Title: Figure 1-17: Security Management
1Figure 1-17 Security Management
- Security is a Primarily a Management Issue, not a
Technology Issue - Top-to-Bottom Commitment
- Top-management commitment
- Operational execution
- Enforcement
2Figure 1-17 Security Management
- Comprehensive Security
- Closing all avenues of attack
- Asymmetrical warfare
- Attacker only has to find one opening
- Defense in depth
- Attacker must get past several defenses to
succeed - Security audits
- Run attacks against your own network
3Figure 1-17 Security Management
- General Security Goals (CIA)
- Confidentiality
- Attackers cannot read messages if they intercept
them - Integrity
- If attackers change messages, this will be
detected - Availability
- System is able to server users
4Figure 1-18 The PlanProtectRespond Cycle
- Planning
- Need for comprehensive security (no gaps)
- Risk analysis (see Figure 1-19)
- Enumerating threats
- Threat severity estimated cost of attack X
probability of attack - Value of protection threat severity cost of
countermeasure - Prioritize countermeasures by value of
prioritization
5Figure 1-19 Threat Severity Analysis
6Figure 1-18 The PlanProtectRespond Cycle
- Planning
- Security policies drive subsequent specific
actions (see Figure 1-20) - Selecting technology
- Procedures to make technology effective
- The testing of technology and procedures
7Figure 1-20 Policy-Driven Technology,
Procedures, and Testing
Only allow authorized personnel to use accounting
webserver
Policy
Technology (Firewall, Hardened Webserver)
Procedures (Configuration, Passwords, Etc.)
Protection
Testing (Test Security)
Attempt to Connect to Unauthorized Webserver
8Figure 1-18 The PlanProtectRespond Cycle
- Protecting
- Installing protections firewalls, IDSs, host
hardening, etc. - Updating protections as the threat environment
changes - Testing protections security audits
9Figure 1-18 The PlanProtectRespond Cycle
- Responding
- Planning for response (Computer Emergency
Response Team) - Incident detection and determination
- Procedures for reporting suspicious situations
- Determination that an attack really is occurring
- Description of the attack to guide subsequent
actions
10Figure 1-18 The PlanProtectRespond Cycle
- Responding
- Containment Recovery
- Containment stop the attack
- Repair the damage
- Punishment
- Forensics
- Prosecution
- Employee Punishment
- Fixing the vulnerability that allowed the attack