Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Category: Uncategorized

Guide to Intrusion Detection and Prevention (IDP) Systems (Draft) – Special Publication 800-94

Posted on September 13, 2006December 30, 2021 by admini

IDPs have become a necessary addition to the security infrastructure of nearly every organization. IDPs typically record information related to observed events, notify security administrators of important observed events, and produce reports.

This NIST publication describes the characteristics of IDP technologies and provides recommendations for designing, implementing, configuring, securing, monitoring, and maintaining them.

Securing IDP components is very important because IDPs are often targeted by attackers who want to prevent the IDPs from detecting attacks or want to gain access to sensitive information in the IDPs, such as host configurations and known vulnerabilities.

IDPs are composed of several types of components, including sensors or agents, management servers, database servers, user and administrator consoles, and management networks.

Administrators should maintain the security of the IDP components on an ongoing basis, including verifying that the components are functioning as desired, monitoring the components for security issues, performing regular vulnerability assessments, responding appropriately to vulnerabilities in the IDP components, and testing and deploying IDP updates.

Organizations should consider using multiple types of IDP technologies to achieve more comprehensive and accurate detection and prevention of malicious activity.

The four primary types of IDP technologies—network-based, wireless, NBAD, and host-based—each offer fundamentally different information gathering, logging, detection, and prevention capabilities. For most environments, a combination of network-based and host-based IDP technologies is needed for an effective IDP solution. Wireless IDP technologies may also be needed if the organization determines that its wireless networks need additional monitoring or if the organization wants to ensure that rogue wireless networks are not in use in the organization’s facilities. NBAD technologies can also be deployed if organizations desire additional detection capabilities for denial of service attacks, worms, and other threats that NBADs are particularly well-suited to detecting. Direct IDP integration is most often performed when an organization uses multiple IDP products from a single vendor, by having a single console that can be used to manage and monitor the multiple products.

Evaluators need to understand the characteristics of the organization’s system and network environments, so that an IDP can be selected that will be compatible with them and able to monitor the events of interest on the systems and/or networks. Evaluators should articulate the goals and objectives they wish to attain by using an IDP, such as stopping common attacks, identifying misconfigured wireless network devices, and detecting misuse of the organization’s system and network resources.

http://www.bankinfosecurity.com/regulations.php?reg_id=307&PHPSESSID=a842e1d4d220653dc1dd762d42e04179

Read more

IT execs feel the heat as security woes multiply

Posted on August 28, 2006December 30, 2021 by admini

Security accountability is long overdue, says John Pescatore. When a series of worms hit in 2001 and paralyzed businesses, IT staff threw up their hands and blamed vendors. “Five years ago, nobody was responsible and nobody had authority,” Pescatore says. “The business side of the organization has learned to live with accountability and is able to talk about revenues and returns,” Pescatore says. IT managers and security managers aren’t the ones setting corporate policies, yet they’re responsible for enforcing the policies and ensuring security, he says. All in a day’s work IT executives say their jobs are now on the line if an IT event compromises security or im­pedes business performance.

Greater accountability is a natural consequence of IT becoming more central to business operations, says Chris Majauckas, computer technology manager for Metrocorp Publications in Boston. “Upper management is aware that it is impossible to foresee every possible negative event, but they do expect those events to be handled promptly and properly,” he says. “The days of upper executives that aren’t IT-aware are gone,” adds Bruce Meyer, senior network engineer at ProMedica Health System in Toledo, Ohio. The negative publicity surrounding the recent breaches has forced all IT departments “to examine how the events happened and discuss with the executive level what our exposure to the same incident would be,” says Cory Elliott, IT director at Basic Energy Services in Midland, Texas.

The Health Insur­ance Portability and Account­abil­ity Act (HIPAA) and the Sarbanes-Oxley Act (SOX) were designed to protect patient pri­vacy and im­prove financial re­porting, respectively. The burden of providing that falls to IT – which can become a scapegoat if efforts come up short. “Oversights, either deliberate or inadvertent, now become part of reports to audit committees and boards, who have obligations to show due diligence in responding to compromised situations,” he says. “This may produce more pressure and require dismissals that would not necessarily occur in private companies.” Dismissing or shuffling IT staff is often a signal to the public that punitive and preventive measures have been taken, Donnelly says.

The company’s IT department is spending more time and money on security investments such as intrusion-prevention systems, firewall, security appliances and anti­virus software. “If you have a regulatory stick, use it,” Pescatore says. While greater IT accountability is a good thing, it has to come with authority, Pescatore says.

Ground your assertions in reason: “It has to be about more than just fear.”

http://www.networkworld.com/news/2006/082806-security-risk.html?WT.svl=bestoftheweb1

Read more

How to Use Metrics

Posted on August 20, 2006December 30, 2021 by admini

Internal controls, established to mitigate a variety of business risks, provide the dashboard to inform management on the status of core activities and to apply the brakes that keep the enterprise safely on course. The security organization plays a critical role in identifying, measuring, preventing and responding to a growing inventory of risks. We must be able to measure the probability and potential consequences of an identified risk, or management has no gauge to assess and prioritize what actions to take. Metrics are central to understanding the adequacy of security controls and where to focus our limited resources for the greatest contribution to the protection strategy.

This excerpt from the book Measures and Metrics in Corporate Security, Communicating Business Value gives a few examples of the ways CSOs can think about the data they collect as part of their security operations and identifies what is important to measure, and how to communicate with senior business executives about what the data indicates about their organization’s risk environment and how it’s being managed.

Security programs gather volumes of data every day. The successful security executive defines his business plan and the performance of resources and services around clearly articulated measures. Those measures should be aligned with core business strategy and priorities.

Figure 1 illustrates how a CSO has evaluated the importance of various security metrics, based on their relevance to business drivers such as managing costs and risks, focusing on return on investment, complying with the law and company policies, and protecting the lives and safety of employees. Note the last column on the right, which is checked every time: internal influence.

Effective use of metrics that matter to business leadership, demonstrating the value of security operations, wins a security executive important capital. Every CSO should have half a dozen dials to watch on a regular basis. These indicators could be “survival metrics,” the hot buttons on a dashboard you are expected to address that monitor the wellness of your organization or an issue of particular concern to management.

You may find that you have more than one dashboard—yours and the one your boss and a few key players expect you to watch and report on. The CFO could be an excellent resource to advise you on the presentation of dashboard metrics since this officer typically reports performance metrics to management on a regular basis. While these dashboards view an array of priorities, you need first to identify what risks are important.

One way to drill down on a particular risk and determine its priority level is through risk mapping. Risk mapping is about plotting the dynamics of the risk incident landscape. A presentation model of risk dynamics or risk profiling may be found in the risk map on Figure 2. More consequential incidents are at the top of the map, and more frequent ones are to the right. In Figure 2, eight types of internal misconduct cases were plotted for the month, and the five highlighted all had inadequate supervision and poor policy awareness as contributing causes of the infractions.

There is a valuable story to be told to management, and it is particularly useful in quarterly or annual presentations to display notable trends, their contributing causes and suggestions for mitigation tactics. Measures mapping helps you do that by looking at areas of risk, the contributing causes to those risks and actions implemented to mitigate those risks, and then measuring the effectiveness of those actions.

It’s a CSO’s job to find the appropriate model for security measurement and reporting objectives that fits his organization.

http://www.csoonline.com/read/080106/fea_metrics.html

Read more

Defending Cell Phones and PDAs Against Attack

Posted on August 17, 2006December 30, 2021 by admini

These messages, supposedly from a legitimate company, may try to convince you to visit a malicious site by claiming that there is a problem with your account or stating that you have been subscribed to a service.

Not only does this hide the real attacker’s identity, it allows the attacker to increase the number of targets (see Understanding Denial-of-Service Attacks for more information).

Trying to gain access to account information – In some areas, cell phones are becoming capable of performing certain transactions (from paying for parking or groceries to conducting larger financial transactions). An attacker who can gain access to a phone that is used for these types of transactions may be able to discover your account information and use or sell it.

Follow general guidelines for protecting portable devices
– Take precautions to secure your cell phone and PDA the same way you should secure your computer (see Cybersecurity for Electronic Devices and Protecting Portable Devices: Data Security for more information).

– Be careful about posting your cell phone number and email address – Attackers often use software that browses web sites for email addresses. These addresses then become targets for attacks and spam (see Reducing Spam for more information). By limiting the number of people who have access to your information, you limit your risk of becoming a victim.

Messages from unknown person = While the links may appear to be legitimate, they may actually direct you to a malicious web site.

Be wary of downloadable software – There are many sites that offer games and other software you can download onto your cell phone or PDA.

Disable Bluetooth when you are not using it to avoid unauthorized access (see Understanding Bluetooth Technology for more information).

http://www.us-cert.gov/cas/tips/ST06-007.html

Read more

When Disaster Strikes, Manage it

Posted on August 16, 2006December 30, 2021 by admini

The rapid development of the internet has made it easier to reach and communicate with your clients and suppliers, and whether you choose to be an e-tailer or are forced by suppliers to order online, IT functions will probably be at the core of your business.

This may be in the form of communications, customer/supplier management or just product/company information. As the majority of us rely so heavily on email for communication, I challenge anyone who is happy to tell their board of directors that email is not working and “might not be back online for a while”!

When disasters strike, the media will want to know what has happened, how it happened, whose fault it was, what you are doing to recover and how you are managing the relationships with your clients and suppliers. You are not just responsible for creating the plan and deciding on appropriate levels of protection and recovery methods but also for training your staff. Remember these are not the only skills required and I am looking at a fairly basic level, but without these key skills your business continuity plan is unlikely to get off the ground, let alone be effective.

http://www.it-observer.com/articles/1209/when_disaster_strikes_manage_it/

Read more

The Value of Branding Your Security Awareness Program

Posted on July 22, 2006December 30, 2021 by admini

While we have installed firewalls, intrusion detection systems, robust anti-virus and anti-spyware solutions, and strengthened authentication methods, we have still largely ignored security awareness training. And when the authors say ignored, she means that most companies now have an Acceptable Use Policy in place that employees have to sign upon employment, but that’s where the effort stops. Security awareness programs are about changing culture.

http://www.bankinfosecurity.com/articles.php?art_id=157&PHPSESSID=ccd23e68b1848b308c34fd9680492a63

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • 40
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme