account, and configuration practices.
Refactored Solution and Examples
Security risks and requirements should be analyzed early in the development cycle at
the same time as functional requirements
Related Solutions
select security and audit controls using the
Consider the complexity of this building and all other Federal buildings.
Then consider the furniture inside, which is movable; the equipment, such as copy
machines and telephones; and finally the computers that are changing in real time
as new systems are added, relocated, upgraded, and updated.
The columns are the six basic questions you could ask about any subject.
These interrogatives include: What? How? Where? Who? When? Why
executives,
business management,
architects,
engineers,
technicians, and
users
Each row-column intersection in the Zachman Framework is
a cell to be populated with models and specifications, which
are representations of the enterprise.
The risk executive ensures- IT system will consider security risk from day one
first actions that the risk executive should take is to establish an “auditor”
Everyone Has Their Own Specifications
If the models are not meeting your needs or you don’t know how to organize them,
you can reorganize them using the Zachman Framework.
-Row 2 models help people visualize the enterprise, you now have a new
basis for fact-based decision making.
Frameworks for Row 3 architect’s perspective
People in the North Atlantic Treaty Organization (NATO) would choose the
British Ministry of Defense Architecture Framework (MoDAF)
RM-ODP and the industry consortia driving its usage, the Telecommunication
Information Networking Architecture Consortium (TINA-C)
Architectural Problem Solving Patterns
Keep a list of what you found, the enterprises’ text defining it, and the document
and page number where it can be found (for traceability).
Completing document mining for all the interrogatives will populate Row 1.
3. Hierarchy Formation:
Play a cards-on-the-wall exercise with small groups and organize each list
into a hierarchy, possibly inventing some new categories in the middle of
the tree.
Bring the posters and some binders with the Row 1 definitions to a workshop with
enterprise stakeholders.
Have the enterprise take ownership of the meeting and walk through each
hierarchy to validate the models.
Keep track of each relationship, including document, quoted text, and page
number.
Choose a column and go through each document to find examples. Keep a list of
what you find, the enterprises’ text defining it, and the document and page
number where it’s located (for traceability).
Completing document mining for all the interrogatives will populate Row 1.
Vet the results with the customer leads, after hierarchy formation
Background
Interviews are a weak data -information depends on one person’s opinion, which
varies by their personal situation each day.
Include some information that ties each primitive back to the Excel listing
(the row number) or the source document (document name and page
number).
Procedure
Then all rows with Super ID 0 are directly under the root.
Each new node has a unique ID number, and nodes that use
its ID as their Superior ID are child nodes.
Click Create
Click Next and then click Finish
Background
The customer review team is a larger group than the customer leads, whose
consensus will be required to proceed to implementing the problem solution.
Preparation
Create large-format posters for the hierarchies.
Include some information that ties each sticky wall item back to its
definition.
Procedure
Bring the posters and some binders with the Row 1 definitions
to a workshop with enterprise stakeholders.
Preparation
Reuse the documents collected for document mining.
Procedure
Carefully review the documents for cross-column relationships—that is, a
sentence involving more than one column, for example, a role and a
process.
Keep track of each relationship, including document, quoted text, and the
page number.
Preparation
The facilitator and business owner prepare a seed question that is written on a flipchart.
The facilitator brings slips of paper, spare pens, and wastebasket.
Procedure
The facilitator explains the technique and distributes slips of paper. The group silently
writes to the question for a set period, typically 5 or 10 minutes.
The facilitator directs the group to crumple up their ideas and throw them into the
wastebasket, which the facilitator playfully carries and tries to make a game of it.
The facilitator then redistributes the slips of paper randomly, and the papers are read
aloud round robin. As the papers are read, they are recorded on the flipchart by the
facilitator or someone in the recorder role.
The ideas are then numbered. The facilitator asks people to define the ideas, and asks
if there are any duplicates or ideas that should be combined. The final step is to take a
straw poll.
Have people pick the best two or three ideas and the facilitator calls for the votes and
records the results.
Review and conduct a focused discussion of the priorities generated. The discussion
could then transition to action planning.
Minipatterns for Problem Solving Meetings
These minipatterns are additional techniques to round out your meeting facilitation
skills.
Techniques such as breakouts and the idea parking lot are classic approaches for
conducting effective meetings
The facilitator can ask that the group form small discussions to address a particular
question, and then have them report back their conclusions subgroup by subgroup.
Another approach is to quickly generate a list of topics or concerns and then have
each breakout take one problem to solve as a subgroup before debriefing the general
session
Flipcharts
Unlike a computer or a whiteboard, flipcharts give a group unlimited space
for creativity.
Flipcharts are group notes; people do not need to be taking their own notes;
they can have their heads up and be fully engaged in the meeting.
If you plan an agenda, plan the time of each meeting topic, and stick to it.
Or ask the group if they want to extend the time.
Idea Parking
Lot Post a separate flipchart to capture ideas that are outside the meeting’s
purpose.
Revisit these ideas at the end of the meeting and decide as a group how
they should be addressed.