Introduction To Information Security Management
Introduction To Information Security Management
Security Management
Course Covers
Introduction/Definitions
Physical security
Access control
Data security
Operating system security
Application security
Network security
Student Expectations
• Grading:
– 2 Homeworks
– Midterm
– Paper/project
• All submitted work is sole effort of student
• Students are interested in subject area
• Students have varied backgrounds
95752:1-
Information Revolution
• Information Revolution as pervasive at the
Industrial Revolution
95752:1-7
Vulnerability (2001)
Out-of-the-box Linux PC hooked to Internet, not announced:
[30 seconds] First service probes/scans detected
[1 hour] First compromise attempts detected
[12 hours] PC fully compromised:
– Administrative access obtained
– Event logging selectively disabled
– System software modified to suit intruder
– Attack software installed
– PC actively probing for new hosts to intrude
• Physical Restrictions
• Air Gapping
• Removable Media
• Remote Storage
• Structure
– Fencing, gates, other barriers
• Environment
– Lighting, signs, alarms
• Purpose
– Define property line and discourage trespassing
– Provide distance from threats
Middle Protective Layers
• Structure
– Door controls, window controls
– Ceiling penetration
– Ventilation ducts
– Elevator Penthouses
• Environment
– Within defined perimeter, positive controls
• Purpose
– Alert threat, segment protection zones
Inner Protective Layers
• Several layers
• Structure
– Door controls, biometrics
– Signs, alarms, cctv
– Safes, vaults
• Environment
– Authorized personnel only
• Purpose
– Establish controlled areas and rooms
Other Barrier Issues
• Handling of trash or scrap
• Fire:
– Temperature
– Smoke
• Pollution:
– CO
– Radon
• Flood
• Earthquake
Physical Restrictions
• Air Gapping Data
• Limits access to various security levels
• Requires conscious effort to violate
• Protects against inadvertent transmission
• Removable Media
• Removable Hard Drives
• Floppy Disks/CDs/ZIP Disks
• Remote Storage of Data
• Physically separate storage facility
• Use of Storage Media or Stand Alone computers
• Updating of Stored Data and regular inventory
Personnel Security Practices
• Insider Threat the most serious
• Disgruntled employee
• Former employee
• Agent for hire
• Personnel Training
• Critical Element
• Most often overlooked
• Background checks
• Critical when access to information required
• Must be updated
• CIA/FBI embarrassed
Activities or Events
• Publications, public releases, etc.
• Seminars, conventions or trade shows
• Survey or questionnaire
• Plant tours, “open house”, family visits
• Governmental actions: certification,
investigation
• Construction and Repair
NISPOM
National Industrial Security Program
Operating Manual
• Prescribes requirements, restrictions and other
safeguards for information
• Protections for special classes of information:
• National Security Council provides overall policy
direction
• Governs oversight and compliance for 20
government agencies
Methods of Defense
Overlapping controls
– Authentication
– Encryption
– Integrity control
– Firewalls
– Network configuration
– Application configuration
– Policy