system security basics. information system security the protection of information systems against...

16
System Security Basics

Upload: leona-tyler

Post on 01-Jan-2016

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

System Security Basics

Page 2: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

Information System Security

• The protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.

Page 3: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Page 4: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Page 5: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

Fortress Model

• Watch towers to detect threat

• Protection by:– Moat– Outer Wall– Inner Wall of Keep

• Draw bridge and Gate – controlled access

Page 6: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

Fortress model for defense

1. Critical information

2. Physical protection

3. Operation system hardening

4. Information access

5. External access

Page 7: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

1. Critical Information

• Data categorization– Public– Internal– Confidential– Secret

• Application hardening

Page 8: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

2. Physical Protection

• Physical environment– Geographical location– Social environment– Building construction

• Physical controls

• Communications

• Surveillance

Page 9: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

3. Operation Systems Hardening

• Security configuration

• Anti-malware

• File system– Encrypting File System

• ADDS security

• System redundancy

Page 10: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

4. Information Access

• User identification

• Security policies

• Resources access

• Role base access control

• Access auditing

• Digital rights management

Page 11: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

5. External Access

• Perimeter network

• VPN/ RRAS (Routing and Remote Access)

• SSTP (Secure Socket Tunneling Protocol)

• PKI

• Identity federation

• NAP (Network Access Protection)

Page 12: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

Polices, Procedures & Awareness

Data

Application

Host

Internal Network

Perimeter

The Microsoft Model

Page 13: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

Things to do

• Identify who enter your system

• Provide the user with the appropriate access right

• Identify the person modifying the data is authorized to do so

• Guarantee the confidentiality of information

• Guarantee the availability of information

Page 14: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

Things to do

• Ensure the integrity of the information

• Monitor the activities of the system

• Audit security events

• Put in administrative procedures to ensure the system is secure

Page 15: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

System composition

• File server/ Print server/ Fax server

• Web server

• Application server

• DNS server

• DHCP server

• Domain controller

• Terminal server

Page 16: System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,

System composition

• Email server

• RADIUS server

• VPN server

• Certificate server

• UDDI server

• Network policy and access server

• Gateway/ Firewall/ Switch

• And users