Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security (...

203
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security (Applications, Physical, Legal, Business Continuity, Operations)

Transcript of Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security (...

Page 1: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Dr. Bhavani ThuraisinghamThe University of Texas at Dallas (UTD)

Introduction to Cyber Security(Applications, Physical, Legal,

Business Continuity, Operations)

Page 2: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Data and Applications Development Security

• System Lifecycle Security• Applications Security Issues• Database Security

Page 3: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Secure Systems Development Policies• Organizations require more secure development• Security climate has changes

Page 4: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Organizational Standards• Systems Security Engineering-Capability Maturity Model

Integration (SSE-CMMI)• Web Application Security Consortium (WASC)• Build Security in (BSI)• International Organization for Standardization (ISO)/

International Electro-Technical Commission (IEC 27034)

Page 5: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Software Configuration Management (SCM)

• Versioning• Technology• Protection of code• Protection of project

– Scope-creep Vs. Statement of work

• Process integrity

Page 6: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

System Lifecycle• Project• Management-based methodology• Capability maturity model integration• SLC vs. SDLC

– System lifecycle– System development lifecycle

Page 7: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Project Management Controls• Complexity of systems and projects• Controls built into software

Page 8: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Secure Development Environment• “We need security? Then we’ll use SSL.”• “We need strong authentication? PKI will solve all our

problems.”• “We use a secret/military-grade encryption.”• “We had a hacking contest and no one broke it.”• “We have an excellent firewall.”• “We’ll add it later; let’s have the features first.”

Page 9: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Secure Development: Physical• Protect source code

– From tampering– Pirating– Accidental loss– Protection against attacks

Page 10: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Personnel Security• Hiring controls• Changes in employment• Protection of privacy from employees

– Privacy impact rating

Page 11: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Separation of Test Datafrom Production

• Never test on a production system• Never use real data

Page 12: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Software Development Methods• Waterfall• Spiral method• Clean-room• Structured Programming

Development

• Iterative development• Joint analysis development• Prototyping

Page 13: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Software Development Methods (cont.)

• Modified prototype model• Exploratory model• Rapid application

development• Reuse model

• Computer aided software engineering

• Component-based development

• Extreme programming• Agile development

Page 14: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Programming Language ExamplesInterpreted

• REXX• PostScript• Perl• Ruby• Python

Compiled• Fortran• COBOL• BASIC• Pascal• C• Ada• C++• Java• C#• Visual Basic

Page 15: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Program Utilities• Assembler• Compiler• Interpreter

Page 16: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Secure Coding Issues• Buffer overflow• SQL injections• Cross-site scripting XSS• Dangling pointer• Invalid hyperlink• Secure web applications• JavaScript attacks vs. sandbox• Application Programming Interface (API)• Open Source

Page 17: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Application Security Principles• Validate all input and output• Fail secure (closed)• Fail safe• Make it simple• Defense in depth• Only as secure as your weakest link

Page 18: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Object-oriented Programming• OOP concepts

– Classes– Objects– Message– Inheritance– Polymorphism– Polyinstantiation (term came from security)

Page 19: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Applications Security Issues• Building security in• Adding defense-in-depth

Page 20: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Transaction Processing• Transaction

– Integrity– Availability– Confidentiality

Page 21: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Malware and Attack Types• Injection• Input manipulation / malicious file execution• Brouthentication management• Cryptographic• Denial of service• Hijacking• Information disclosure• Infrastructure• Mis-configuration• Race condition

Page 22: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Malware• Keystroke logging• Adware and spyware• SPAM• Phishing• Botnets• Remote access Trojan• URL manipulation• Maintenance hooks• Privileged programs

Page 23: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Distributed Programming• Distributed Component Object Model (DCOM)• Simple Object Access Protocol (SOAP)• Common Object-Request Broker Architecture (CORBA)• Enterprise Java Beans (EJB)

Page 24: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Database Management Systems (DBMS) Models

• Hierarchical DBMS– Stores records in a single table– Parent/child relationships– Limited to a single tree– Difficult to link branches

Page 25: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Relational DBMS Model• Most frequently used model• Data are structured in tables• Columns are “variables” (attributes)• Rows contain the specific instances (records) or data

Page 26: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Data Warehouse• Consolidated view of enterprise data• Data mart• Designed to support decision making through data mining

Page 27: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Knowledge Discovery in Databases (KDD)

• Methods of identifying patterns in data• KDD and AI techniques

– Probabilistic models– Statistical approach– Classification approach– Deviation and trend analysis– Neural networks– Expert system approach– Hybrid approach

Page 28: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Database Security Issues• Inference• Aggregation• Unauthorized access• Improper modification of data• Metadata

• Query attacks• Bypass attacks• Interception of data• Web security• Data contamination• Polyinstantiation• Data mining

Page 29: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Database Controls• Access controls• Grants• Cascading permissions• Lock controls• Backup and recovery

Page 30: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

View-based Access Controls• Constrained views• Sensitive data is hidden from unauthorized users• Controls located in the front-end application (user interface)

Page 31: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Transaction Controls• Content-based access control• Commit statement• Three-phase commit• Database rollback• Journal / logs• Error controls

Page 32: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

The ACID Test• Atomicity• Consistency• Isolation• Durability

Page 33: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Application and Database Languages: Security Issues

• Poorly designed• More privileges than necessary• DBA account use• Lack of audit• Input validation

Page 34: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Database Interface Languages• Structured Query Language (SQL)• Open Database Connectivity (ODBC)• Extensible Markup Language (XML)• Object Linking and Embedding (OLE)• Active X Data Object (ADO)

Page 35: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Legal, Regulations, Complianceand

Investigations• International Legal Issues• Incident Management• Forensic Investigation• Compliance

Page 36: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Jurisdiction• Law, economics, beliefs and politics• Sovereignty of nations

Page 37: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

International Cooperation• Initiatives related to international cooperation in dealing with

computer crime• The Council of Europe (CoE) Cybercrime Convention

Page 38: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Computer Crime vs. Traditional CrimeTraditional Crime

• Violent• Property• Public Order

Computer Crime• Real Property• Virtual Property

Page 39: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Intellectual Property Protection• Organizations must protect intellectual property (IP)

– Theft– Loss– Corporate espionage– Improper duplication

• Intellectual property must have value– Organization must demonstrate actions to protect IP

Page 40: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Intellectual Property: Patent• Definition• Advantages

Page 41: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Intellectual Property: Trademark• Purpose of a trademark• Characteristics of a trademark

– Word– Name– Symbol– Color– Sound– Product shape

Page 42: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Intellectual Property: Copyright• Covers the expression of ideas

– Writings– Recordings– Computer programs

• Weaker than patent protection

Page 43: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Intellectual Property: Trade Secrets• Must be confidential• Protection of trade secret

Page 44: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Import and Export Law• Strong encryption• No terrorist states

Page 45: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Liability• Legal responsibility• Penalties• Negligence and liability

Page 46: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Negligence• Acting without care• Due care

Page 47: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Transborder Data Flow• Political boundaries

– Privacy– Investigations– Jurisdiction

Page 48: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Personally Identifiable Information (PII)• Identify or locate• Not anonymous• Global effort

Page 49: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Privacy Laws and Regulations• Rights and obligations of:

– Individuals– Organizations

Page 50: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

International Privacy• Organization for Economic Co-operation and Development

(OECD)• 8 core principles

Page 51: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Privacy Law Examples• Health Insurance Portability and Accountability Act (HIPAA)• Personal Information Protection and Electronics Document Act

(PIPEDA)• European Union Data Protection Directive

Page 52: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Employee Privacy• Employee monitoring

– Authorized usage policies– Internet usage– Email– Telephone

• Training

Page 53: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Incident Management

• Prepare, sustain, improve• Protect infrastructure• Prepare, detect respond

Page 54: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Collection of Digital Evidence• Volatile and fragile• Short life span• Collect quickly• By order of volatility• Document, document, document!

Page 55: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Chain of Custody for Evidence• Who• What • When• Where• How

Page 56: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Investigation Process• Identify suspects• Identify witnesses• Identify system• Identify team• Search warrants

Page 57: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Investigation Techniques• Ownership and possession analysis• Means, opportunity and motives (MOM)

Page 58: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Behavior of Computer Criminals• Computer criminals have specific MO’s

– Hacking software / tools– Types of systems or networks attacked, etc.– Signature behaviors

• MO and signature behaviors• Profiling

Page 59: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Interviewing vs. Interrogation• General gathering• Cooperation• Seek truth

• Specific aim• Hostile• Dangerous

Page 60: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Evidence: Hearsay• Hearsay

– Second hand evidence– Normally not admissible

• Business records exception– Computer generated information– Process of creation description

Page 61: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Reporting and Documentation• Law• Court proceedings• Policy• Regulations

Page 62: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Communication About the Incident• Public disclosure• Authorized personnel only

Page 63: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Computer Forensics: Evidence

• Potential evidence• Evidence and legal system

Page 64: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Computer Forensics• Key components

– Crime scenes– Digital evidence– Guidelines

Page 65: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Computer Forensics: Evidence• Identification of evidence• Collection of evidence

– Use appropriate collection techniques– Reduce contamination– Protect scene– Maintain the chain of custody and authentication

Page 66: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Computer Forensics: Evidence• Scientific methods for analysis

– Characteristics of the evidence– Comparison of evidence

• Presentation of findings– Interpretation and analysis– Format appropriate for the intended audience

Page 67: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Forensic Evidence Procedure• Receive media• Disk write blocker• Bit for bit image• Cryptographic checksum• Store the source drive

Page 68: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Forensic Evidence Analysis Procedure• Recent activity• Keyword search• Slack space• Documented

Page 69: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Media Analysis• Recognizing operating system artifacts• File system• Timeline analysis• Searching data

Page 70: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Software Analysis• What it does• What files it creates

Page 71: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Network Analysis• Data on the wire• Ports• Traffic hiding

Page 72: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Compliance• Knowing legislation• Following legislation

Page 73: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Regulatory Environment Examples• Sarbanes-Oxley (SOX))• Gramm-Leach-Bliley Act (GLBA)• Basel II

Page 74: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Compliance Audit• Audit = a formal written examination of controls• Auditor role = 3rd party evaluator• Continuous auditing = automation

Page 75: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Audit Report Format• Introduction

– Background– Audit perspective– Scope and objectives

• Executive summary• Internal audit opinion• Detail report including auditee responses• Appendix• Exhibits

Page 76: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Key Performance Indicators (KPI)• Illegal software• Privacy• Security related incidents

Page 77: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Physical (Environmental) Security

• Site and Facility Design Criteria• Perimeter Security • Building and Inside Security• Secure Operational Area

Page 78: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Site Location Considerations• Emergency services• Hazards/ threats• Adjacency

Page 79: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Threats to Physical Security• National / environmental• Utility systems• Human-made/ political events

Page 80: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Threat Sources and ControlsThreat

• Theft• Espionage• Dumpster diving• Social engineering• Shoulder surfing• HVAC access

Controls• Locks• Background checks• Disposal procedures• Awareness• Screen filters• Motion sensors in

ventilation ducts

Page 81: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Perimeter and BuildingBoundary Protections

• First line of defense• Protective barriers

– Natural– Structural

Page 82: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Fences• Federal, state or local codes may apply• Parking should not be allowed near fences

Page 83: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Controlled Access Points• Gates are the minimum necessary layer• Bollards

Page 84: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Perimeter Intrusion Detection Systems• Detect unauthorized access into an area

– Electronic ‘eyes’

• Note that some perimeters IDSs can function inside the perimeter as well.

Page 85: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Types of Lighting• Continuous lighting• Trip lighting• Standby lighting• Emergency exit lighting• Emergency egress lighting

Page 86: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Access and Visitor Logs and More Rigorous forms of Logging

ABC CompanyEntrance:___________________ Date:________________

Name Institution Name of Person VisitingTime In Time

Out

Page 87: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Closed Circuit Television (CCTV)• CCTV Capability Requirements

– Detection– Recognition– Identification

• Mixing Capabilities• Virtual CCTV Systems

Page 88: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Guards and Guard Stations• Guards

– Deterrent– Possible liability

• Guard stations

Page 89: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Doors• Isolation of critical areas• Lighting of doorways• Contact devices• Guidelines

Page 90: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Building Entry Point Protection• Locks• Lock components

– Body– Strike– Strike plates– Key– Cylinder

Page 91: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Types of Locks• Something you have – Keyed• Something you know – Combinations• Something you are - Biometric

Page 92: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Lock Attacks• Lock picking• Lock bumping

Page 93: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Lock Controls• Lock and key control system• Key control procedures• Change combinations• Fail

– Soft– Secure– Safe

Page 94: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Other Electronic Physical Controls• Card access• Biometric access methods

Page 95: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Windows and Entry Points• Standard plate glass• Tempered glass• Acrylic materials• Polycarbonate windows• Entry points

Page 96: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Intrusion Detection Systems (IDS)• Closed circuit television• Sensors and monitors

Page 97: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Escorts and Visitor Control• Visitor access control best practices

– Picture identity– Photographs– Enclosed area– Authorized escort

Page 98: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Access Logs• Computerized log• Closed circuit TV

Page 99: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Equipment Room• Perimeter enclosure• Controls• Policy

Page 100: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Data Processing Facility• Small devices threat• Server room• Mainframes• Storage

Page 101: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Communications and Power• Wireless access points• Network access control• Utility and power rooms

Page 102: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Work Area• Operators• System administrators• Restricted work areas

Page 103: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Equipment Protection• Inventory• Locks and tracing equipment• Data encryption• Disabling I/O ports

Page 104: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Environmental Controls

System• Electric power• HVAC• Water / plumbing• Gas• Refrigeration

Threat• Loss of power• Overheating• Flood / dripping• Explosion• Leakage

Page 105: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Fire Protection• Prevention – reduce causes• Detection – alert occupants• Suppression – contain or extinguish

Page 106: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Materials and Suppression Agents

Type Suppression Agents

Common combustibles Water, foam, dry chemicals

Combustible liquids Inert gas, CO2, foam, dry chemicals

Electrical Inert gas, CO2, dry chemicals

Combustible metals Dry powders

Cooking media (fats) Wet chemicals

Page 107: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Flooding Area Coverage• Water – sprinkler systems• Gas – Halon/CO2/Argon systems• Best practices for systems• Portable extinguishers

Page 108: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Types of Electrical Power Faults• Complete loss of power• Power degradation• Interference (noise)• Grounding

Page 109: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Loss of Electrical Power• UPS• Generators• Goals of power• Power controls

Page 110: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Heating Ventilation Air Condition (HVAC)

• Location• Positive pressure• Maintenance

Page 111: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Other Infrastructure Threats• Gas leakage• Water threats

Page 112: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Key Performance Indicators• # of physical security incidents detected• # of false positives for biometrics

Page 113: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Business Continuityand Disaster Recovery Planning

• Project Scope Development and Planning• Business Impact Analysis (BIA) and Functional Requirements• Business Continuity and Recovery Strategy• Plan Design and Development• Implementation• Restoration / Disaster Recovery• Feedback and Plan Management

Page 114: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Sources of Information• Disaster Recovery Institute International• Business Continuity Institute• ISO 25999• ISO 27001, Section 10• NIST SP 800-34

Page 115: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

ISO 25999: Business Continuity Management

• Risk management• Disaster recovery• Facilities management• Supply chain management• Quality management

• Health and safety• Knowledge management• Emergency management• Security• Crisis communications and

PR

Page 116: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Overview of BCP• Direct benefits• Indirect benefits• Overlap with Risk Management• BCM vs. BCP vs. COOP

Page 117: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

The Enterprise BCP• DRP

– Backup strategies– Emergency procedures– Contracts and provisioning

• BIA– Reciprocal agreements– Alternate sites

• Incident response planning– Succession Plan– Incidence Response Team

Page 118: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

The Enterprise BCP (cont.)• Risk analysis

– Safeguards / countermeasures– Insurance plan

• Corporate communication plan– User awareness training– Media/stakeholder relations plan

Page 119: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

The Business Continuity Life Cycle• Analyze the business• Assess the risks• Develop the BC strategy• Develop the BC plan• Rehearse the plan

Page 120: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

BC Project Phases• Project Scope Development and Planning• Business Impact Analysis (BIA) and Functional Requirements• Business Continuity and Recovery Strategy• Plan Design and Development• Implementation• Restoration / Disaster Recovery• Feedback and Plan Management

Page 121: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Reflecting Organizational Context• Policy is the driver• Aligned with requirements• Provides direction and focus• Use Business Impact Analysis• Identify inputs• Outcomes and deliverables• Reviewed annually

Page 122: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Policy• Organizational authority• Policy document• Program scope• Resources• Outsourcing

Page 123: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Policy contents• Framework• Tools and techniques• Policy contents• Change is infrequent

Page 124: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Outsourced Activities• You are still responsible• Resilience in outsourcing• Supplier continuity

Page 125: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Scope and Choices• Limit scope• Ensure clarity of scope• Strategy, Return on Investment (ROI), and SWOT (Strengths,

Weaknesses, Opportunities, Threats)• Review yearly

Page 126: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Program Management• Assigning responsibilities• Initiating BCP in the organization• Project management• Ongoing management• Documentation• Incident readiness and response

Page 127: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Documentation• Review current BCP if available• Documentation may not equal capability• Staff must be trained to use any necessary software• Types of documentation• Review as directed by policy

Page 128: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Initiating BCP• Awareness, data, implementation• Staff and budget• Result must be a long-term, sustainable program• Review progress monthly

Page 129: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Incident Readiness & Response• Planners become leaders• Be prepared• Triage• Incident management• Success = Return to Operations• Immediate lessons learned

Page 130: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Key Indicators of Success• Senior management commitment• Policy content• BCP Resources• Project management• Documentation

Page 131: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Understanding the Organization• Business Impact Analysis (BIA)

– Benefits– Objectives

• Evaluating Threats (Risk Assessment)• Emergency Assessment• Indicators of Critical Business Functions

Page 132: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Business Impact Analysis• Identifies, quantifies and qualifies loss• Scope and support required• Documents impact and dependencies• MTD, RPO• Business impact analysis process• Workshops, questionnaires, interviews• Business justifications for budget

Page 133: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Maximum Tolerable Period of DisruptionItem Required recovery time

following a disaster

Non-essential 30 days

Normal 7 days

Important 72 hours

Urgent 24 hours

Critical/Essential Minutes to hours

Page 134: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Estimating Continuity Requirements• Total budget for disaster recovery• Identification of necessary resources• Outcomes feed BCP strategy selection• Reviewed with BIA

Page 135: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Evaluating Threats (Risk Assessment)• Risk equation + time element• Risk = Threat impact * probability• Prioritize key processes and assets• Outcomes

Page 136: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Key Indicators or Success• Corporate governance• BIA practice• Risk assessment practice

Page 137: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Determining Business Continuity Strategy

• High-level strategies• RTO < MTPD• Separation distance• Resilience• Address specific business types

Page 138: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Determining Strategy• Determining BC strategies• Strategy options• Activity continuity options• Resource-level consolidation

Page 139: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Activity Continuity Options• Selecting recovery tactics• Reliability• Extent of planning• Cost/benefit analysis• Outcome

Page 140: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Recovery AlternativesAlternative Description Readiness Cost

Multiple processing/ mirrored site

Fully redundant identical equipment

and data

Highest level of availability and readiness

Highest

Mobile site/trailer Designed, self-contained IT and communications

Variable drive time; load data and test systems

High

Hot site Fully provisioned IT and office, HVAC, infrastructure and communications

Short time to load data, test systems. May be yours or

vendor staff

High

Warm site Partially IT equipped, some office, data and voice, infrastructure

Days of weeks. Need equipment, data communications

Moderate

Cold site Minimal infrastructure, HVAC

Weeks or more. Need all IT, office equipment and

communications

Lowest

Page 141: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Processing AgreementsAgreement Description Consideration

Reciprocal or Mutual Aid Two or more organizations agree to recover critical operations for each other.

Technology upgrades/ obsolescence or business growth. Security and access by partner users

Contingency Alternate arrangements if primary provider is interrupted, i.e. voice or data communications

Providers may share paths or lease from each other. Question them.

Service Bureau Agreement with application service provider to process critical business functions.

Evaluate their loading geography and ask about backup mode.

Page 142: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Resource Level Consolidation• Consolidation plan• Availability of solutions• Consolidate, approve, implement• Methods and techniques• Outcomes and deliverables

Page 143: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Business Continuity Plan• Master plan• Modular in design• Executive endorsement• Review quarterly

Page 144: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Business Continuity Plan Contents• When team will be activated• Means by which the team will be activated• Places to meet• Action plans/task list created

Page 145: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

• Responsibilities of the team or of specific individuals– Liaising with Emergency Services (fire, police ambulance)– Receiving or seeking information from response teams– Reporting information to the Incident Management Team– Mobilizing third party suppliers of salvage and recovery services– Allocating available resources to recovery teams– Invocation / mobilization instructions

Business Continuity Plan Contents

Page 146: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Developing and Implementing Response

• Incident response structure• Emergency response procedures• Personnel notification• Communications• Restoration

Page 147: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Implementing Incident Management Plan

• Rapid response is critical• Crisis management• Steps to develop an Incident Management Plan• Action plans

Page 148: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Incident Response Structure

• Strategic• Tactical• Operational

Page 149: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Key Indicators of Success• Development and acceptance of Recovery Strategies and

Business Continuity Plans

Page 150: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Disaster Recovery• Salvage• Separate function and team• Facility restoration • System recovery

Page 151: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Testing the Program• Find the flaws• Outsourcing• Timetable for tests• Test design process

Page 152: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Testing TypesTypes Process Participants Frequency Complexity

Desk Check Check the contents of the plan, aid in

maintenance.

AuthorOften LOW

Walk-through

Check interaction and roles of participants.

Author and main people

Simulation Includes: business plans, buildings, communications

Main people and auditors

Parallel testing

Moves work to another site. Recreates the

existing work from the displaced site.

Everyone at location

Full Shuts down and relocates all work

Everyone at both locations Rare HIGH

Page 153: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Embedding BCP• Assessing level of awareness and training• Developing BCP within the Culture• Monitoring cultural change

Page 154: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Test BCP Arrangements• Test, rehearsal, exercise• Combine all plan activities• Stringency, realism and minimal exposure• Contents of a test• Outcomes

Page 155: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Maintaining BCP Arrangements• Ready and embedded• Triggered by change management• Owners keep information current• Documented• Review as needed

Page 156: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Reviewing BCP Arrangements• Audit• Independent BCP audit opinion• As directed by audit policy

Page 157: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Factors for Success• Supported by senior management• Everyone is aware• Everyone is invested• Consensus

Page 158: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Assessing the Level of Awarenessand Training

• Where are we now• What does the policy state• Current vs. desired levels• Training framework in place

Page 159: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Developing a BCP Within the Organization’s Culture

• Training, education, awareness• Well-implemented policy• Design• Delivery planning• Delivery• Cost effective delivery• Higher awareness

Page 160: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Operations Security• Protection and Control of Data Processing Resources

– Media Management– Backups and Recovery– Change Control

• Privileged Entity Control

Page 161: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Control Categories• Preventive• Detective• Corrective• Deterrent• Recovery• Directive• Compensating

Page 162: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Application-related Controls• Transaction• Input• Processing• Output• Test• Supervision / balancing• Job-flow• Logging• Licensing

Page 163: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Operations Security Focus Areas• Auditors• Support staff• Vendors• Security• Programmers• Operators• Engineers• Administrators

Page 164: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Facility Support Systems• The support systems in centralized and decentralized operation

centers must be protected– Hardware– Software– Storage media– Cabling– Physical security

Page 165: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Facility Support Systems (cont.)• Fire protection• HVAC• Electrical power goals

Page 166: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Facility Support Systems (cont.)• Water• Communications• Alarm systems

Page 167: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Media Management• Storage• Encryption• Retrieval• Disposal

Page 168: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Object Reuse• Securely reassigned• Disclosure• Contamination• Recoverability

Page 169: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Clearing of Magnetic Media• Overwriting• Degaussing• Physical destruction

Page 170: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Media Management Practices• Sensitive Media Controls

– Destroying– Marking– Labeling– Handling– Storing– Declassifying

Page 171: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Misuse Prevention

Threats Countermeasures

Personal use Acceptable use policy, workstation controls, web content filtering, email filtering

Theft of media Appropriate media controls

Fraud Balancing of input/output reports, separation of duties, verification of information

Sniffers Encryption

Page 172: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Records Management• Consideration for records management program development• Guidelines for developing a records management program• Records retention

Page 173: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Adequate Software & Data Backup• Operations controls ensure adequate backups of:

– Data– Operating systems– Applications– Transactions– Configurations– Reports

• Backups must be tested• Alternate site recovery plan

Page 174: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Fault Tolerance• Hardware failure is planned for• System recognizes a failure• Automatic corrective action• Standby systems

– Cold – configured, not on, lost connections– Warm – On, some lost data or transactions (TRX)– Hot – ready – failover

Page 175: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID – Redundant Array of Independent Discs

• Hardware-based• Software-based• Hot spare

Page 176: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 0• Two or more disks• No redundancy• Performance only

Page 177: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 1• Exact copy (or mirror)• Two or more disks• Fault tolerant• 200% cost

Page 178: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 2• Striping of data with error correcting codes (ECC)• Requires more disks than RAID 3/4/5• Not used, not commercially viable

Page 179: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 3• Byte level stripes• 1 drive for parity• All other drives are for data

Page 180: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 4• Block level stripes• 1 drive for parity• All other drives are for data

Page 181: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 5• Block level stripes• Data and parity interleaved amongst all drives• The most popular RAID implementation

Page 182: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 6• Block level stripes• All drives used for data AND parity• 2 parity types• Higher cost• More fault tolerant than RAID implementations 2 - 5

Page 183: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 0+1• Mirroring and striping• Higher cost• Higher speed

Page 184: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

RAID Level 10• Mirroring and striping• Higher cost• Higher speed

Page 185: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Redundant Array of Independent Tapes (RAIT)

• Using tapes not disk• Rea-time mirroring

Page 186: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Hot Spares• Waiting for disaster• Global• Dedicated

Page 187: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Backup Types• File image• System image• Data mirroring• Electronic vaulting• Remote journaling• Database shadowing• Redundant servers• Standby services

Page 188: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

System Recovery – Trusted Recovery• Correct implementation• Failures don’t compromise a system’s secure operation

Page 189: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Types of Trusted Recovery• System reboot• Emergency system restart• System cold start

Page 190: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Fail Secure• Cause little or no harm to personnel• System remains secure

Page 191: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Operational Incident Handling• First line of defense• Logging, tracking and analysis of incidents• Escalation and notification

Page 192: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Incident Response TeamBenefits

• Protection of assets• Profitability• Regulations• Avoiding downstream

damage• Limit exposure

Priorities• Life safety• Labeled data• Communication• Reduce disruption

Page 193: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Contingency Plans• Business continuity plans and procedures

– Power failure– System failure– Denial of service– Intrusions– Tampering– Communication– Production delay– I/O errors

Page 194: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Change Control Management• Business and technology balance• Defines

– Process of changes– Ownership of changes

• Changes are reviewed for impact on security

Page 195: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Change Control Committee Responsibilities

Management• Business impact• Regulations• Risk management• Approval• Accreditation

Technical• Request process• Functional impact• Access control• Testing• Rollback• Certification

Page 196: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Change Control Procedures• Request• Impact assessment• Approval• Build/test• Implement• Monitor

Page 197: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Configuration Management Elements• Hardware inventory• Hardware configuration chart• Software• Firmware• Documentation requirements• Testing

Page 198: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Patch Management• Knowledge of patches• Testing• Deployment• Zero-day challenges

Page 199: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Protection of Operational Files• Library Maintenance

– Backups– Source code– Object code– Configuration files

• Librarian

Page 200: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Operator Privileges• Data input and output• Data maintenance• Labeling• Inventory

Page 201: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Administrator Privileges• Systems administrators• Network administrators• Audit highly-privileged accounts

Page 202: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Security Administrator Privileges• Security administration include:

– Policy• Development• Implementation• Maintenance and compliance

– Vulnerability assessments– Incident response

Page 203: Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) Introduction to Cyber Security ( Applications, Physical, Legal, Business Continuity,

Control Over Privileged Entities• Review of access rights• Supervision• Monitoring/audit