ECI NOC Admin School Course Outline-1
CONTENTS
MANAGEMENT’S RESPONSIBILITY
Management’s Role in Computer Security
Policies, Standards, and Procedures
Information Security Risk Management
Employment Policies and Practices
Legal Issues in Computer Security
Computer Crime and Computer Criminals
BASIC SAFEGUARDS
Contingency Planning and Disaster Recovery
Computer Risks and Insurance
Auditing Computer Security
System Application Controls
PHYSICAL PROTECTION
Hardware Elements of Security
Computer Facility Protection
Monitoring and Related Control Devices
TECHNICAL PROTECTION
Software and Information Security
Security of Computer Data, Records, and Forms
Data Encryption
Data Communications and Networking
Penetrating Computer Systems and Networks
Viruses and Related Threats to Computer Security
SPECIAL PROTECTION ISSUES
Outside Services
Security for Personal Computers
Local Area Network Security
Security on the Internet
- Access Control Systems and Methodologies
- Access control concepts, methodologies, and implementation
- Access controls: detective, corrective, and preventative
- Access control techniques in centralized and decentralized environments
- Access control risks, vulnerabilities, and exposures
- Security Architecture and Models
- Secure operating system principles, concepts, mechanisms, controls, and standards
- Secure architecture design, modeling, and protection
- Security models: confidentiality, integrity, and information flow
- Government and commercial security requirements
- Common criteria, ITSEC, TCSEC, IETF, IPSEC
- Technical platforms
- System security preventative, detective, and corrective measures
- Disaster Recovery and Business Continuity Planning
- Business continuity planning, business impact analysis, recovery strategies, recovery plan development, and implementation
- Disaster recovery planning, implementation, and restoration
- Compare and contrast disaster recovery and business continuity
- Security Management Practices
- Organizational security roles
- Identification of information assets
- Security management planning
- Security policy development; use of guidelines, standards, and procedures
- Security awareness training
- Data classification and marking
- Employment agreements and practices
- Risk management tools and techniques
- Law, Investigation, and Ethics
- Computer crime detection methods
- Applicable computer crime, security, and privacy laws
- Evidence gathering and preservation methods
- Computer crime investigation methods and techniques
- Civil, criminal, and investigative law
- Intellectual property law
- ISC2 and IAB ethics application
- Physical Security
- Prevention, detection, and correction of physical hazards
- Secure site design, configuration, and selection elements
- Access control and protection methods for facility, information, equipment, and personnel
- Operations Security
- Resource protection mechanisms and techniques
- Operation security principles, techniques, and mechanisms; principles of good practice and limitation of abuses
- Operations security preventative, detective, and corrective measures
- Information attacks
- Access Control Subversion
- Cryptography
- Cryptographic concepts, methods, and practices
- Construction of algorithms
- Attacks on cryptosystems
- Ancient cryptography and modern methods
- Public and private key algorithms and uses
- Key distribution and key management
- Digital signature construction and use
- Methods of attack, strength of function
- Telecommunications and Network Security
- Overview of communications and network security
- Voice communications, data communications, local area, wide area, and remote access
- Internet/Intranet/Extranet, firewalls, routers, and network protocols
- Telecommunication and network security preventative, detective, and corrective measures
- System development process and security controls
- System development life cycle, change controls, application controls, and system and application integrity
- Database structure, concepts, design techniques, and security implications
- Object oriented programming
- Data warehousing and data mining
- Review and Q&A Session
- Review concepts introduced in previous sessions
- Answer specific questions or concerns regarding CISSP preparation material
- Testing-Taking Tips and Study Techniques
- Tips for additional preparation for the CISSP exam
- Additional resources
- Techniques for scoring well on the exam
Course Summary
Cisco Hardware: Cisco 1800, 2900, 7200, 10K – ESR, 12K-GSR, CRS, Catalyst 6500 switches, Nexus switches
Other Network Hardware: Juniper MX960’s, CSU/DSU’s, DACS, secondary familiarity with ALU 77xx routers
Transport Protocols: MPLS, Frame-Relay, PPP, Packet over SONET (PoS), Gigabit Ethernet, LAN, WAN, MAN
Circuits: DS1, DS3, OC3, OC12, Ten Gigabit Ethernet
Network Protocols: TCP/IP, MPLS, 802.1Q, QoS, Multicast, Encryption (3DES), GRE tunneling
Routing Protocols: RIP, OSPF, BGP, IS-IS, HSRP/VRRP
Applications/Tools: Openview, Netcool, Infovista, Wireshark, Statseeker, IP management tools, Voyance, Remedy Ticketing, Citrix
Office Automation: Word, Excel, Outlook, Powerpoint
O/S and Software: Windows XP, SSH, VPN Client
SOFTWARE AND INFORMATION SECURITY
CONTENTS
Software Defined as Programs and Data Files
Overview of Current Computer Security Needs
Popular Misconceptions
Threats to software
What are Programs?
What are Data Files?
Software Security Requirements for Environments with Mainframes and
Minicomputers
- Security officer or Security Administrator
- Access to Programs and Data
- Protection of Programs
- Change Control Procedures
Protection of Information
- Controlling User Access to Files and Databases
- Controlling Technician Access to Files and Databases
Protection in Development
Assuring That Damaged or Lost Files Can Be Recovered
Protecting On-Line Files
- Record Lock on Update
- Backup Files and System Logs
- Recovery and Restart
- Back-out
- Activity Logs
Assuring that Data in the System is Valid
- GIGO Reduced
- Check Digits
- Range Checks
- Validity Checks Using Tables
Software Protection in a Decentralized Environment
- Similarities and Differences to Centralized Environments
Viruses
- What are Viruses?
- Protection Against Viruses
HARDWARE ELEMENTS OF SECURITY
CONTENTS
Introduction
Binary Design
- Pulse Characteristics
- Circuitry
- Coding
Parity
- Vertical Redundancy Checks (VRC)
- Longitudinal Redundancy Checks (LRC)
- Cyclical Redundancy Checks (CRC)
- Self-Checking Codes
Hardware Operations
- Read-after-Write
- Dual Read
- Echo
- Overflow
- Hardware Multiply
- Validity
- Replication
Interrupts
- Input/Output (I/O) Interrupts
- Supervisor Calls
- Program Check Interrupts
- Machine Check Interrupts
- External Interrupts
- Trapping
Data Storage
- Main Memory
- Read-Only Memory (ROM)
- Secondary Storage
Time
- Synchronous
- Asynchronous
Natural Enemies
- Power Failure
- Heat
- Humidity
- Water
- Dirt and Dust
- Radiation
- Downtime
Data Communications
- Dial-up Lines
- Leased Lines
- Wireless Communication
- Terminals
- Cryptography
Backup
- Personnel
- Hardware
- Power
- Testing
Recovery Procedures
Microcomputer Considerations
- Physical Damage
- Theft
- Power
- Static Electricity
- Data Communications
- Maintenance and Repair
Conclusion
COMPUTER FACILITY PROTECTION
CONTENTS
Introduction
The security Planning Process
- Critical-Path Analysis
- Defining the Risk Factors
- Defining the Costs of Risks
- Weighing Security Alternatives
Designing Strong Physical Security
- How to Lay Out Computer and Equipment Rooms
- Design Considerations
- Electrical Power
- Power Line Protection
- Temperature Control
- Humidity Control
- Air Quality
- Fire Protection, Smoke, and Water Damage
- Monitors and Sensors
- Fire Suppression Systems
- Utilizing the Detectors
- Protecting the Protection
Protecting Wiring
- Optical Fiber: Now or Later?
- Certifying the Wiring and Cabling
- Controlling Access to Closets and Riser Rooms
Securing Storage Areas
- Tape and Disk Storage Rooms
- Forms Storage Rooms
Dealing with Existing Facilities
Protecting External Services
Summary
SECURITY OF COMPUTER DATA, RECORDS, AND FORMS
CONTENTS
Introduction
- Legal and Other Standards for Safeguarding Vital Records
Controls to Assure Integrity of Records
- Operating System Controls
- Controls for Each Application
- IDs for Terminal Users
- Passwords
- Production Time Analysis
- Data Output
- Encryption
- Network System Controls
- Power Protection
- Viruses
Backing Up Computer Data
- What Records to Back Up
- When to Make Backups
- Where to Keep Backup Copies
- How to Save and Transmit Backups to Storage
- Special Network Issues
Safeguarding Noncomputer Data
- Records Retention Plans: Scope and Importance
- Records Retention Principles
- Records Inventory and Analysis
- Participation by Legal, Audit, Operating, and Management Personnel
- Vital Records
- Legal Validity of Duplicates
- Where to Keep Records
- Association Support
Records Destruction Methods
- In-house
- Contractor
- Affidavit
- Destroying Electronic Data
Forms and Related Supplies
- Checks
- Other Forms
- Supplies
Conclusion
PENETRATING COMPUTER SYSTEMS AND NETWORKS
CONTENTS
Security: More Than a Technical Issue
- Technical Infrastructure
- Organizational Culture
- Data Leakage: A Fundamental Problem
Penetration Techniques
- Technical
- Misrepresentation (Social Engineering)
- Bulletin Board Systems
Countermeasures
- Strengthening the Perimeter
- Encryption
- Restrictions on Access
- Monitoring
- Prosecution
The Future of Computer Crime
CONTINGENCY PLANNING AND DISASTER RECOVERY
CONTENTS
Business Continuity: The Survival Instinct
Prerequisites For Contingency Planning
- Information Backup
- Management Commitment
Basic Elements of Contingency Plans
- Defining Contingency Planning Goals
- Vital Records Program
- Emergency Response Procedures
- Emergency Response Guidelines
Backup Requirements
- Hardware Backup
- Software and Information Backup
- Procedures and Documentation
- Backup for Related Activities
Alternatives for Backup Planning
- Vendor or Third-Party Resupply of Hardware
- On-the-Shelf Hardware
- Mutual Aid Agreements
- In-House Dual Sites
- Third-Party Hot Sites
- Third-Party Cold Sites and Warm Sites
- Alternative Ownership for Hot and Cold Sites
- Mobile Backup Sites
- Documenting the Disaster Recovery Planning Process
Management Responsibility
- Strategies
- Monitoring and Testing Results
- Reviewing and Updating Plans
DEFINITION OF CONTROL REQUIREMENTS
It is through the use of a set of clearly defined requirements that an effective and efficient management controls program in implemented. A set of 55 control requirements has been synthesized from the governing directives. This chapter describes these requirements and concludes with cross-references to the particular sections of the directives from which they were derived. The 55 control requirements are grouped under the four categories described in chapter 2:
- Application controls
- General controls
- Administrative controls
- Required system functions
Application Controls (1-7)
1. Transactions are authorized-the information entered into the system must be
authorized by management for entry.
2. Transactions are valid-the information system must process only data that
represent legitimate events.
3. Information is complete-all valid data, and only those data, are to be processed by the
information system.
4. Information is accurate-data must be free from error during all phases of processing,
within defined levels of tolerance.
5. Information is timely-data must reflect the correct cycle, version, or period for the
processing being performed. Financial management data shall be recorded as soon
as practical after the occurrence of the event, and relevant preliminary data shall be
made available to managers promptly after the end of the reporting period.
6. System and data are secure-the data files, computer programs, and equipment must
be secure from unauthorized, including accidental changes; unauthorized disclosure
and use; and physical destruction. Detective and corrective controls may also apply
depending on the sensitivity/classification of the data.
7. System is auditable-an information trail must exist that establishes individual
accountability for transactions and permits an analysis of breakdowns in the system
and other anomalies.
General Controls (8-33)
8. System controls exist-for each information system, the controls system should ensure
that appropriate safeguards are incorporated into the system, tested before
implementation, and tested periodically after implementation.
9. Five-year system plan developed-a plan featuring specific milestones with obligation
and outlay estimates for every system of the agency (both current and under
development).
10. Contingency plan/disaster recovery plan exists-agencies shall develop, maintain,
and test disaster recovery and continuity of operations plans for their data center(s).
The plan’s objective is to provide reasonable continuity of data processing support
support is normal operations are prevented.
11. Vulnerability assessment conducted-a review of the susceptibility of a program
or function to waste, loss, unauthorized use, or misappropriation. Includes both
vulnerability assessments or their equivalents, such as an audit.
12. Cost/benefit analysis exists-a review to determine and compare the benefits of the
proposed system or control against the cost of developing and operating the
system or control. Only those proposals were the expected benefits exceed the
estimated costs by 10 percent should be considered for development unless
otherwise specifically required by statute.
13. Reasonable assurance applied-reasonable assurance equates to a satisfactory
level of confidence, based on management’s judgment of the cost/benefits of the
controls versus the recognized risks. (Practically, it is recognized that it is not
cost effective to attain 100 percent assurance.)
14. Control objectives defined-goals established to address a known vulnerability or
promote reliability or security of a system.
15. Control techniques selected-methods to satisfy one or more control objectives by
preventing, detecting, and/or correcting undesired events. More commonly referred
to as “controls.”
16. Adequacy of security requirements determined-agencies shall ensure that the
appropriate technical, administrative, physical, and personnel security requirements
are included in specifications for the acquisition or operation of facilities, equipment,
or software.
17. Security specifications exist-internal control and security objectives must be stated
as design specifications and approved by management before development
(programming) of the application system can begin.
18. Adequacy of security specifications determined-proof that the design specifications
satisfy control objectives must be presented to management to authorize computer
program development and/or modification (programming).
19. System design approved-before development (programming) of the system is
authorized, management must be assured that the system design satisfies the user’s
requirements and incorporates the control requirements. The design review must
be documented and be available for examination.
20. Controls documented-internal control systems, including all transactions and
significant events, are to be clearly documented and be readily available for
examination.
21. System documentation exists-documentation must reflect the current state of the
system as it is being operated. The documentation must be sufficient to ensure
effective operation by users and system maintenance by programmers.
22. System contingency plan exists-plans must be developed, documented, and tested
to assure that users of the system can continue to perform essential functions in the
event the information technology support for their application is interrupted. The
plan should also be consistent with the agency wide disaster recovery plan.
(See No. 20)
23. Controls tested-before a new or modified system is placed into production status,
the controls should be tested to prove that the controls operate as intended. The
test results should be documented and sent to management for approval to
implement the system.
24. System test conducted-before implementation of the system is authorized, evidence
that the system operates as intended must be presented to management. This
evidence must also include the results of controls testing. The test results must
be documented and available for examination.
25. Test results documented-the documentation should demonstrate that the control
and functionality requirements operate as intended.
26. System certified prior to implementation-before a system can be implemented, an
agency official shall certify that the system meets all applicable Federal policies,
regulations, and standards, as well as state that test results demonstrate that
installed controls are adequate for the application.
27. Controls review performed-periodically, the controls of each system must be tested
to determine if the controls still function as intended. The results of these tests must
be documented and available for examination.
28. Periodic reviews and re-certifications are conducted-at least every 3 years, agencies
shall review applications and re-certify the adequacy of the safeguards. The
re-certifications shall be documented and be available for review.
29. Periodic risk assessment are conducted-agencies shall conduct periodic risk
assessments at each data center to provide a measure of the relative vulnerabilities
and threats to the data center so that security resources can be effectively
distributed to minimize potential loss.
30. Corrective action taken; audit findings resolved promptly-managers are to promptly
evaluate audit findings and recommendations, determine proper corrective actions,
and complete those actions.
31. Annual report on internal controls prepared-yearly, each agency must determine if
its systems of internal controls are in compliance with the Comptroller General’s
standards.
32. Annual report on accounting systems prepared-yearly, each agency must determine
if its accounting systems are in compliance with the Comptroller General’s
standards
33. Annual reports to President sent-the head of each agency must sign both annual
reports and transmit them to both the President and Congress.
Administrative Controls (34-45)
34. Organizational responsibility is affixed-the assignment of responsibilities for
planning, directing, and controlling the controls evaluation process for the agency/
segment is specified. The programs and functions conducted in each of the
components have also been specified.
35. Separation of duties exists-key duties and responsibilities in authorizing,
processing, recording, and reviewing transactions should be separated among
individuals.
36. Supervision is provided-qualified and continuous supervision is to be provided to
ensure that control requirements are met.
37. Supportive attitudes exist-managers and employees are to maintain and demonstrate
a positive and supportive attitude toward controls at all times.
38. Personnel are competent-managers and employees are to have personal and
professional integrity and are to maintain a level of competence that allows them
to accomplish their assigned duties, as well as understand the importance of
developing and implementing good controls.
39. Security training program exists-agencies shall establish a security awareness and
training program so that agency and contractor personnel involved with information
systems are aware of their security responsibilities and know how to fulfill them.
40. Written policies and procedures exist-each agency shall establish administrative
procedures to enforce the intended functioning of controls, including provisions
that performance appraisals reflect execution of control-related responsibilities.
41. Personnel security policies exist-each agency should establish and manage
personnel security procedures, including requirements for screening agency and
contractor personnel designing, developing, operating, maintaining, or using the
system. The level of screening depends on the sensitivity/classification of the
system data.
42. Individual responsibilities are affixed-assignments of responsibility should be made
for internal controls, accounting systems, and data center security on an agency wide
and individual system/center basis.
43. Custody/accountability assigned-the official whose function is supported by an
information system is responsible and accountable for the products of the
information system.
44. Record retention procedures exist-each agency must establish procedures as to
retention, archiving, and destruction of data files.
45. Release of information provided for-each agency must have procedures in place
so that information can be extracted from systems to meet requests made under
the Privacy Act and the Freedom of Information Act.
Required System Functions (46-55)
46. System is efficient-the benefits of the system exceed the costs to develop or operate
the system.
47. System operation is economical-uneconomical systems must be identified and
phased out.
48. System is effective-periodically, each system should be reviewed to determine if the
system still meets organizational needs.
49. System supports management-data shall be recorded and reported in a manner to
facilitate carrying out the responsibilities of both program and administrative
managers.
50. System supports budget-financial management data shall be recorded, stored, and
reported to facilitate budged preparation, analysis, and execution.
51. Comparability/consistency provided for-financial management data shall be recorded
and reported in the same manner through the agency, using uniform definitions that
are synchronized with budgeting and used consistently for each reporting period.
52. Information is useful/relevant-data capture and reports shall be tailored to specific
user needs, and if usage does not justify costs, data or reports shall be terminated.
53. System provides full disclosure-data shall be recorded and reported to provide
users of the data with complete information about the subject of the report per OMB,
Treasury, and Privacy Act standards.
54. Individual access allowed-systems must be able to extract any data contained in the
data base about individuals to meet requests to see the data by that individual or
his/her representative when required by the Privacy Act.
55. Network compatibility exists-any systems developed or acquired must be compatible
with any existing system that will be linked to the new system.