Information Security on a Budget: Where to Invest First

Download Report

Transcript Information Security on a Budget: Where to Invest First

Information Security
on a Budget: Where
to Invest First
M. E. Kabay, PhD, CISSP
Assoc. Prof. Information Assurance
Dept. Computer Information Systems
Norwich University, Northfield, VT
[email protected]
http://www2.norwich.edu/mkabay/index.htm
1
Copyright © 2002 M. E. Kabay. All rights reserved.
Topics
 Policy, Power & Position
 Training and Awareness
 Hiring, Management and Firing
 System Administration
 Security Evaluations
2
Copyright © 2002 M. E. Kabay. All rights reserved.
Policy, Power & Position
 Policies must be living documents
 Assign responsibility for security
 CISO as equal of CEO, CFO. . .
 Status must not equal access
 Compliance depends on top-level support
3
Copyright © 2002 M. E. Kabay. All rights reserved.
Training and Awareness
 Training and awareness are not single events
 Social engineering can be fought only by
awareness and preparation
 Constant learning is essential
Formal courses & conferences
Web-based courses
Free resources on Web
Textbooks, magazines
Videofilms and DVDs
In-house courses from experts
4
Copyright © 2002 M. E. Kabay. All rights reserved.
Hiring, Management and
Firing
 Hiring
Check background carefully
Have candidates interviewed by future
colleagues
 Management
Sensitive to changes in behavior
Enforce vacations
 Firing
Shut down access
Retrieve corporate property
5
Copyright © 2002 M. E. Kabay. All rights reserved.
System Administration
 Establish Effective Security Configurations
 Maintain Software
 Detect Security Breaches
 Respond Intelligently to Incidents
6
Copyright © 2002 M. E. Kabay. All rights reserved.
Establish Effective Security
Configurations
 Default configurations often inadequate
 Firewalls need to implement thought-out
policy
 Network topology should reflect needs for
data partition
 Adapt network security to changing needs
 Evaluate anti-DDoS tools
7
Copyright © 2002 M. E. Kabay. All rights reserved.
Maintain Software
 Single most important problem: known
vulnerabilities
 Consult or subscribe to alerts
CERT/CC http://www.cert.org
Bundesammt für Sicherheit in der
Informationstechnik (BSI)
http://www.bsi.bund.de/
Common Vulnerabilities and Exposures
Database (CVE) ICAT Metabase
http://icat.nist.gov/icat.cfm
8
Copyright © 2002 M. E. Kabay. All rights reserved.
BSI
http://www.bsi.bund.de/
9
Copyright © 2002 M. E. Kabay. All rights reserved.
ICAT / CVE
http://icat.nist.gov/icat.cfm
10
Copyright © 2002 M. E. Kabay. All rights reserved.
Detect Security Breaches
 Quick response is valuable and economical
 Intrusion detection systems (IDS)
Not cheap
Learn / define normal patterns
Identify anomalies
Allow human response
 Total cost of acquisition, tuning and
management can be high
 But cost of undetected & uncontrolled
penetration can be higher
11
Copyright © 2002 M. E. Kabay. All rights reserved.
Respond Intelligently to
Incidents
 IDS useless without effective response plan
Computer Emergency Response Team
Also known as Incident Response Team
 Complex and expensive planning
Involvement from throughout organization
Most experienced personnel essential
 Link CERT/IRT to DRP and BCP
DRP = disaster recovery plan
BCP = business continuity plan
 May choose to use honeypots
System to delay intruder, study behavior
12
Copyright © 2002 M. E. Kabay. All rights reserved.
Security Evaluations
 Developing security policies may be too hard
Use existing guides
May use external help to reduce time spent
by expensive employees
 Checking security may be best done by
outsiders
Editing text is best done by someone else
Checking program source code is best
done by another programmer
Need to find trustworthy experts
Beware those who hire criminal hackers
Should test only after development &
training
13
Copyright © 2002 M. E. Kabay. All rights reserved.
DISKUSSION
14
Copyright © 2002 M. E. Kabay. All rights reserved.