Section 4 - Security of Netwroks, Systems, Applications and Data
Section 4 - Security of Netwroks, Systems, Applications and Data
Configuration Management
Performance Management
Security Management
Repeaters
Hub
Layer 2 Switches
Componen
Routers
Port Number
Port and Protocols
Network Security
Tunelling
PP2P
L2TP
IPSec VPN
DoS
Remote Access
Policies and standards
Proper authorizations
Access privileges
System services
Configuration restrictions
MODES OF OPERATIONS
Asset
An objective for each phase of the life cycle that is typically Vulnerability?
described with key deliverables, a description of recommended
tasks and a summary of related control objectives for effective Include Cyberrisk assesment?
management
Firewalls
Use good application security architecture practices from the start Data Reporting and metric
Integrate security into the development life cycle Assess the level of effectiveness and quality of existing security
control
What penetration testing do?
Stay current on application vulnerabilities.
Identify how specific vulnerabilities expose IT resource and assets
Verification and validation that a program, subsystem or application
and the designed security controls perform the functions for which Ensure Compliance
they have been designed
A variety of development methodologies and organizational Prior condition before penetration testing?
requirements to provide for a large range of testing schemes or Process Controls -- Penetration Testing
Testing PCI Penetration Testing Guide
levels
System Development Life Cycle (SDLC) Application Security PTES (Penetration Testing Execuruion Standard)
Review Process
Penetration Testing Framewrork Penetration Testing Framework
Agile Development
ISSAF ( Information Systems Security Assessment Framework
Reduced time to market
OSSTMM ( Open Source Security Testing Methodology Manual)
Faster return on investment
Organizational culture
Fear of change
Silo mentality
Covert Channel
Race Condition
Steganography
Backup
Data Classification
Confidentiality
Privacy
Availability
consider
Ownership and distribution
Integrity
figure 4.14
Data retention Data Owner Data Security
Auditability
Capacity issues
vulnerable type of risk
Physical damage
Design flaws
Data corruption
Referential integrity
Entity integrity
Validation of input