




下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、INFORMATION SECURITY CONTROLS,STUDY UNIT 18,PART 5 -TRICKY BITS,Company Logo,INTRODUCTION,Company Logo,Describe the main information security controls and explain how each mitigates risk, including:,Company Logo,LEARNING OBJECTIVES,1,2,3,4,Describe system software controls, and explain how they miti
2、gate risk.,Describe database controls, and explain how they mitigate risk.,Describe internet and e-commerce controls, and explain how they mitigate risk.,Describe network controls, and explain how they mitigate risk.,After completing this unit you should be able to,Company Logo,NETWORK CONTROLS,A ra
3、nge of controls is required to achieve and maintain security in computer networks,Company Logo,the following items should be considered:,Operational responsibility for networks should be separated from computer operations where appropriate. Responsibilities and procedures for the management of remot
4、e equipment, including equipment in user areas, should be established. If necessary, special controls should be established to safeguard the confidentiality and integrity of data passing over public networks, and to protect the connected systems. Special controls may also be required to maintain the
5、 availability the network services and computers connected. Management activities should be closely co-ordinated both to optimize the service to the business and to ensure that controls are consistently applied across the information processing infrastructure.,Company Logo,NETWORK DOMAIN SEGREGATION
6、,Connecting networks might increase the risk of unauthorized access and so the introduction of controls within the network to segregate groups of information services, users and information systems should be considered.,Company Logo,Learning activity 18.1,Review the use of network connections within
7、 your own organization. Where do you use a router, bridge and firewall and what is their purpose? Typical answers may be :,Company Logo,CONNECTION LIMITATIONS,Restrictions on connection times should provide additional security for high-risk terminals or application, as they reduce the window of oppo
8、rtunity for unauthorized access. Examples of such restrictions might include:,Company Logo,This process should cover:,Review of application control and integrity procedures to ensure that they have not been compromised by the operating system changes Ensuring that the annual support plan and budget
9、will cover reviews and system testing resulting from operating system changes Ensuring that appropriate changes are made to the business continuity plans The inventories developed as part of the asset management processes will indicate which machines are capable of being upgraded.,Company Logo,User
10、should be discourages from downloading or installing software patches unless:,Company Logo,Company Logo,Software defaults,Systems are frequently dispatched with security mechanisms set to the unsafe condition by default. The intent is that after the systems are configured and otherwise stable, the a
11、dministrator will reset the controls to the safe condition. However the risk is that in practice, so as not to interfere with running systems, administrator may be reluctant to alter the default setting.,Company Logo,Database security,1,Development of Database Security,Company Logo,Database security
12、,4,Security Challenges,Company Logo,Traditional computing environment Authentication , authorisation and auditing controls were implemented at the server-based operating system level where the initial user log-in took place through some kind of terminal or workstation .These control verified the use
13、rs identity and then defined the degree to which that user had access to computing resources, software application and data .,Development of Database Security,Company Logo,Relational database management systems (RDBMS) RDBMS were introduced to standardize the data held and thus to reduce the inaccur
14、acy and inefficiency of holding (potentially) differing data elements previously stored in different files .The result was a new environment which co-existed with traditional file systems.,Development of Database Security,Company Logo,client/server security challenges,The software application and re
15、lational database will run on two or more different physical computer systems,often with the software application residing on the client and the data in a relational database on the server,Company Logo,client/server security challenges,Database network software facilitates a direct connection of the
16、 user from the workstation to the database ,the user is not required to log-in to the server operating system on which the database resides, thus bypassing the benefits of its security features. In fact ,the user may not even have a user ID set up at the server operating systems level .,Company Logo
17、,client/server security challenges,Unfortunately ,security control are not always easily or effectively implemented on the client system,usually due to weakness in the design of operating system and also the inherent risk of the user being able to physically access the workstation . And also, there
18、are both functional and operational obstacle that to be surmounted to implement sound security at the database level.,Company Logo,The improper modification of data.,The improper release of information from reading data accessed by unauthorized users intentionally or accidentally.,Denial-of-service
19、threats.,Database security categories,1,2,3,Company Logo,Authentication,Authentication is the process by which it is verified that a user or entity requesting access to data or a computer resource is in fact who they represent themselves to be. (It is concerned with the specification of what data an
20、d computer resources the users should be allowed to access and to what degree access should be granted),Company Logo,Authentication,Disadvantage While relational databases provide the ability to prompt a user for a password before allowing access, features to enforce the use of strong passwords are
21、often limited. Some databases do not even provide a simple interface by which the end user can change their own password. They may also lack the ability to detect possible break-ins and automatically disable a user id that may be under attack. If the database does include such a feature, it often la
22、cks the ability to enable it selectively by user ID. Sometimes there is no option but to only generate an alert to the security console instead of disabling the user ID, which can bring down an entire application or the database.,Company Logo,Authentication,To mitigate the risk of a password guessin
23、g attack ,all database passwords need to be frequently changed and well chosen. Strong authentication controls should also include a review of all users accounts and a justification for their existence should be done periodically. Users authorization can be set at the database level by granting priv
24、ileges and roles to the database user ID and by setting a appropriate access controls on specific database objects such as tables.,Company Logo,Access control,Access to specific data elements should be limited to authorized users only.,Company Logo,Reviewing audit trails,reviewing patterns of access
25、,Supporting strong authentication and authorization controls , audit trails act as a deterrent and assist in detecting possible security breaches or intrusions, by :,identifying attempts to bypass system controls,Company Logo,Hot Tip,Auditing should provide a database security officer with a managea
26、ble set of data that can be analysed to detect whether the system is intact and working effectively and , if appropriate , where in the security scheme violations have taken place and by whom.,Company Logo,audit trails allow for the detection of security breaches-often referred to as intrusion detec
27、tion-and also help to ensure data integrity . audit trails must be detailed enough to reveal such items as the before and after values on changes made to data,Company Logo,Database auditing is an essential requirement for security . organizations should define their auditing strategy based on their
28、knowledge of the application or database activity . it is not , however , necessary to audit everything , as specific auditing will better highlight any problems.,Company Logo,Audit policy,1,2,3,An audit policy is a statement of high-level rules , goals and practices that describe how the organizati
29、on collects , manages and protects its audit data,The audit policy can help to delineate which audit options are to used : part , some ,or all of the time .,the audit policy may vary depending on the level of risk and the perceived threats.,Company Logo,three key issues that should be included withi
30、n an audit database policy,Company Logo,Electronic commerce security,electronic commerce can involve the use of electronic data interchange (EDI), e-mail and online transactions across public networks such as the internet . electronic commerce is vulnerable to a number of network threats , which may
31、 result in fraudulent activity , contract dispute , and disclosure or modification of information .,Company Logo,Security considerations for electronic commerce should include the following:,Company Logo,Company Logo,Company Logo,the person authorizing the transaction,a second signatory if over a ce
32、rtain prescribed value,the sender,For EDI transactions , particularly those involving the transfer or movement of money , it may be appropriate to have a number of authorized users , such users could include:,1,2,3,4,the person raising the transaction,Company Logo,EDI systems covering order handing
33、need to be able to handle message sequencing to prevent the re-transmission or receipt of the same message multiple times . in addition there will need to be a process to cope with repudiation where the sender or receiver denies knowledge of the message . this can be handled by the use of digital ce
34、rtificates.,Company Logo,Who carries the risk for any fraudulent transactions?,The organization,Company Logo,Message authentication,Message authentication is used to detect unauthorized changes to , or corruption of , the contents of a transmitted electronic message . it can be implemented in hardwa
35、re or software as appropriate. Message authentication should be considered for applications where there is a security requirement to protect the integrity of the message content .,Company Logo,Message authentication may also need to be supplemented by other controls such as :,Sequencing-Message have
36、 some form of sequence number control.,Non-repudiation-There needs to be some form of proof of origination or delivery to ensure that the sender, or receiver, cannot claim that they have no knowledge of the message .,Company Logo,SECURE ELECTIONIC TRANSACTION (SET),The secure electronic transaction
37、protocol was launched in 1996 as a common technical standard designed to meet these needs and to protect payment card purchase over the internet .it provides secure support for all popular and emerging internet payment methods ,including credit , debit and chip cards, and its adoption is driven by S
38、ET Co , an organization established and supported by MasterCard and Visa.,Company Logo,SECURITY OF E-MAIL,Its security risks include:,1.vulerability of message to unauthorized access or modification or denial of service .,2.vulnerability to error such as incorrect addressing or misdirect ,and the ge
39、neral reliability and availability of the service,3.impact of a change of communication media on business processes, including the effect of increased speed of dispatch or the effect of sending formal messages from person to person rather than company to company.,Company Logo,Its security risks incl
40、ude:,4.legal considerations ,such as the potential need for proof of origin, dispatch, delivery and acceptance.,5.implicatios of publishing externally accessible staff lists,6.cintrolling remote user access to electronic mail accounts,Company Logo,A number of process and policies need tobe put in pl
41、ace to protect the organization. these could include:,1.disclaimer notices on all e-mail to indicate that the sender speaks for him/ herself rather than the or the organization .,2.making users aware of the type of material that can be disclosed using electronic transmission,3.a statement that e-mai
42、ls are the property of the organization and right is reserved to inspect them without notice,4.a statement that the e-mail system is not there for private purposes.,5.checking attachments received by e-mail before they are allowed into the organization.,Company Logo,FIREWALL,A firewall is a speciall
43、y configured device providing a controllable means of connecting one or more networks.,A firewall offers two basic configurations :,1.deny all where nothing is allowed through unless the firewall is deliberately configured to accept it,2.accept all where everything is accepted and only those things
44、expressly denied are not allowed to pass,Company Logo,DE-MILITARISED ZONE,In order to maintain a fully secure environment ,there should be a e-militarised zone behind the firewall. this network will contain all the tools for ensuring that the internal network is only used for authorized staff.,Company Logo,1、virus scanner to scan incoming files and electronic mail attachments,2、hostile applet scanner to prevent ActiveX or Java applets from damaging internal systems,3、remote authentication software to u acc
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 科技赋能展览-洞察及研究
- 酒精性心肌病药物-洞察及研究
- 惠安县二模数学试卷
- 智能营销中的用户画像精细化-洞察及研究
- 2022年贵阳市六年级语文第三单元考试试卷
- 2022年格尔木市四年级语文第六单元考试试卷
- 企业社会责任与可持续发展目标(SDGs)2025年实践案例研究
- 2025版地毯产品定制化生产与销售合同
- 二零二五年度航空航天材料研发成果转让保密协议
- 二零二五年建筑工程造价审核与咨询服务协议
- 《人工智能在军事应用中的前沿技术》课件
- 2025四川眉山市国有资本投资运营集团有限公司招聘50人笔试参考题库附带答案详解
- 避孕药具随访管理制度
- T-SDFA 050-2024 混合型饲料添加剂中阿奇霉素的测定 液相色谱-串联质谱法
- 2025年三聚氰胺表面板行业深度研究分析报告
- 2025年中考化学试题及答案内蒙
- 消防火灾自动联动系统-实训指导书
- T-CCPS 0014-2024 国有企业合规管理体系有效性评价原则与实施指南
- 《煤矿安全生产责任制》培训课件2025
- 手机通话的流程
- DB22-T 389.1-2025 用水定额 第1部分:农业
评论
0/150
提交评论