Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.

Post on 26-Mar-2015

215 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

Transcript

Information Security DomainsComputer Operations Security

By: Shafi AlassmiInstructor: Francis G.Date: Sep 22, 2010

IntroductionEasy to define but hard to masterCovers everything that can go wrong while computers are runningIt mainly examines the following controls:OperatorsHardwareMediaWho should be involved with computer operations security?Every person interact with the system internally or externallyEvery technology that is part of the system

How to plan?The plan should be derived by asking right questions such as:How many security events were identified?How to control access privileges?

Plan should show the ROI by asking the right questions such as:What will be the losses if not implemented.How much will it cost?

Critical O. S. ControlsOperation controls focus on the following aspects:Resources protection

Accountability, violation processing and user access authorities

Access-Privileges Hardware, storage, I/O operations and activity logs

Change Management Scheduling, applying, implementing and reporting

Hardware

Resource ProtectionSecurely guard the organization’sComputing resources

Loss Compromise Communication

Balance of the security implementation depends on:Value of informationBusiness need for the informationBenefits are:Decrease possibility of damage to dataLimit disclosure and misuse of data

Resource ProtectionAccess given to individual usersAt a specific timeTrack access logPractices to enhance accountability and authority can be via:Users understanding the importance of passwordsUsers understanding the privacy regulations and its importance to avoid legal issuesPlans for management changes must be in place

Access PrivilegesHardware accessIsolation between unrelated storagesEnables controlling unauthorized accessI/O operations and devicesShould be verified before execution of privilege programActivity logsAuditing

Change ManagementManaging change steps:Introduce changeChange logScheduling changeImplementing changeReporting changeWhy following those steps?Reduce the impact of change on services

HardwareHardware access is via operating system software.Physical security of hardwareStorage Unauthorized access

top related