Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010
Mar 26, 2015
Information Security DomainsComputer Operations Security
By: Shafi AlassmiInstructor: Francis G.Date: Sep 22, 2010
IntroductionEasy to define but hard to masterCovers everything that can go wrong while computers are runningIt mainly examines the following controls:OperatorsHardwareMediaWho should be involved with computer operations security?Every person interact with the system internally or externallyEvery technology that is part of the system
How to plan?The plan should be derived by asking right questions such as:How many security events were identified?How to control access privileges?
Plan should show the ROI by asking the right questions such as:What will be the losses if not implemented.How much will it cost?
Critical O. S. ControlsOperation controls focus on the following aspects:Resources protection
Accountability, violation processing and user access authorities
Access-Privileges Hardware, storage, I/O operations and activity logs
Change Management Scheduling, applying, implementing and reporting
Hardware
Resource ProtectionSecurely guard the organization’sComputing resources
Loss Compromise Communication
Balance of the security implementation depends on:Value of informationBusiness need for the informationBenefits are:Decrease possibility of damage to dataLimit disclosure and misuse of data
Resource ProtectionAccess given to individual usersAt a specific timeTrack access logPractices to enhance accountability and authority can be via:Users understanding the importance of passwordsUsers understanding the privacy regulations and its importance to avoid legal issuesPlans for management changes must be in place
Access PrivilegesHardware accessIsolation between unrelated storagesEnables controlling unauthorized accessI/O operations and devicesShould be verified before execution of privilege programActivity logsAuditing
Change ManagementManaging change steps:Introduce changeChange logScheduling changeImplementing changeReporting changeWhy following those steps?Reduce the impact of change on services
HardwareHardware access is via operating system software.Physical security of hardwareStorage Unauthorized access