Security Process
What is ARBIL?
INFOSEC life cycle based on assets and risks.
Implement a comprehensive security plan in I.T. and risk management strategies.
What is the CIA?
Confidentiality, integrity and availability
Privacy: Make sure your data is only available to authorized people.
Integrity – make sure your data has not changed. Think about banking transactions or chemical formulas.
Availability – make sure your data is available. Hackers often use denial of service attacks to destroy your servers or networks by overloading them with packets.
Hackers use attack trees to determine every possible entry into your networks. This can be done via modems connected to your network, routers, switches and application vulnerabilities, almost anything connected to your Internet.
Make it difficult to determine your operating system, which hackers use to grab the banner. This is a simple solution that many system administrators leave behind.
Change your banner to display a security warning.
Many people have difficulty understanding security processes alone to implement solutions.
What is SMIRA? Simple methodology for risk assessment based on INFOSEC.
Risk management is the practice and process of identifying threats and vulnerabilities of assets. It helps to make the right decisions to implement the safeguards needed to help your organization fulfill its mission.
Organizations need to examine threats, vulnerabilities, assets, and backups.
Risk assessment
The goal is to have a list of your critical assets. Critical in understanding the mission, objectives and operations and scenarios.
Then, implement safeguards to protect these assets.
Vulnerability Assessment
That’s when you search for vulnerabilities in existing applications and determine their severity. The vulnerabilities will be noted. This includes physical security, web application revisions, policy and procedure reviews, host assessments and OS revisions, and vulnerability scans.
Threat Assessment
This is the process of identifying existing and potential threats to assets and environments. It will also be based on gravity. Where can the threats come from? Unhappy employees, script kiddies, hackers, crackers, foreign governments and your competitors. You can search for threat indicators on your server, logs, video surveillance, intrusion detection systems such as SNORT.
What can the threats cause?
Loss of activity
death
Financial loss
Corruption of data.
Inability to work, servers down or running slowly.
Privacy issues.
What are the assets?
Users’ computer operations
Staff
connectivity
Documentation
Security systems
Third
Paper
Files
Media, such as disks, CDs and USB drives.
Files, Web, EMAIL, Storage, Application Servers
Everything that is valuable for the company.
Hackers like to have access to all information, even if it seems unimportant can be used to filter out more information.
How do you protect against threats and protect your assets?
Have policies and procedures in place.
Employee awareness of security issues.
Security software in place
Physical security in place.
Physical security.
Environmental safety. That is to say. water level sensors.
Security of communication – to protect your phone lines and PBX systems.
Staff security.
There are many software programs on the Internet that even allow technically difficult people to run scans on your systems to try to solve them. Anyone who knows how to search on Google can easily find such tools. The way the Internet is evolving and more and more people joining the Internet is increasing security risks.
Hackers get information about your systems by performing domain searches with Whois. Port scans use many tools available to find out what you are doing, and then search the Internet to find the exploit code that will hack into your systems. Once they discover the applications you use, it will not take long before they can crack your systems if you are not protected.