欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    Security Audit.ppt

    • 资源ID:17595844       资源大小:63KB        全文页数:31页
    • 资源格式: PPT        下载积分:9金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要9金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    Security Audit.ppt

    1Security Audit2Security Auditing Definition Audit log Audit procedure Auditor Audit types Audit report Database audit3Definition of Security Audit IS security auditing involves providing independent evaluations of an organizations policies, procedures, standards, measures, and practices for safeguarding electronic information from loss, damage, unintended disclosure, or denial of availability (U.S. Govt. Accounting Office) Method of examining past activities regarding compliance with reference to organizational policies and industry standards Goal is to provide external evidence that organizational policies are followed4Definition of Security Audit Helps identify potential vulnerabilities in the system based on audit report Auditors compare the effectiveness of security with respect to industry standards5Audit Log Types of activities/events to log Logins (successful, failure, all, none) Physical entry (scan card) Changes to system (e.g., permissions) Changes to sensitive data (e.g., salary) Automation of logging Length of retention for logged data One month for login data One week for physical entry data One month for system change data One year for sensitive data6Audit Log Data retention period must fit organizational goals Data collected must fit organizational culture Identify critical events to trigger immediate notifications to security administrators Numerous accesses to a single file Attempt unauthorized data entries7Audit Log Log only required data (e.g., if age is required then do not get address as well) Someone must review logs Logging has a negative effect on system performance Critical events may be overwritten by excessive logging8Audit Log Most OSs allow overwriting log files based on time or file size This choice may be determined by policy, e.g., log files must be kept for a certain amount of time Log files can be archived You may need to maintain a (semi-) permanent record of system activity Back up log files before they are overwritten A common method is to alternate two log files, backing up one file while the other is active9Windows Logging Windows uses the Event Viewer as its primary logging mechanism Found in Administrative Tools Event Viewer log files Security log Records security-related events Controlled by a system administrator Typical information includes failed logon attempts and attempts to exceed privileges10Windows Logging Application log Records events triggered by application software System administrators have control over what events to store System log Contains events recorded by the operating system System administrator generally has no control over this log Typical events include hardware/software problems Other specialized log files: directory service log, file replication service log, and DNS server log11Windows Logging Four types of events are stored in Event Viewer logs Error events are created when a serious problem occurs (corruption of a file system) Warning events are created to alert administrators to potential problems (a disk nearing capacity) Information events are details of some activity that arent indications of a problem (starting or stopping a service) Success/failure auditing events are administrator-defined events that can be logged when they succeed, when they fail, or both (unsuccessful logon attempts)12UNIX Logging Primary log facility in UNIX is syslog Very flexible, many options for notification and priority Can write to a remote log file allowing the use of dedicated syslog servers to track all activity on a network Syslog priority levels: LOG_EMERG (emergency) LOG_ALERT (require immediate intervention) LOG_CRIT (critical system events) LOG_ERR (error) LOG_WARNING (warn of potential errors) LOG_NOTICE (information, no error)13Configuring Alerts Set up alerts that notify administrators when specific events occur For example, immediate notification if a hard drive is full Alert options include E-mail, pagers, Short Message Service (SMS), instant messaging, pop-up windows, and cell phones Alerts can be configured differently depending on the severity of the event and the time Only very severe events should trigger a cell phone call in the middle of the night, for example14Analyzing Log Data Log data is used to monitor your environment Two main activities: Profiling normal behavior to understand typical system behavior at different times and in different parts of your business cycle Detecting anomalies when system activity significantly deviates from the normal behavior you have documented15Profiling Normal Behavior A “snapshot” of typical system behavior is called a baseline Baselines can be obtained at the network, system, user, and process level Baselines detail consumption of system resources Baselines will vary significantly based on time of day or business cycle It is administrators responsibility to determine the baseline studies appropriate for an organization These will change over time 16Detecting Anomalies Define anomalies based on thresholds The following questions must be answered How much of a deviation from the norm represents an anomaly? How long must the deviation occur before registering an anomaly? What anomalies should trigger immediate alerts? Anomalies can occur at any level For example, if a users behavior deviates from normal, it may indicate a serious security event17Data Reduction When possible, limit the scope of logging activities to that which can reasonably be analyzed However, regulations or policies may stipulate that aggressive logging is necessary Data reduction tools are useful when more data is collected than can be reviewed Often built into security tools that create log files For example, CheckPoints Firewall-1 allows you to view log files filtered by inbound TCP traffic to a specific port on a specific date18Maintaining Secure Logs Logs themselves must be protected from tampering and corruption Common techniques to secure logs include Remote logging uses a centralized, highly protected, storage location Printer logging creates a paper trail by immediately printing logged activity Cryptographic technology digitally signs log files to ensure that changes can be detected, though the files are vulnerable until they are finalized19Audit Procedure Security professionals examine the policies and implementation of the organizations security posture Identify deficiencies and recommend changes The audit team should be well trained and knowledgeable The team may be multidisciplinary including accountants, managers, administrators, and technical professionals Choose a team based on your organizations needs20Audit Procedure Gather all data to be audited Familiarize with the organizational policies and procedures with regard to data collection Interview key personnel to learn about organizational practices Perform penetration testing to see effectiveness of security controls Analyze logged data to identify policy compliance. This is the most time consuming process.21Checklists Checklists provide a systematic and consistent approach to completing various tasks in an audit Audit checklists provide a high-level overview of the overall audit process stepwise processes for auditing different classes of systems Configuration checklists contain specific configuration settings Vulnerability checklists contain lists of critical vulnerabilities for each operating system in use22Sample Security Audit Questionnaire1. Are you preventing people from misusing your information processing facilities?2. Are you protecting your information processing facilities by reducing the risk of human error? 3. Are you protecting information processing facilities by reducing the risk of theft?4. Are you protecting information processing facilities by reducing the risk of fraud?5. Are you addressing information security issues during the personnel recruitment process?6. Are all new users of information processing facilities subjected to a security screening?7. Are all new users of information processing facilities asked to sign confidentiality agreements?8. Are users aware of information security threats and concerns?9. Are users capable of applying your information security policy?10.Do you teach users how to apply your security procedures?23IP/Port Scanners IP/Port scanners are used by both crackers and system administrators Use brute-force probing of IP addresses to identify open ports running services that may be vulnerable Administrators can use this information to find rogue systems and services Often set up by legitimate users who want to bypass the red tape of going through administration Rogue systems and services are usually either removed or brought under administrative control24Vulnerability Scanners Vulnerability scanners are software applications that analyze systems for known vulnerabilities and create reports and suggestions First vulnerability scanner was SATAN in the early 1990s Newer scanners include SARA a descendant of SATAN (UNIX) SAINT a commercially supported scanner (UNIX) Nessus provides a scripting language for writing and sharing security tests (UNIX, Linux) Microsoft Baseline Security Analyzer free from Microsoft, downloads the most recent vulnerability database (Windows)25Penetration Testing Penetration testing is a proactive approach used by security auditors The auditor tries to break in to the system to find vulnerabilities Many security teams bring in professionals to conduct penetration testing Called “white hat” hackers Malicious hackers are called “black hat” hackers Be sure you have proper permission before conducting any type of penetration testing26Integrity Checking Integrity checking Maintains cryptographic signatures of all protected files to catch tampering Tripwire is the most common tool for file integrity assurance Typically used to protect static web sites and other systems that store critical data that is infrequently changed27Auditor Auditors are a team of people who specialize in specific aspects of audit such as penetration testing Auditors are always external in order for critical evaluation of policies and procedures External auditing provides the necessary independence for auditors Internal auditors do periodic checks to verify compliance with policies Internal auditors work enables collection of relevant data for external auditors28Audit Types Financial audit Ensures that all financial transactions are accounted for and comply with the law SAS 70 (Statement of Auditing Standards) is a specific financial audit Security Audit Evaluates system security Compliance Audit Verifies compliance with industry standards Required for financial and health care companies29Audit Report Outcome of an audit is the audit report Audit report contains: Summary of policies observance and deviations Prioritizing deficiencies found Recommending action plans for addressing deficiencies Benefits from the report: Management realizes the need for appropriate investments for security system Identifies security gaps and vulnerabilities Enables developing suitable internal controls30Database Audit Database audit differs slightly from standard information system audit Database audit keeps track of: Built-in audit tools available with commercial systems All user logins and logouts All data changes All schema changes (HIPAA requirement)31Database AuditFunctionalitySQL ServerOracleGUI functions for auditYesYesData change auditYesYesEmail alertsYesYesDisable triggersYesYesSchedule Audit trail data purgeYesYesAudit trail data exportYesYes

    注意事项

    本文(Security Audit.ppt)为本站会员(知****量)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开