SlideShare a Scribd company logo
Internal IT Security in SA Problems & Solutions
Agenda 1.  Introduction 2.   Considering the global Risk 3.  Understanding your own Risk 4.  Case Study 5 . Setting the Stage 6.   Implementing Solutions 7.  The role and value of IDS 8.  Questions
Introduction About me About Roelof SensePost Objective Approach References: http://wips.sensepost.com/knowthyself.zip http://www.sensepost.com [email_address] [email_address]
Understanding the global Risk What we know: There is a threat to our Information Resources The threat has direct financial implications The threat is growing A large part of the threat is internal There are a number of distinguishable trends http://www.gocsi.com/prelea990301.htm http://www.saps.org.za What we don’t know: How accurate are the statistics? Are international statistics relevant in SA? What does this all mean to me?
Universal Threats Data Confidentiality Information is the currency of business today Customers,  Strategy, Financials, HR, Personal Data Integrity The accuracy and reliability of the information Determines the value of information Reputation / Credibility The market’s perception of your competence Web site defacement Denial of Service Prevent a system from performing their intended function EBay, Yahoo, Edgars
Agenda 1. Introduction 2.  Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6.  Implementing Solutions 7. The role and value of IDS 8. Questions
Understanding your own Risk What is Risk? Valuable resources + exploitable technology What is “Secure”? When the financial losses incurred are at an acceptable level Your “Risk-Profile”: The value of your Information The degree of technological vulnerability A level of loss that is acceptable to you Unique to your organisation. Today. The value of surveys and statistics Highlight the existence of threats Indicate trends and phases Create an awareness
Your own unique risk profile IT Security Assessment Make informed decisions on how to spend Time Money People An effective assessment: Independent and Objective Business aware but technology focused Prove its worth Concrete, practical recommendations Finite Honest Recursive...
Recursive Security Assessments Delta Testing Monitor the effect of changes New exploits and vulnerabilities Staying  secure in a global battlefield Improved Methodologies Tools, techniques, philosophies etc. Innovation A chance to get to know you Extended Scope There’s  never  enough time Enhanced Scope Moving toward a zero-default environment...
Agenda 1. Introduction 2.  Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6.  Implementing Solutions 7. The role and value of IDS 8. Questions
Welcome to the case study Mind of the cybercriminal journal style, informal methodology Sensitivity examples only Effort vs Exposure roelof temmingh
CAT5 from me to you Obtaining a IP on the internal network already have one RAS the little black box concept walking in with a notebook Trojans splicing copper roelof temmingh
Get to know your neighbours The difference between MS and services network MS network is a service (File Sharing) Other services - FTP, HTTP, SQL, SMTP servers. Intelligence gathering Protocols Services Identify important hosts Ping sweep roelof temmingh
Easy cash The guy next to you Microsoft network network neighbourhood shares are published Services network Anonymous FTP, webpages  roelof temmingh
Scratching the surface Your wannabe admin Microsoft network password guessing offline cracking real time cracking Service network sniffing the network (SMTP,POP3,FTP) default passwords password guessing (known services) portscanning roelof temmingh
Knocking on the door Your (closet hacker) admin Microsoft network user enumeration brute force id/password Service network vulnerability scanners customized for ports (IDS!) scans for known product problems commercial (ISS, CyberCop) share/freeware (Nessus, whisker) roelof temmingh
Blowing the door down Your previous administrator turned black hat hacker We are inside, now what? Microsoft network search for XLS, DOC files copy and enjoy application encryption worthless Service network password files passwords to backends (SQL) text copy of databases mailboxes Publish to Internet, sell to competition. Assumed full control roelof temmingh
Keeping in touch Your previous administrator's current employer Keeping a grip on your network Service network & MS network Rootkits Backdoors Not only from internal Internet RAS roelof temmingh
questions?
Agenda 1. Introduction 2.  Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6.  Implementing Solutions 7. The role and value of IDS 8. Questions
Setting the Stage - a security culture Assign responsibility Security Officer Empower the Security Officer Authority, Money, People Measure Progress Project Plan, Certification, Audits Develop an IT Security Policy Guide, mandate & measure Should be: Endorsed by management Effectively communicated Specific Enforceable Practical
Setting the Stage - a security culture Communicate with key people Emphasise the value of data to business leaders Awareness training and programmess Buy-in at every level is essential Positive / Negative reinforcement Use security as a performance criterion Consider Security Certification Global standards for the implementation and assessment of security…
Thoughts on Certification Objective To enforce structure on your security program As a means of assessing your security As a means of measuring against best-of-breed As a means of convincing others of your security Is Certification for you? Recognition Focus Local Presence Cost Endurance Objectivity
Agenda 1. Introduction 2.  Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6.  Implementing Solutions 7. The role and value of IDS 8. Questions
Implementing Solutions - Overview Value your information and IT resources Know what you’re protecting and what its worth Assess your vulnerabilities Know exactly where you stand Evaluate actual risk versus acceptable risk You don’t have to be completely secure Develop a Security Strategy Know where you’re going and where you are Implement Controls 80/20 rule Assess the effect of the changes Security is a cycle
Internal Security Cheat Sheet Publish a policy Guide, mandate and measure Content security Viruses, trojans, scripts Zoning Segment data, people, hosts and services Centralise It’s much easier to protect something if its in one place Host & service security Basics! Account Policies Passwords are an essentially weak mechanism Switch to the desktop It’s simple and it works Consider your RAS systems RAS is the soft underbelly of your network
Agenda 1. Introduction 2.  Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6.  Implementing Solutions 7. The role and value of IDS 8. Questions
IDS - An Overview Intrusion Detection System Identify and report or react on an unauthorised or malicious action on a host or a network  Types of IDS Host Distributed Network Typical Features (NIDS) Packet Sniffing Technology Attack Pattern Library Traffic Patterns , Viruses, Trojans, Signatures Rule Set Source, Destination, Time, Period, Signature Response capabilities Active or Passive Distributed Architecture Centralised Management
The Role of IDS Identifying an “Intrusion” Acceptability Parameters: Destination Source Signature Time Period Effective implementation Access to traffic Acceptability Parameters Response Capabilities Good Example - DMZ Finite area to monitor Existing security infrastructure Clearly defined acceptability parameters Limited number of events to respond to
IDS & Internal Security For: Large, open environments eg Corporate Extranet or University Effective zoning, segmentation & consolidation Basic issues addressed Dedicated security personnel Against: Technology driven decision There are no point-and-click solutions to security Closed system Acceptability parameters Response capabilities In SA Address basic issues Consolidate valuable resources Do an assessment Make a strategy decision Consider outsourcing
questions?

More Related Content

PDF
Application Threat Modeling
PDF
Deception Technology: Use Cases & Implementation Approaches
PPTX
Red Team vs. Blue Team
PDF
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
PPTX
CyberSecurity Portfolio Management
PDF
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
PDF
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
Application Threat Modeling
Deception Technology: Use Cases & Implementation Approaches
Red Team vs. Blue Team
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
CyberSecurity Portfolio Management
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
Threat Hunting 101: Intro to Threat Detection and Incident Response

What's hot (20)

PDF
Cissp combined notes
PDF
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
PDF
Risk Analysis using open FAIR and Adoption of right Security Controls
PDF
Building a Strategic Plan for Your Security Awareness Program
PPTX
Persistence is Key: Advanced Persistent Threats
PPTX
Security Analytics Beyond Cyber
PPTX
Risk Assessment and Threat Modeling
PPTX
Threat Modeling Web Applications
PPTX
Threat modeling the security of the enterprise
PDF
Threat hunting 101 by Sandeep Singh
PDF
Apt sharing tisa protalk 2-2554
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PDF
Rapid Threat Modeling Techniques
PPT
Security Consulting Methodology
PDF
GDPR: The Application Security Twist
PDF
Threat Modeling to Reduce Software Security Risk
PPTX
Cyber Defence Intelligence (CDI)
PDF
Make IR Effective with Risk Evaluation and Reporting
PPTX
Understanding advanced persistent threats (APT)
PPTX
WHY SOC Services needed?
Cissp combined notes
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Risk Analysis using open FAIR and Adoption of right Security Controls
Building a Strategic Plan for Your Security Awareness Program
Persistence is Key: Advanced Persistent Threats
Security Analytics Beyond Cyber
Risk Assessment and Threat Modeling
Threat Modeling Web Applications
Threat modeling the security of the enterprise
Threat hunting 101 by Sandeep Singh
Apt sharing tisa protalk 2-2554
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Rapid Threat Modeling Techniques
Security Consulting Methodology
GDPR: The Application Security Twist
Threat Modeling to Reduce Software Security Risk
Cyber Defence Intelligence (CDI)
Make IR Effective with Risk Evaluation and Reporting
Understanding advanced persistent threats (APT)
WHY SOC Services needed?
Ad

Viewers also liked (19)

PDF
Gestion ddes risques
PPTX
Web 2.0 security woes
PPTX
A Brave New World
PPTX
Threats to machine clouds
PPT
Attacks and Defences
PPT
The difference between a duck
PDF
Putting the tea back into cyber terrorism
PPT
Denial of services : limiting the threat
PPTX
Proofing against malware
PDF
A new look into web application reconnaissance
PDF
Sensepost assessment automation
PPTX
State of the information security nation
PDF
It's all about the timing
PPTX
Offence oriented Defence
PDF
Cache on Delivery
PDF
Breaking the bank : how to really test/annoy financial institutions
PPTX
SensePost Threat Modelling
PPTX
Sour Pickles
PDF
Hacking Z-Wave Home Automation Systems
Gestion ddes risques
Web 2.0 security woes
A Brave New World
Threats to machine clouds
Attacks and Defences
The difference between a duck
Putting the tea back into cyber terrorism
Denial of services : limiting the threat
Proofing against malware
A new look into web application reconnaissance
Sensepost assessment automation
State of the information security nation
It's all about the timing
Offence oriented Defence
Cache on Delivery
Breaking the bank : how to really test/annoy financial institutions
SensePost Threat Modelling
Sour Pickles
Hacking Z-Wave Home Automation Systems
Ad

Similar to knowthyself : Internal IT Security in SA (20)

PDF
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
KEY
Vulnerability Ass... Penetrate What?
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPT
Information Leakage - A knowledge Based Approach
PPTX
Secure Iowa Oct 2016
PPTX
Common Sense Security Framework
PPTX
Enterprise incident response 2017
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
PPTX
New Horizons SCYBER Presentation
PDF
Aujas incident management webinar deck 08162016
PPT
II Security At Microsoft
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PPTX
Cyber Security # Lec 3
PDF
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
PPT
Core.co.enterprise.deck.06.16.10
DOCX
Who is Cybersecurity Analyst? How to be a Cybersecurity Analyst
PPTX
Optimizing Security Operations: 5 Keys to Success
PDF
OSB50: Operational Security: State of the Union
PPTX
How to assess and manage cyber risk
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Vulnerability Ass... Penetrate What?
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Information Leakage - A knowledge Based Approach
Secure Iowa Oct 2016
Common Sense Security Framework
Enterprise incident response 2017
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
New Horizons SCYBER Presentation
Aujas incident management webinar deck 08162016
II Security At Microsoft
BSIDES DETROIT 2015: Data breaches cost of doing business
Cyber Security # Lec 3
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Core.co.enterprise.deck.06.16.10
Who is Cybersecurity Analyst? How to be a Cybersecurity Analyst
Optimizing Security Operations: 5 Keys to Success
OSB50: Operational Security: State of the Union
How to assess and manage cyber risk

More from SensePost (20)

PDF
objection - runtime mobile exploration
PPTX
Vulnerabilities in TN3270 based Application
PDF
Ruler and Liniaal @ Troopers 17
PDF
Introducing (DET) the Data Exfiltration Toolkit
PPTX
ZaCon 2015 - Zombie Mana Attacks
PPTX
Improvement in Rogue Access Points - SensePost Defcon 22
PDF
Heartbleed Overview
PDF
Botconf 2013 - DNS-based Botnet C2 Server Detection
PPTX
Rat a-tat-tat
PPTX
Inside .NET Smart Card Operating System
PDF
SNMP : Simple Network Mediated (Cisco) Pwnage
PPT
Its Ok To Get Hacked
PPT
Web Application Hacking
PPT
Major global information security trends - a summary
PDF
Corporate Threat Modeling v2
PPS
OK I'm here, so what's in it for me?
PPT
Security threats facing SA businessess
PPT
Security in e-commerce
PDF
Penetration testing and social engineering
PDF
Getting punched in the face
objection - runtime mobile exploration
Vulnerabilities in TN3270 based Application
Ruler and Liniaal @ Troopers 17
Introducing (DET) the Data Exfiltration Toolkit
ZaCon 2015 - Zombie Mana Attacks
Improvement in Rogue Access Points - SensePost Defcon 22
Heartbleed Overview
Botconf 2013 - DNS-based Botnet C2 Server Detection
Rat a-tat-tat
Inside .NET Smart Card Operating System
SNMP : Simple Network Mediated (Cisco) Pwnage
Its Ok To Get Hacked
Web Application Hacking
Major global information security trends - a summary
Corporate Threat Modeling v2
OK I'm here, so what's in it for me?
Security threats facing SA businessess
Security in e-commerce
Penetration testing and social engineering
Getting punched in the face

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
sap open course for s4hana steps from ECC to s4
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity

knowthyself : Internal IT Security in SA

  • 1. Internal IT Security in SA Problems & Solutions
  • 2. Agenda 1. Introduction 2. Considering the global Risk 3. Understanding your own Risk 4. Case Study 5 . Setting the Stage 6. Implementing Solutions 7. The role and value of IDS 8. Questions
  • 3. Introduction About me About Roelof SensePost Objective Approach References: http://wips.sensepost.com/knowthyself.zip http://www.sensepost.com [email_address] [email_address]
  • 4. Understanding the global Risk What we know: There is a threat to our Information Resources The threat has direct financial implications The threat is growing A large part of the threat is internal There are a number of distinguishable trends http://www.gocsi.com/prelea990301.htm http://www.saps.org.za What we don’t know: How accurate are the statistics? Are international statistics relevant in SA? What does this all mean to me?
  • 5. Universal Threats Data Confidentiality Information is the currency of business today Customers, Strategy, Financials, HR, Personal Data Integrity The accuracy and reliability of the information Determines the value of information Reputation / Credibility The market’s perception of your competence Web site defacement Denial of Service Prevent a system from performing their intended function EBay, Yahoo, Edgars
  • 6. Agenda 1. Introduction 2. Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6. Implementing Solutions 7. The role and value of IDS 8. Questions
  • 7. Understanding your own Risk What is Risk? Valuable resources + exploitable technology What is “Secure”? When the financial losses incurred are at an acceptable level Your “Risk-Profile”: The value of your Information The degree of technological vulnerability A level of loss that is acceptable to you Unique to your organisation. Today. The value of surveys and statistics Highlight the existence of threats Indicate trends and phases Create an awareness
  • 8. Your own unique risk profile IT Security Assessment Make informed decisions on how to spend Time Money People An effective assessment: Independent and Objective Business aware but technology focused Prove its worth Concrete, practical recommendations Finite Honest Recursive...
  • 9. Recursive Security Assessments Delta Testing Monitor the effect of changes New exploits and vulnerabilities Staying secure in a global battlefield Improved Methodologies Tools, techniques, philosophies etc. Innovation A chance to get to know you Extended Scope There’s never enough time Enhanced Scope Moving toward a zero-default environment...
  • 10. Agenda 1. Introduction 2. Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6. Implementing Solutions 7. The role and value of IDS 8. Questions
  • 11. Welcome to the case study Mind of the cybercriminal journal style, informal methodology Sensitivity examples only Effort vs Exposure roelof temmingh
  • 12. CAT5 from me to you Obtaining a IP on the internal network already have one RAS the little black box concept walking in with a notebook Trojans splicing copper roelof temmingh
  • 13. Get to know your neighbours The difference between MS and services network MS network is a service (File Sharing) Other services - FTP, HTTP, SQL, SMTP servers. Intelligence gathering Protocols Services Identify important hosts Ping sweep roelof temmingh
  • 14. Easy cash The guy next to you Microsoft network network neighbourhood shares are published Services network Anonymous FTP, webpages roelof temmingh
  • 15. Scratching the surface Your wannabe admin Microsoft network password guessing offline cracking real time cracking Service network sniffing the network (SMTP,POP3,FTP) default passwords password guessing (known services) portscanning roelof temmingh
  • 16. Knocking on the door Your (closet hacker) admin Microsoft network user enumeration brute force id/password Service network vulnerability scanners customized for ports (IDS!) scans for known product problems commercial (ISS, CyberCop) share/freeware (Nessus, whisker) roelof temmingh
  • 17. Blowing the door down Your previous administrator turned black hat hacker We are inside, now what? Microsoft network search for XLS, DOC files copy and enjoy application encryption worthless Service network password files passwords to backends (SQL) text copy of databases mailboxes Publish to Internet, sell to competition. Assumed full control roelof temmingh
  • 18. Keeping in touch Your previous administrator's current employer Keeping a grip on your network Service network & MS network Rootkits Backdoors Not only from internal Internet RAS roelof temmingh
  • 20. Agenda 1. Introduction 2. Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6. Implementing Solutions 7. The role and value of IDS 8. Questions
  • 21. Setting the Stage - a security culture Assign responsibility Security Officer Empower the Security Officer Authority, Money, People Measure Progress Project Plan, Certification, Audits Develop an IT Security Policy Guide, mandate & measure Should be: Endorsed by management Effectively communicated Specific Enforceable Practical
  • 22. Setting the Stage - a security culture Communicate with key people Emphasise the value of data to business leaders Awareness training and programmess Buy-in at every level is essential Positive / Negative reinforcement Use security as a performance criterion Consider Security Certification Global standards for the implementation and assessment of security…
  • 23. Thoughts on Certification Objective To enforce structure on your security program As a means of assessing your security As a means of measuring against best-of-breed As a means of convincing others of your security Is Certification for you? Recognition Focus Local Presence Cost Endurance Objectivity
  • 24. Agenda 1. Introduction 2. Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6. Implementing Solutions 7. The role and value of IDS 8. Questions
  • 25. Implementing Solutions - Overview Value your information and IT resources Know what you’re protecting and what its worth Assess your vulnerabilities Know exactly where you stand Evaluate actual risk versus acceptable risk You don’t have to be completely secure Develop a Security Strategy Know where you’re going and where you are Implement Controls 80/20 rule Assess the effect of the changes Security is a cycle
  • 26. Internal Security Cheat Sheet Publish a policy Guide, mandate and measure Content security Viruses, trojans, scripts Zoning Segment data, people, hosts and services Centralise It’s much easier to protect something if its in one place Host & service security Basics! Account Policies Passwords are an essentially weak mechanism Switch to the desktop It’s simple and it works Consider your RAS systems RAS is the soft underbelly of your network
  • 27. Agenda 1. Introduction 2. Considering the global Risk 3. Understanding your own Risk 4. Case Study 5. Setting the Stage 6. Implementing Solutions 7. The role and value of IDS 8. Questions
  • 28. IDS - An Overview Intrusion Detection System Identify and report or react on an unauthorised or malicious action on a host or a network Types of IDS Host Distributed Network Typical Features (NIDS) Packet Sniffing Technology Attack Pattern Library Traffic Patterns , Viruses, Trojans, Signatures Rule Set Source, Destination, Time, Period, Signature Response capabilities Active or Passive Distributed Architecture Centralised Management
  • 29. The Role of IDS Identifying an “Intrusion” Acceptability Parameters: Destination Source Signature Time Period Effective implementation Access to traffic Acceptability Parameters Response Capabilities Good Example - DMZ Finite area to monitor Existing security infrastructure Clearly defined acceptability parameters Limited number of events to respond to
  • 30. IDS & Internal Security For: Large, open environments eg Corporate Extranet or University Effective zoning, segmentation & consolidation Basic issues addressed Dedicated security personnel Against: Technology driven decision There are no point-and-click solutions to security Closed system Acceptability parameters Response capabilities In SA Address basic issues Consolidate valuable resources Do an assessment Make a strategy decision Consider outsourcing

Editor's Notes

  • #3: Comment on our background and the kind of work we do - technology focused
  • #5: Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...
  • #6: Data Confidentiality eg TMNet - customers Branch Software Data Integrity If a figure on page five of a 60-page financial document, say, were changed, it could have disastrous effects -- and be very difficult to discover before the damage is done. Reputation / Credibility Denial of Service Business Continuity
  • #7: Comment on our background and the kind of work we do - technology focused
  • #11: Comment on our background and the kind of work we do - technology focused
  • #21: Comment on our background and the kind of work we do - technology focused
  • #25: Comment on our background and the kind of work we do - technology focused
  • #27: RAS: In 1997, Intel fired Barton, who managed an automated manufacturing system called Workstream inside Fab 15 in Aloha, Oregon. When the company fired him, Intel revoked his password and took away his computer. What Intel failed to realize, however, was that Barton could log into the system from his home computer. The next day, at 2:15 a.m., Barton deleted a number of files, which shut down Workstream. "This slowed, but didn't quite stop, the manufacturing process," Robinson said. In all, Barton clogged the manufacturing process for about four hours. The incident cost about $20,000 to remedy, according to estimates from Intel. Federal law provides criminal penalties for damaging computer systems.
  • #28: Comment on our background and the kind of work we do - technology focused