1. Trang chủ
  2. » Công Nghệ Thông Tin

Information Security FUNDAMENTALS phần 1 pps

27 445 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 27
Dung lượng 0,91 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Tiller ISBN: 0-8493-1609-X The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks Susan Young and Dave Aitel ISBN: 0-8493-0888-7 Information Security Architectur

Trang 4

Information Security FUNDAMENTALS

Trang 5

AUERBACH PUBLICATIONS

www.auerbach-publications.com

To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401

Asset Protection and Security Management

Cyber Forensics: A Field Manual for Collecting,

Examining, and Preserving Evidence of

Computer Crimes

Albert J Marcella, Jr and Robert S Greenfield

ISBN: 0-8493-0955-7

The Ethical Hack: A Framework for Business

Value Penetration Testing

James S Tiller

ISBN: 0-8493-1609-X

The Hacker's Handbook: The Strategy Behind

Breaking into and Defending Networks

Susan Young and Dave Aitel

ISBN: 0-8493-0888-7

Information Security Architecture:

An Integrated Approach to Security in the

Information Security Policies, Procedures, and

Standards: Guidelines for Effective Information

Information Technology Control and Audit

Fredrick Gallegos, Daniel Manson, and Sandra Allen-Senft

ISBN: 0-8493-9994-7

Investigator's Guide to Steganography

Gregory Kipper 0-8493-2433-5

Managing a Network Vulnerability Assessment

Thomas Peltier, Justin Peltier, and John A Blackley ISBN: 0-8493-1270-1

Network Perimeter Security: Building Defense In-Depth

Cliff Riggs ISBN: 0-8493-1628-6

The Practical Guide to HIPAA Privacy and Security Compliance

Kevin Beaver and Rebecca Herold ISBN: 0-8493-1953-6

A Practical Guide to Security Engineering and Information Assurance

Debra S Herrmann ISBN: 0-8493-1163-2

The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions

Rebecca Herold ISBN: 0-8493-1248-5

Public Key Infrastructure: Building Trusted Applications and Web Services

John R Vacca ISBN: 0-8493-0822-4

Securing and Controlling Cisco Routers

Peter T Davis ISBN: 0-8493-1290-6

Strategic Information Security

John Wylder ISBN: 0-8493-2041-0

Surviving Security: How to Integrate People, Process, and Technology, Second Edition

Amanda Andress ISBN: 0-8493-2042-9

A Technical Guide to IPSec Virtual Private Networks

James S Tiller ISBN: 0-8493-0876-3

Using the Common Criteria for IT Security Evaluation

Debra S Herrmann ISBN: 0-8493-1404-6

OTHER INFORMATION SECURITY BOOKS FROM AUERBACH

Trang 6

AUERBACH PUBLICATIONS

A CRC Press Company Boca Raton London New York Washington, D.C.

Information Security

FUNDAMENTALS

Thomas R Peltier Justin Peltier John Blackley

Trang 7

This book contains information obtained from authentic and highly regarded sources Reprinted material

is quoted with permission, and sources are indicated A wide variety of references are listed Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use.

Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic

or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher.

The consent of CRC Press does not extend to copying for general distribution, for promotion, for creating new works, or for resale Specific permission must be obtained in writing from CRC Press LLC for such copying.

Direct all inquiries to CRC Press, 2000 N.W Corporate Blvd., Boca Raton, Florida 33431

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation, without intent to infringe.

Visit the CRC Press Web site at www.crcpress.com

© 2005 by CRC Press LLC Auerbach is an imprint of CRC Press LLC

No claim to original U.S Government works International Standard Book Number 0-8493-1957-9 Library of Congress Card Number 2004051024 Printed in the United States of America 1 2 3 4 5 6 7 8 9 0

Printed on acid-free paper

Library of Congress Cataloging-in-Publication Data

Peltier, Thomas R.

Information security fundamentals / Thomas R Peltier, Justin Peltier, John Blackley.

p cm.

Includes bibliographical references and index.

ISBN 0-8493-1957-9 (alk paper)

1 Computer security 2 Data protection I Peltier, Justin II Blackley, John A III.

Title.

QA76.9.A25P427 2004

Trang 8

To our spouses, friends, children, and colleagues; without them we would

be without direction, support, and joy

AU1957_C000.fm Page v Monday, September 20, 2004 3:19 PM

Trang 9

Contents

AcknowledgmentsIntroduction

1.1 Elements of Information Protection1.2 More Than Just Computer Security1.2.1 Employee Mind-Set toward Controls1.3 Roles and Responsibilities

1.3.1 Director, Design and Strategy1.4 Common Threats

1.5 Policies and Procedures1.6 Risk Management1.7 Typical Information Protection Program1.8 Summary

Chapter 2 Threats to Information Security

2.1 What Is Information Security?

2.2 Common Threats2.2.1 Errors and Omissions2.2.2 Fraud and Theft2.2.3 Malicious Hackers2.2.4 Malicious Code2.2.5 Denial-of-Service Attacks2.2.6 Social Engineering2.2.7 Common Types of Social Engineering2.3 Summary

Chapter 3 The Structure of an Information Security

Program

3.1 Overview3.1.1 Enterprisewide Security Program

AU1957_C000.fm Page vii Monday, September 20, 2004 3:19 PM

Trang 10

3.2 Business Unit Responsibilities3.2.1 Creation and Implementation of Policies and Standards3.2.2 Compliance with Policies and Standards

3.3 Information Security Awareness Program3.3.1 Frequency

3.3.2 Media3.4 Information Security Program Infrastructure3.4.1 Information Security Steering Committee3.4.2 Assignment of Information Security Responsibilities3.4.2.1 Senior Management

3.4.2.2 Information Security Management3.4.2.3 Business Unit Managers

3.4.2.4 First Line Supervisors3.4.2.5 Employees

3.4.2.6 Third Parties3.5 Summary

Chapter 4 Information Security Policies

4.1 Policy Is the Cornerstone4.2 Why Implement an Information Security Policy4.3 Corporate Policies

4.4 Organizationwide (Tier 1) Policies4.4.1 Employment

4.4.2 Standards of Conduct4.4.3 Conflict of Interest4.4.4 Performance Management4.4.5 Employee Discipline4.4.6 Information Security4.4.7 Corporate Communications4.4.8 Workplace Security4.4.9 Business Continuity Plans (BCPs)4.4.10 Procurement and Contracts4.4.11 Records Management4.4.12 Asset Classification4.5 Organizationwide Policy Document4.6 Legal Requirements

4.6.1 Duty of Loyalty4.6.2 Duty of Care4.6.3 Federal Sentencing Guidelines for Criminal Convictions4.6.4 The Economic Espionage Act of 1996

4.6.5 The Foreign Corrupt Practices Act (FCPA)4.6.5 Sarbanes–Oxley (SOX) Act

4.6.6 Health Insurance Portability and Accountability Act (HIPAA)

4.6.7 Gramm–Leach–Bliley Act (GLBA)4.7 Business Requirements

AU1957_C000.fm Page viii Monday, September 20, 2004 3:19 PM

Trang 11

4.8 Definitions4.8.1 Policy4.8.2 Standards4.8.3 Procedures4.8.4 Guidelines4.9 Policy Key Elements4.10 Policy Format4.10.1 Global (Tier 1) Policy4.10.1.1 Topic4.10.1.2 Scope4.10.1.3 Responsibilities4.10.1.4 Compliance or Consequences4.10.1.5 Sample Information Security Global Policies4.10.2 Topic-Specific (Tier 2) Policy

4.10.2.1 Thesis Statement4.10.2.2 Relevance4.10.2.3 Responsibilities4.10.2.4 Compliance4.10.2.5 Supplementary Information4.10.3 Application-Specific (Tier 3) Policy4.11 Summary

Chapter 5 Asset Classification

5.1 Introduction5.2 Overview5.3 Why Classify Information?

5.4 What Is Information Classification?

5.5 Where to Begin?

5.6 Information Classification Category Examples5.6.1 Example 1

5.6.2 Example 25.6.3 Example 35.6.4 Example 45.7 Resist the Urge to Add Categories5.8 What Constitutes Confidential Information5.8.1 Copyright

5.9 Employee Responsibilities5.9.1 Owner

5.9.1.1 Information Owner5.9.2 Custodian

5.9.3 User5.10 Classification Examples5.10.1 Classification: Example 15.10.2 Classification: Example 25.10.3 Classification: Example 35.10.4 Classification: Example 4

AU1957_C000.fm Page ix Monday, September 20, 2004 3:19 PM

Trang 12

5.13.2 Electronically Stored Information5.13.3 Electronically Transmitted Information5.13.4 Record Management Retention Schedule5.14 Information Classification Methodology

5.15 Authorization for Access5.15.1 Owner

5.15.2 Custodian5.15.3 User5.16 Summary

6.1 Business Requirements for Access Control6.1.1 Access Control Policy

6.2 User Access Management6.2.1 Account Authorization6.2.2 Access Privilege Management6.2.3 Account Authentication Management6.3 System and Network Access Control6.3.1 Network Access and Security Components6.3.2 System Standards

6.3.3 Remote Access6.4 Operating System Access Controls6.4.1 Operating Systems Standards6.4.2 Change Control Management6.5 Monitoring System Access

6.5.1 Event Logging6.5.2 Monitoring Standards6.5.3 Intrusion Detection Systems6.6 Cryptography

6.6.1 Definitions6.6.2 Public Key and Private Key6.6.3 Block Mode, Cipher Block, and Stream Ciphers6.6.4 Cryptanalysis

6.7 Sample Access Control Policy6.8 Summary

Chapter 7 Physical Security

7.1 Data Center Requirements7.2 Physical Access Controls

AU1957_C000.fm Page x Monday, September 20, 2004 3:19 PM

Trang 13

7.2.1 Assets to be Protected7.2.2 Potential Threats7.2.3 Attitude toward Risk7.2.4 Sample Controls7.3 Fire Prevention and Detection7.3.1 Fire Prevention7.3.2 Fire Detection7.3.3 Fire Fighting7.4 Verified Disposal of Documents7.4.1 Collection of Documents7.4.2 Document Destruction Options7.4.3 Choosing Services

7.5 Agreements7.5.1 Duress Alarms7.6 Intrusion Detection Systems7.6.1 Purpose

7.6.2 Planning7.6.3 Elements7.6.4 Procedures7.7 Sample Physical Security Policy7.8 Summary

Chapter 8 Risk Analysis and Risk Management

8.1 Introduction8.2 Frequently Asked Questions on Risk Analysis8.2.1 Why Conduct a Risk Analysis?

8.2.2 When to Conduct a Risk Analysis?

8.2.3 Who Should Conduct the Risk Analysis?

8.2.4 How Long Should a Risk Analysis Take?

8.2.5 What a Risk Analysis Analyzes8.2.6 What Can the Results of a Risk Analysis Tell an Organization?

8.2.7 Who Should Review the Results of a Risk Analysis?8.2.8 How Is the Success of the Risk Analysis Measured?8.3 Information Security Life Cycle

8.4 Risk Analysis Process8.4.1 Asset Definition8.4.2 Threat Identification8.4.3 Determine Probability of Occurrence8.4.4 Determine the Impact of the Threat8.4.5 Controls Recommended

8.4.6 Documentation8.5 Risk Mitigation8.6 Control Categories

AU1957_C000.fm Page xi Monday, September 20, 2004 3:19 PM

Trang 14

8.7 Cost/Benefit Analysis8.8 Summary

Chapter 9 Business Continuity Planning

9.1 Overview9.2 Business Continuity Planning Policy9.2.1 Policy Statement

9.2.2 Scope9.2.3 Responsibilities9.2.4 Compliance9.3 Conducting a Business Impact Analysis (BIA)9.3.1 Identify Sponsor(s)

9.3.2 Scope9.3.3 Information Meeting9.3.4 Information Gathering9.3.5 Questionnaire Design9.3.6 Scheduling the Interviews9.3.7 Conducting Interviews9.3.8 Tabulating the Information9.3.9 Presenting the Results9.4 Preventive Controls

9.5 Recovery Strategies9.5.1 Hot Site, Cold Site, Warm Site, Mobile Site9.5.2 Key Considerations

9.5.2.1 People9.5.2.2 Communications9.5.2.3 Computing Equipment9.5.2.4 Facilities

9.6 Plan Construction, Testing, and Maintenance9.6.1 Plan Construction

9.6.1.1 Crisis Management Plan9.6.1.2 Plan Distribution9.6.2 Plan Testing

9.6.2.1 Line Testing9.6.2.2 Walk-through Testing9.6.2.3 Single Process Testing9.6.2.4 Full Testing

9.6.2.5 Plan Testing Summary9.6.3 Plan Maintenance

9.7 Sample Business Continuity Plan Policy9.8 Summary

Glossary

Bibliography

AU1957_C000.fm Page xii Monday, September 20, 2004 3:19 PM

Trang 15

The Computer Security Institute (CSI) has been the leader in theinformation security industry since 1974 and continues to provide leader-ship and direction for its members and the industry as a whole JohnO’Leary has been the constant in all the changes seen in this industry.The new CSI management team of Julie Hogan, Chris Keating, and JenniferStevens continues to provide the tools and classes that the securityprofessional needs to be successful The new team has blended well withthe CSI seasoned veterans of Pam Salaway, Kimber Heald, Frederic Martin,Nancy Baer, and Joanna Kaufman.

No one has all of the answers to any question, so the really “smart”person cultivates good friends Having been in the information securitybusiness for nearly 30 years, I have had the great good fortune of having

a number of such friends and fellow professionals This group of time sources of great information include Mike Corby, Terri Curran, PeterStephenson, Merrill Lynch, Bob Cartwright, Pat Howard, Cheryl and CarlJackson, Becky Herold, Ray Kaplan, Genny Burns, Anne Terwilliger,Patrice Rapalus, David Lynas, John Sherwood, Herve Schmidt, Antonioand Pietro Ruvolo, Wayne Sumida, Caroline Hamilton, Dan Erwin, LisaBryson, and William H Murray

long-My working buddies must also be acknowledged long-My son Justin is thegreatest asset any father — and more importantly, any information securityteam — could ever hope for Over the past two years, we have logged

AU1957_C000.fm Page xiii Monday, September 20, 2004 3:19 PM

Trang 16

to understand what their needs are and then presented these findings to

us A great deal of our work here is a direct result of what Rich discoveredthe industry wanted Rich O’Hanley, not only the world’s best editor andtask master, but a good friend and source of knowledge Thanks Rich!And finally I extend a thank-you to my editor Andrea Demby Shetakes the time to take the raw manuscript and put it into a logicallyflowing work She sometimes has to ask me the same question more thanonce, but finally I get what needs to be done

AU1957_C000.fm Page xiv Monday, September 20, 2004 3:19 PM

Trang 17

The purpose of information security is to protect an organization’s valuableresources, such as information, computer hardware, and software Throughthe selection and application of appropriate safeguards, security helps theorganization’s mission by protecting its physical and financial resources,reputation, legal position, employees, and other tangible and intangibleassets To many, security is sometimes viewed as thwarting the businessobjectives of the organization by imposing poorly selected, bothersomerules and procedures on users, managers, and systems Well-chosen secu-rity rules and procedures do not exist for their own sake — they are put

in place to protect important assets and thereby support the overallbusiness objectives

Developing an information security program that adheres to the ciple of security as a business enabler is the first step in an enterprise’seffort to build an effective security program Organizations must continually(1) explore and assess information security risks to business operations;(2) determine what policies, standards, and controls are worth implement-ing to reduce these risks; (3) promote awareness and understanding amongthe staff; and (4) assess compliance and control effectiveness As with othertypes of internal controls, this is a cycle of activity, not an exercise with

prin-a defined beginning prin-and end

This book was designed to give the information security professional

a solid understanding of the fundamentals of security and the entire range

of issues the practitioner must address We hope you will be able to takethe key elements that comprise a successful information security programand implement the concepts into your own successful program

AU1957_C000.fm Page xv Monday, September 20, 2004 3:19 PM

Ngày đăng: 14/08/2014, 18:22

TỪ KHÓA LIÊN QUAN