Premium Essay

Risk Management and Problem Management of a Compromised Unix Operating System

In:

Submitted By chinwah007
Words 4103
Pages 17
Running head: RISK MANAGEMENT AND PROBLEM MANAGEMENT RELATION

The effectiveness of the relationship between risk management and

problem management of a compromised UNIX operating system

CSMN 655

Computer Security, Software Assurance, Hardware Assurance, and Security Management

Abstract

Risk management is an ongoing, continuous process whose purpose is to identify and assess program risks and opportunities with sufficient lead-time to implement timely strategies to ensure program success. The entire risk management process balances the operational and economic costs of protective measures and contributes to mission capability by protecting the systems and the data that support the organizational mission from both deliberate and unintentional compromise. Computer security problem, or incident, management is an administrative function of managing and protecting computer assets, networks and information systems. These systems continue to become more critical to the personal and economic welfare of our society. Organizations must understand their responsibilities to the public good and to the welfare of their members. This responsibility extends to having a management program for reacting to system breaches, if and when they occur. Incident management is a program which defines and implements a process that an organization may adopt to promote its own welfare and the security of the public.

Table of Contents

Risk Management Overview 4
Problem Management Overview 4
OS Risk Management vs. Problem Management 5 Analyzing a System Compromise 5 Documenting. 5 Confirm binaries and configuration files. 6 Review system log files. 6 Consider all network elements. 7 Recover from the Intrusion 7

Similar Documents

Premium Essay

Hardware & Software

...Chapter 2: Hardware & Software 1. Choosing the right computer hardware requires understanding its relationship to the information system and _____ of the organization. a.|growth|c.|structure| b.|business plan|d.|needs| 2. Each central processing unit consists of two primary elements: the arithmetic/logic unit and the _____ unit. a.|memory|c.|control| b.|input/output|d.|ALU| 3. A type of memory whose contents are not lost if the power is turned off is said to be _____. a.|multicore|c.|RAM| b.|nonvolatile|d.|none of the above| 4. _____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem. a.|cloud computing|c.|parallel computing| b.|grid computing|d.|none of the above| 5. RAID storage devices provide organizations with data storage that is _____. a.|fault tolerant|c.|extremely low cost| b.|exceedingly fast|d.|unlimited in storage capacity| 6. A(n) _____ uses computer servers, distributed storage devices, and networks to tie everything together. a.|digital video disk|c.|storage area network| b.|virtual tape|d.|RAID storage device| 7. The _____ is an advanced optical disk technology still in development that would store more data than even the Blu-ray optical disk system. a.|holographic versatile disc|c.|RAID storage device| b.|virtual tape|d.|CD-ROM R/W| 8. _____ are frequently used to capture input in standardized...

Words: 832 - Pages: 4

Premium Essay

Remote Access Attacks

...no further information from this company. The company does not wish to release any security related information per company policy. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw (U.S. Airforce) therefore my assumptions on the network diagram shows that there are vulnerabilities that may exist as a weakness in the automated systems, security procedures, administrative controls, and /or internet controls of the finance company there could also exist hardware vulnerabilities that could lead to unprotected storage of hardware the solution is to store all hardware at the recommended temperature, software vulnerability can occur with insufficient testing and a lack of audit trail solution will be to test and secure all software used and update software as appropriate, audit trails enable security relevant chronological records of activities that occur in the software. There could be network vulnerability with unsecure network architecture and unprotected communication lines the solution will be to install and configure network security equipment to curb these issues. Personnel can be compromised and may be used to create problems either directly or indirectly on the system a solution will be proper recruiting of staff and security awareness training there could also exist organizational vulnerabilities such as lack of security within the organization the solution...

Words: 964 - Pages: 4

Premium Essay

Security Pllus Exam Essentials

...threats. Identify these threats and create methods of countering them before they happen. Be able to identify the potential physical, operational, and management policy decisions that affect your information security efforts. It isn’t good enough to have a plan if the plan is unsound or has gaping holes. You must make sure that the plans you develop and the procedures you follow to ensure security make sense for the organization and are effective in addressing the organization’s needs. Be able to explain the relative advantages of the technologies available to you for authentication. You have many tools available to establish authentication processes. Some of these tools start with a password and user ID. Others involve physical devices or the physical characteristics of the person who is requesting authentication. This area is referred to as I&A. Be able to explain the relative capabilities of the technologies available to you for network security. In most situations, you can create virtual LANs, create connections that are encrypted, and isolate high-risk assets from low-risk assets. You can do so using tunneling, DMZs, and network segmenting. Be able to identify and describe the goals of information security. The three primary goals of information security are prevention, detection, and response. Your policies and systems must include these three aspects to be effective. Ideally, you want to prevent a security breach. If a breach happens, you should have methods to detect...

Words: 5056 - Pages: 21

Free Essay

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71

Premium Essay

Vulnerability in Information

...Cracker Phreaker Spammer Phisher page 21 page 21 page 21 page 21 page 21 page 20 page 20 page 20 page 21 White hat Black hat page 21 page 21 page 28 page 28 Dictionary cracking Brute-force computation Trust exploitation Port redirection page 28 page 29 page 30 Man-in-the-middle attack Social engineering Phishing page 30 page 30 2 Network Security 1 and 2 Companion Guide The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individuals, businesses, and governments risk losing that asset. Network security is the process by which digital information assets are protected. The goals of network security are as follows: ■ ■ ■ Protect confidentiality Maintain integrity Ensure availability With this in mind, it is imperative that all networks be protected from threats and vulnerabilities for a business to achieve its fullest potential. Typically, these threats are persistent because of vulnerabilities, which can arise from the following: Note...

Words: 13317 - Pages: 54

Premium Essay

Integrated Distributors Incorporated (Idi), a Publically Traded Company, Has Its Home Office Located in Billings, Montana. Idi Has More Than 4000 Employees in the Following Locations:

...Incident Response Team Roles and Responsibilities Incident Response Team Notification Types of Incidents Breach of Personal Information – Overview Definitions of a Security Breach Requirements Data Owner Responsibilities Location Manager Responsibilities When Notification Is Required Incident Response – Breach of Personal Information Information Technology Operations Center Chief Information Security Officer Customer Database Owners Online Sales Department Credit Payment Systems Legal Human Resources Network Architecture Public Relations Location Manager Appendix A MasterCard Specific Steps Visa U.S.A. Specific Steps Discover Card Specific Steps American Express Specific Steps Appendix B California Civil Code 1798.82 (Senate Bill 1386) Health Insurance Portability and Accountability Act of 1996 (HIPAA) Gramm-Leach-Bliley Act (GLBA) Appendix C Escalation Members (VP Level of Management) Auxiliary Members (as needed) External Contacts (as needed) Notification Order Escalation Member Notification List Notice to Readers Incident Response Plan – Template for Breach of Personal Information does not represent an official position of the American Institute of Certified Public Accountants, and it is distributed with the understanding that the author and the publisher are not rendering accounting, or other professional services in the publication. If legal advice or other expert assistance...

Words: 8476 - Pages: 34

Premium Essay

Riordan Manufacturing Company Inc. Wide Area Network

...requires updated documentation. The purpose of this paper is to gather the existing information into a single format and evaluate the WAN and security documentation for an executive overview. Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality control are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their networks today, a plan for future upgrades and a baseline to evaluate security. The goal of this exercise is three fold. Our first will be to provide an inventory of the existing network components for Riordan Manufacturing designated by location, review the network security for each site, and our last goal is to document the current security plan for use in future planning. Because of the limited scope of the project, several assumptions must be made. The first assumption is that Riordan Manufacturing has accurate records of the current infrastructure and no changes will be made during this study. Furthermore, we must assume the equipment at each location is similarly configured. The...

Words: 11081 - Pages: 45

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Scenario Analysis Report

...CS25110 Mid Wales University Scenario Analysis Report – Recommendations for University ICT Strategy Written by Findlay Cruden Contents 1. Introduction 3 2. Custom Designed Server Room 3 3. Project Management 4 4. Computer Hardware 5 5. Computer Software 6 6. Security 7 7. Naming and Directory Services 8 8. Business Continuity 9 9. On-going Management 10 10. Overall Summary 11 11. Bibliography 12 1. Introduction The main focus of this report is to detail the necessary resources and preparations that would be necessary in order to create and manage the ICT systems for this University. By using information from outside sources, I will make observations as to the various aspects that will be necessary to create and manage our network in an efficient and efficient manner and in a way that allows the ease of use to the various users who will be using the network and its resources. These resources would include both the hardware that would be running and managing the network such as the mail and web servers in addition to the hardware that the users will be interacting with such as the desktop computers, printers amongst others. 2. Custom Designed Server Room As this room would function as the nerve centre for the entirety of our network, stringent security measures should be implemented to protect the room itself as well as the equipment stored within it. As detailed both in a further section of this report a high priority should...

Words: 5666 - Pages: 23

Premium Essay

Netwrk Security

...reprinted by permission from Microsoft Corporation. Netscape Communicator browser window © 1999 Netscape Communications Corporation. Used with permission. Netscape Communications has not authorized, sponsored, endorsed, or approved this publication and is not responsible for its content. Permission to reproduce screen shots from the PGP and Sniffer products has been provided by Network Associates, Inc. Network Associates, PGP, Pretty Good Privacy Sniffer, and Distributed Sniffer System are registered trademarks of Network Associates, Inc. and/or its affiliates in the U.S. and/or other countries. MIT screen shots used with permission. Qualcomm's Eudora screen shots used with permission. Copyright © 2001 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be...

Words: 95027 - Pages: 381

Premium Essay

Information Systems

...MIS 290 Exam 1 Study Guide Multiple Choice (1 pt each) Identify the choice that best completes the statement or answers the question. Chapter 1 ____ 1. _____ is an important component of every information system that helps organizations to achieve their goals. a.|Hardware|c.|Feedback mechanism| b.|Software|d.|Data| ____ 2. The process of defining relationships among data to create useful information requires ______ a.|an information system.|c.|knowledge| b.|intelligence|d.|intuition| ____ 3. ______ are people who create, use, and disseminate knowledge and are usually professionals in science, engineering, business, and other areas. a.|Systems analysts|c.|Chief Information Officer| b.|Knowledge workers|d.|End user| ____ 4. Data that can be used for a variety of purposes is said to be ______. a.|flexible|c.|relevant| b.|economical|d.|verifiable| ____ 5. The value of information is directly linked to how it helps decision makers achieve their organization’?s _____. a.|profits|c.|cost reduction initiatives| b.|goals|d.|quality improvement measures| ____ 6. ______ is a measure of the extent to which a system achieves its goals. a.|Efficiency|c.|Performance rate| b.|Reliability|d.|Effectiveness| ____ 7. In information systems, _____ is used to make changes to input or processing activities. a.|forecasting|c.|output| b.|feedback|d.|processing| ____ 8. _____ consists of computer equipment used to perform input, processing, and output...

Words: 3708 - Pages: 15

Premium Essay

Vulnerability-Assessment

...Approaches I Realistic Expectations Summary Solutions Fast Track Frequently Asked Questions 1 285_NSS_01.qxd 2 8/10/04 10:40 AM Page 2 Chapter 1 • Vulnerability Assessment Introduction In the war zone that is the modern Internet, manually reviewing each networked system for security flaws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack. Each technical advance brings wave after wave of security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic errors, vendor-installed backdoors, and default configurations plague everything from modern operating systems to the simplest print server.Yesterday’s viruses seem positively tame compared to the highly optimized Internet worms that continuously assault every system attached to the global Internet. To combat these attacks, a network administrator needs the appropriate tools and knowledge to identify vulnerable systems and resolve their security problems before they can be exploited. One of the most powerful tools available today is the vulnerability assessment, and this chapter describes what it is, what it can provide you, and why you should be performing them as often as possible. Following this is an analysis of the different types...

Words: 9203 - Pages: 37

Premium Essay

Nothing Yet

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Conducting a Penetration Test on an Organization This document is decided to give readers an outlook on how a penetration test can be successfully done on an organization. A methodology has been drawn out in this document to allow readers to be acquainted with the process that penetration testers go through to conduct a penetration test. Copyright SANS Institute Author Retains Full Rights AD Conducting a Penetration Test on an Organization TABLE OF CONTENTS PAGE Abstract 2 Bibliography ut ho Conclusion rr Limitation of Penetration Testing eta ins The Process and Methodology Planning and Preparation Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Information Gathering and Analysis Vulnerability Detection Penetration Attempt Analysis and Reporting Cleaning Up fu ll r igh ts. What is a Penetration Test? 2 3 3 4 6 7 9 9 10 10 11 12 14 Appendix A: Netcraft (www.netcraft.com) results on www.sans.org Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Chan Tuck Wai (twchan001) © SA Full name: Chan Tuck Wai GIAC userID: twchan001 Course: Security Essentials Version: First (Original Submission) Conference Location: Malaysia NS In sti DETAILS tu te 20 Appendix...

Words: 5729 - Pages: 23

Premium Essay

Cyber Crime

...target computers directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.[citation needed] Crimes that primarily target computer networks or devices include:  Computer viruses  Denial-of-service attacks  Malware (malicious code) Crimes that use computer networks or devices to advance other ends include:  Cyberstalking  Fraud and identity theft  Information warfare  Phishing scams Malware From Wikipedia, the free encyclopedia Beast, a Windows-based backdoorTrojan horse. Malware, short for malicious software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software.[1] 'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.[2] Malware includes computer viruses, worms, trojan horses, spyware, adware, and other malicious programs. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states.[3][4] Malware is not the same as defective software, which is software that has a legitimate purpose but contains harmful bugs that were not noticed before release. However, some malware is disguised as genuine software, and may come from an official company website. An example of this is software used for harmless purposes that is packed...

Words: 3033 - Pages: 13

Premium Essay

Layered Security in Plant Control Environments

...Process control vendors are migrating their plant control technologies to more open network and operating environments such as Unix, Linux, Windows, Ethernet, and the Internet Protocol. Migrating plant controls to open network and operating environments exposes all layers of the computing environment to unauthorized access. Layered security can be used to enhance the level of security for any computing environment. Layered security incorporates multiple security technologies in each computing layer to provide resistance to unauthorized intrusion, while reducing the risk of failure from a single technology. Layered security requires acceptance of a model, development of an access control plan, compartmentalization of the network, and implementation of core security products that address examination, detection, prevention, and encryption. Layered security is considered a “best practice” in any computing environment, and should be widely used in critical control environments. INTRODUCTION Plant control environments have traditionally been built on proprietary technology. This proprietary technology provided a reasonable level of security from unauthorized access due to its “closed” nature, and lack of connection to business networks and the Internet. However, vendors are beginning to migrate their plant control technology to more open network and operating environments such as Unix, Linux, Windows, Ethernet, and the Internet Protocol. In some instances, plant control environments...

Words: 2711 - Pages: 11