美文网首页
C7 Information Security

C7 Information Security

作者: Scrummble | 来源:发表于2013-07-01 08:50 被阅读0次

Systems reliability ← (Confidentiality + Privacy + Processing integrity + Availability) ← Security

Fundamental Concepts

  1. Security is a management issue, rather than a technology one
  • Policy development
  • Effective communication of policies
  • Design and employment of appropriate control procedures
  • Monitoring & taking remedial action
  1. The time-based model of security
  • Focusing on the relationship of preventive, detective, and corrective controls
  • P>D+C → Effective
  1. Defense-in-depth
  • To employ multiple layers of controls to avoid single failures

Targeted Attacks

  1. Reconnaissance
  2. Attempt social engineering
  3. Scan & map the target
  4. Research
  5. Execute
  6. Cover tracks

Preventive Controls

  • Authentication controls: while accessing, verify the identify
  • Authorization controls: restricting specific portions and what actions permitted to perform
  • Access control matrix, compatibility test
  • Both for users and devices
  • Training
  • Importance of security, anti-social engineering, IS professionals, keep abreast, top-management support
  • Controlling physical access
  • Controlling remote access
  • Border router, firewall, DMZ (demilitarized zone), TCP / IP, routers
  • ACL (access control list), static / stateful packet filtering
  • Deep packet inspection, IPS (intrusion prevention systems)
  • Host & application hardening
  • Encryption: transforming plaintext to ciphertext (decryption)
  • Symmetric / asymmetric (private and public key)

Detective Controls

  • Log analysis
  • Intrusion detection systems
  • Managerial reports
  • Security testing

Corrective Controls

  • CERT (computer emergency response team)
  • CISO (chief information security officer)
  • Patch management

相关文章

网友评论

      本文标题:C7 Information Security

      本文链接:https://www.haomeiwen.com/subject/tkgxtttx.html