1 / 13

Security fundamentals

Security fundamentals. Topic 11 Maintaining operational security. Agenda. Establishing site security Secure removable media Secure mobile devices Secure disposal of equipment Business continuity. Site security. Physical access control Secure with lock and key

celina
Download Presentation

Security fundamentals

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security fundamentals Topic 11 Maintaining operational security

  2. Agenda • Establishing site security • Secure removable media • Secure mobile devices • Secure disposal of equipment • Business continuity

  3. Site security • Physical access control • Secure with lock and key • Protection from theft, disasters and accidents • Unencrypted data can be accessed if physical access to servers can be obtained • Access only to authorised personnel with a specific reason to access • Most maintenance and configuration tasks can be performed remotely • Concentric rings: lock server room, lock rack cabinet etc • Sign-in log for access to server room, cameras, key cards, monitoring • Building integrity and security: floors, walls and ceilings • Biometrics for access control (eg doors) • Fingerprints/hand geometry, retinal scans, speech or face recognition

  4. Human factor • Compromise between the need to protect and the need to provide access • If security methods are too restrictive, users will try to circumvent them • Educate and train users on the need to follow secure practices and the dangers and consequences of insecure practises • Social engineering to trick users into revealing information that could compromise the system

  5. Environment • Data centres and server rooms typically have • Air conditioning, air filtration, humidity control, power conditioning • Fire suppression • Flood the room with inert gas replacing the oxygen • Fire put out without water and foam • Emergency alarms for evacuation • FE-13 and FE-36 gas less damaging to ozone layer that halon • Wireless networking • Issue of signal range, careful placement of antennas • Minimise transmission power levels • Shield the operational area • Encrypt wireless communications • Cellular communications has greater risks as it has a greater signal range

  6. Disaster recovery • Any occurrence that prevents your network from operating properly • Backups: • Regular backups and testing with regular restores • Operating systems and backup software must be installed first before recovery begins – increases recovery time • Offsite storage • Keeping offsite data confidential – vault or fireproof safe and protected with access control • Replacement hardware – will backups work on newer hardware? • Secure recovery • Alternate sites • Mirrored servers in a protected environment • Computers, office space, temporary workers • Test platform for emergency services • Hot site – immediate failover; cold site – restores required • Disaster recovery plan • What tasks must be done • Who is responsible for doing them?

  7. Securing removable media • How to secure confidential data and how to dispose of media • Floppy disks • Disable floppy disk drives or remove • Clean by passing through a magnetic field • Hard disks • Limit the use of removable disks to servers and physically secure computers • Very portable, but fragile if dropped • Writable optical media • 5GB on DVD, 700 MB on CD, small backups and archives • Protect disks from scratches and sunlight • Password protect the disk or encrypt the data if required • Limit writable drives (install CD, DVD Rom) and disable USB ports

  8. Securing removable media • Magnetic tape • Low cost, high speed, large capacity • Robotic tape changers for allow for unattended backups • QIC, DAT, DLT, LTO • Not random access • Limit the use of tape drives and encrypt the data • Flash media • High capacity and small size • Protect data by encrypting • Disable USB ports • Smart cards • Information on card is encrypted • Cards can be lost or stolen, so not sufficient to authenticate as the only method • Authentication when used with PIN or password

  9. Securing mobile devices • Antitheft devices • Motion alarms, locking cables and tracking equipment • Identifying marks and colours • ID engraving • Data encryption • Confidential data • Monitor use when connected to the network

  10. Secure disposal • Ensure permanent erasure of all data from computer and media • To permanently destroy data: • Use specialised software to overwrite data multiple times • Cipher to remove data from cmd • Degauss by exposing to strong magnetic field • Physically destroy the media • Floppies – magnetise and shred disks • Tapes – overwrite multiple times and shred • Hard drives – repeated overwriting • Optic media – destroy the disk, don’t burn due to toxic fumes • Documents • Shred paper documents to protect from dumpster diving

  11. Business continuity • Planning phase: • Identify the mission-critical processes • Identify all of the resources required for the mission-critical processes to operate • Rate the relative importance of the mission-critical processes • Decide on a course of action to undertake for each mission-critical process • If critical, move process to a branch office or activate a fallback facility with backup equipment • If less critical, consider purchasing insurance to cover the financial losses resulting from the interruption • Implement the plan • Test the plan regularly and train employees

  12. Business continuity preparation • Backup data and store copies offsite • High availability and fault tolerance • Raid for disk failure • Clustered servers for server failure • Mirrored servers at alternate location • Duplicate office configuration • Duplicate WAN links • Procurement plans and contracts to replace equipment and personnel • Utilities • Power • UPS, backup generator with failover switch • Water • Mail and courier services

  13. Lesson summary • How to go about establishing site security • Types of removable media and mobile devices, and how to secure them • How to securely dispose of equipment • What to consider to maintain business continuity

More Related