SlideShare a Scribd company logo
Sergey Grigorenko  CISSP CISA CISM  September 2009 PRRESENTATION
Purpose and scope Overview Threats Against Passwords GO-ITS 25.15 Security Controls How to meet this standard?   Questions? AGENDA Sergey Grigorenko  CISSP CISA CISM  September 2009
The purpose  of this presentation is to assist OPS in understanding of GO-ITS 25.15 “Security Requirements for Password Management and Use” Standard requirements and common threats against their character-based passwords and how to mitigate those threats within the cluster or enterprise.  PURPOSE AND SCOPE Sergey Grigorenko  CISSP CISA CISM  September 2009 Non-character-based passwords, such as graphic-based passwords, Biometrics, Digital Certificates and Authentication Protocols, are outside the scope of this presentation. Audience:   This presentation is for non technical stuff and program managers who can use the information presented to facilitate the decision-making processes associated with password management, such as password policy creation.  Duration:   5-7 minutes
Information Security OVERVIEW Sergey Grigorenko  CISSP CISA CISM  September 2009 Information security is the protection of information and information systems from: unauthorized access use  disclosure  disruption  modification or destruction .  Information security is achieved by ensuring the: confidentiality   Integrity availability  of information (CIA)
Security Architecture OVERVIEW Sergey Grigorenko  CISSP CISA CISM  September 2009 Business requirements Regulatory requirements A N A L Y S I S * POLICIES * ** STANDARDS ** *** PROCEDURES  AND  GUIDELINES ***  Administrative Controls MONITOR, REPORT AND IMPROVE GO-ITS 25.15 Technical Controls Firewalls Intrusion detection prevention Access control System Hardening Physical Controls Guards CCTV Lockers Alarm systems
OVERVIEW Sergey Grigorenko  CISSP CISA CISM  September 2009 The cost of data loss for 2008: $50.00 - $200.00 per a record –  215 million records lost since January 2008 = $11 to $430 Billion –  $6.3 million per company incident.  /Gartner/
OVERVIEW Sergey Grigorenko  CISSP CISA CISM  September 2009 The objective of  GO-ITS 25.15  Standard  is to ensure  that the  management  and  use  of passwords to access Government of Ontario information and information technology is effective, and assists in the mitigation of unacceptable risks to those resources.   “ Security Requirements for Password Management and Use”   Standard number  25.15  has been created by Information  Technology Standards Council ( ITSC ) to sets out security  requirements for password management  and use.
OVERVIEW What the password is? A  password  is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource. Identification   is a claimant presenting an identifier (username) that indicates a user identity for the system.  Authentication  is the process of establishing confidence in the validity of a claimant’s presented identifier. Passwords are used in many ways to protect data, systems, and networks. For example, passwords are used to authenticate users of operating systems, applications (e.g., email, labor recording), hardware, and remote access solutions. Sergey Grigorenko  CISSP CISA CISM  September 2009
Threats Against Passwords Sergey Grigorenko  CISSP CISA CISM  September 2009 In order to protect users and organization from a password attack, we have to understand of the various threats and tactics
Threats Against Passwords Sergey Grigorenko  CISSP CISA CISM  September 2009 Brute force attack-  the attacker attempts to guess the password using all possible  combinations of characters  Dictionary attack  -the attacker attempts to guess the password using a list of possible  passwords Password   Calculator .  http:// lastbit.com/pswcalc.asp
GO-ITS 25.15 Security Controls Sergey Grigorenko  CISSP CISA CISM  September 2009 Passwords  must  contain at least 8 characters  Passwords  must  contain at least one digit and at least one upper case and one lower case letter User passwords  must  be tested for strength  on a periodic basis  Passwords themselves are highly sensitive and  must  be protected accordingly
Threats Against Passwords Sergey Grigorenko  CISSP CISA CISM  September 2009 Users may also reveal their passwords to attackers because of  social engineering .  Users  must  not disclose their passwords to anyone else  Users  must  immediately change any disclosed or compromised passwords  For example, an attacker could pretend to be a help desk agent, call a user, and ask the user  to provide a password to assist the agent in troubleshooting a problem.  Sniffing  may occur as passive eavesdropping or active interception, such as a  man-in-the-middle attack  with an attacker serving as an intermediary through which messages between two other systems pass.  Capturing   is an attacker acquiring a password from storage, transmission, or user knowledge and behavior.  Initial passwords  must  be communicated to the user directly in person, by telephone or by encrypted email  Passwords  must  be encrypted in storage and in transmission Unencrypted passwords or credential information  must  not be cached
How to meet this standard? Sergey Grigorenko  CISSP CISA CISM  September 2009 Create a password policy that specifies all of the organization’s  password management-related requirements Establish clear process for password management and use (procedures an guidelines)  Communicate and enforce these requirements to the end user through awareness program and monitoring
September 2009 Sergey Grigorenko  INFO@SERGRI.NET  September 2009 QUESTIONS?  References: NIST Special Publication 800-118  Guide to Enterprise Password Management  Government of Ontario IT Standard (GO-ITS) 25.15 (V.1.3)

More Related Content

PDF
Cybersecurity Myths for Small and Medium-Sized Businesses
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Simple and-smart-security-tips-for-website -design-orange949
PPT
Class4 Security
 
PPTX
Navigating Cybersecurity
PPTX
PDF
IS Decisions Company Overview. Solutions to secure your Windows Network.
PDF
Security VoIP Assessment
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Simple and-smart-security-tips-for-website -design-orange949
Class4 Security
 
Navigating Cybersecurity
IS Decisions Company Overview. Solutions to secure your Windows Network.
Security VoIP Assessment

What's hot (18)

PDF
Psb mobile security
PPTX
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
PDF
What is SIEM? A Brilliant Guide to the Basics
PDF
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
PDF
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
PDF
Protect your video meetings
PDF
Cyber Security 2017 Challenges
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PPTX
Keeping up with the Revolution in IT Security
PDF
PPTX
Threat Modelling And Threat Response
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
PDF
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
PDF
Cyber Security vs IT Security in 2 mins
PDF
IT Security - Guidelines
PDF
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
PPT
Information Security
Psb mobile security
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
What is SIEM? A Brilliant Guide to the Basics
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Protect your video meetings
Cyber Security 2017 Challenges
The Cyber Security Landscape: An OurCrowd Briefing for Investors
Keeping up with the Revolution in IT Security
Threat Modelling And Threat Response
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Cyber Security vs IT Security in 2 mins
IT Security - Guidelines
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Information Security
Ad

Viewers also liked (6)

PPTX
2010 BPTW
PPTX
CFO slide show
PPTX
BCC slide show
PPT
1º e.s.o. inicio curso
PDF
Open Operative Treatment for Anterior Shoulder Instability | Orthopedic Surge...
PPTX
Steamboat photos
2010 BPTW
CFO slide show
BCC slide show
1º e.s.o. inicio curso
Open Operative Treatment for Anterior Shoulder Instability | Orthopedic Surge...
Steamboat photos
Ad

Similar to Go Its 25 15 (20)

PPTX
System Security
PPT
Dr. Alan Shark
PPT
ch_01 Introduction.ppt ( information cyber security)
PDF
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
PDF
Need for cyber security
PDF
PPT
Presentation2f_for_passwords_MS_Class.ppt
PPTX
Year 7 e-safety part 1
PPTX
I MSc CS CNS Day 1.pptx
PDF
A01450131
PPTX
Unit - I cyber security fundamentals part -1.pptx
PDF
MIS 428 information secuirty v1.pdf
PPTX
Security in network computing
PDF
wireless networking chapter three WAN.pdf
PPTX
Security Threats
PPTX
Communication security
PDF
Computer security
PDF
Cyber security
PPT
Security R U Totally Secure !
PPT
Infomation System Security
System Security
Dr. Alan Shark
ch_01 Introduction.ppt ( information cyber security)
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
Need for cyber security
Presentation2f_for_passwords_MS_Class.ppt
Year 7 e-safety part 1
I MSc CS CNS Day 1.pptx
A01450131
Unit - I cyber security fundamentals part -1.pptx
MIS 428 information secuirty v1.pdf
Security in network computing
wireless networking chapter three WAN.pdf
Security Threats
Communication security
Computer security
Cyber security
Security R U Totally Secure !
Infomation System Security

Go Its 25 15

  • 1. Sergey Grigorenko CISSP CISA CISM September 2009 PRRESENTATION
  • 2. Purpose and scope Overview Threats Against Passwords GO-ITS 25.15 Security Controls How to meet this standard? Questions? AGENDA Sergey Grigorenko CISSP CISA CISM September 2009
  • 3. The purpose of this presentation is to assist OPS in understanding of GO-ITS 25.15 “Security Requirements for Password Management and Use” Standard requirements and common threats against their character-based passwords and how to mitigate those threats within the cluster or enterprise. PURPOSE AND SCOPE Sergey Grigorenko CISSP CISA CISM September 2009 Non-character-based passwords, such as graphic-based passwords, Biometrics, Digital Certificates and Authentication Protocols, are outside the scope of this presentation. Audience: This presentation is for non technical stuff and program managers who can use the information presented to facilitate the decision-making processes associated with password management, such as password policy creation. Duration: 5-7 minutes
  • 4. Information Security OVERVIEW Sergey Grigorenko CISSP CISA CISM September 2009 Information security is the protection of information and information systems from: unauthorized access use disclosure disruption modification or destruction . Information security is achieved by ensuring the: confidentiality Integrity availability of information (CIA)
  • 5. Security Architecture OVERVIEW Sergey Grigorenko CISSP CISA CISM September 2009 Business requirements Regulatory requirements A N A L Y S I S * POLICIES * ** STANDARDS ** *** PROCEDURES AND GUIDELINES *** Administrative Controls MONITOR, REPORT AND IMPROVE GO-ITS 25.15 Technical Controls Firewalls Intrusion detection prevention Access control System Hardening Physical Controls Guards CCTV Lockers Alarm systems
  • 6. OVERVIEW Sergey Grigorenko CISSP CISA CISM September 2009 The cost of data loss for 2008: $50.00 - $200.00 per a record – 215 million records lost since January 2008 = $11 to $430 Billion – $6.3 million per company incident. /Gartner/
  • 7. OVERVIEW Sergey Grigorenko CISSP CISA CISM September 2009 The objective of GO-ITS 25.15 Standard is to ensure that the management and use of passwords to access Government of Ontario information and information technology is effective, and assists in the mitigation of unacceptable risks to those resources. “ Security Requirements for Password Management and Use” Standard number 25.15 has been created by Information Technology Standards Council ( ITSC ) to sets out security requirements for password management and use.
  • 8. OVERVIEW What the password is? A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource. Identification is a claimant presenting an identifier (username) that indicates a user identity for the system. Authentication is the process of establishing confidence in the validity of a claimant’s presented identifier. Passwords are used in many ways to protect data, systems, and networks. For example, passwords are used to authenticate users of operating systems, applications (e.g., email, labor recording), hardware, and remote access solutions. Sergey Grigorenko CISSP CISA CISM September 2009
  • 9. Threats Against Passwords Sergey Grigorenko CISSP CISA CISM September 2009 In order to protect users and organization from a password attack, we have to understand of the various threats and tactics
  • 10. Threats Against Passwords Sergey Grigorenko CISSP CISA CISM September 2009 Brute force attack- the attacker attempts to guess the password using all possible combinations of characters Dictionary attack -the attacker attempts to guess the password using a list of possible passwords Password Calculator . http:// lastbit.com/pswcalc.asp
  • 11. GO-ITS 25.15 Security Controls Sergey Grigorenko CISSP CISA CISM September 2009 Passwords must contain at least 8 characters Passwords must contain at least one digit and at least one upper case and one lower case letter User passwords must be tested for strength on a periodic basis Passwords themselves are highly sensitive and must be protected accordingly
  • 12. Threats Against Passwords Sergey Grigorenko CISSP CISA CISM September 2009 Users may also reveal their passwords to attackers because of social engineering . Users must not disclose their passwords to anyone else Users must immediately change any disclosed or compromised passwords For example, an attacker could pretend to be a help desk agent, call a user, and ask the user to provide a password to assist the agent in troubleshooting a problem. Sniffing may occur as passive eavesdropping or active interception, such as a man-in-the-middle attack with an attacker serving as an intermediary through which messages between two other systems pass. Capturing is an attacker acquiring a password from storage, transmission, or user knowledge and behavior. Initial passwords must be communicated to the user directly in person, by telephone or by encrypted email Passwords must be encrypted in storage and in transmission Unencrypted passwords or credential information must not be cached
  • 13. How to meet this standard? Sergey Grigorenko CISSP CISA CISM September 2009 Create a password policy that specifies all of the organization’s password management-related requirements Establish clear process for password management and use (procedures an guidelines) Communicate and enforce these requirements to the end user through awareness program and monitoring
  • 14. September 2009 Sergey Grigorenko INFO@SERGRI.NET September 2009 QUESTIONS? References: NIST Special Publication 800-118 Guide to Enterprise Password Management Government of Ontario IT Standard (GO-ITS) 25.15 (V.1.3)