<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Security &#187; Management</title>
	<atom:link href="http://ipsecs.com/web/?cat=4&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://ipsecs.com/web</link>
	<description>Who Owns Who Now?</description>
	<lastBuildDate>Fri, 24 May 2013 02:06:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=</generator>
		<item>
		<title>DoD 8750 Directive</title>
		<link>http://ipsecs.com/web/?p=168</link>
		<comments>http://ipsecs.com/web/?p=168#comments</comments>
		<pubDate>Sat, 19 Jun 2010 18:40:42 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Management]]></category>
		<category><![CDATA[DoD 8750]]></category>
		<category><![CDATA[Information Assurance]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=168</guid>
		<description><![CDATA[The Department of Defense (DoD) is currently undergoing an organizational process involving Information Assurance (IA) standardization. DoD 8570 seeks to accomplish the following objectives: 1. Create standards whereby IA Workfoce personnel, at all levels and fuctions, obtain a uniform level of competency with regard to DoD information and networks. 2. Establish a minimum skill level [...]]]></description>
				<content:encoded><![CDATA[<p>The Department of Defense (DoD) is currently undergoing an organizational process involving Information Assurance (IA) standardization.</p>
<p>DoD 8570 seeks to accomplish the following objectives:</p>
<p>1. Create standards whereby IA Workfoce personnel, at all levels and fuctions, obtain a uniform level of competency with regard to DoD information and networks.<br />
2. Establish a minimum skill level for all IA Workforce personnel throughout the DoD.<br />
3. Provide qualified IA Workforce members to the soldiers that need them.<br />
4. Creation of a set of formal training requirements and establishment of certification programs.<br />
5. Add to the knowledge base of every IA Workforce team member through education or experience.</p>
<p>DoD 8750 document can be found <a href="http://www.dtic.mil/whs/directives/corres/pdf/857001m.pdf">here</a> while DoD 8750 training and assessment can be reached at <a href="http://www.giac.org/8570/">GIAC/DoD8750</a>.</p>
<p>This article is ripped and modified from <a href="http://dod8570.net/">http://dod8570.net/</a></p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=168</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Introduction to ISO 20000 (BS 15000)</title>
		<link>http://ipsecs.com/web/?p=92</link>
		<comments>http://ipsecs.com/web/?p=92#comments</comments>
		<pubDate>Tue, 26 May 2009 19:25:22 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Management]]></category>
		<category><![CDATA[BS 15000]]></category>
		<category><![CDATA[ISO 20000]]></category>
		<category><![CDATA[standard]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=92</guid>
		<description><![CDATA[ISO/IEC 20000 is the first international standard for IT Service Management. It is based on and is intended to supersede the earlier British Standard, BS 15000. Formally: ISO 20000-1 (&#8216;part 1&#8242;) &#8220;promotes the adoption of an integrated process approach to effectively deliver managed services to meet the business and customer requirements&#8221;. It comprises ten sections: [...]]]></description>
				<content:encoded><![CDATA[<p><strong>ISO/IEC 20000</strong> is the first international standard for <a class="mw-redirect" title="IT Service Management" href="http://en.wikipedia.org/wiki/IT_Service_Management">IT Service Management</a>. It is based on and is intended to supersede the earlier <a class="mw-redirect" title="British Standard" href="http://en.wikipedia.org/wiki/British_Standard">British Standard</a>, BS 15000.</p>
<p>Formally: ISO 20000-1 (&#8216;part 1&#8242;) &#8220;promotes the adoption of an integrated process approach to effectively deliver managed services to meet the business and customer requirements&#8221;. It comprises ten sections:</p>
<ul>
<li>Scope</li>
<li>Terms &amp; Definitions</li>
<li>Planning and Implementing Service Management</li>
<li>Requirements for a Management System</li>
<li>Planning &amp; Implementing New or Changed Services</li>
<li>Service Delivery Processes</li>
<li>Relationship Processes</li>
<li>Control Processes</li>
<li>Resolution Processes</li>
<li>Release Process.</li>
</ul>
<p>ISO 20000-2 (&#8216;part 2&#8242;) is a &#8216;code of practice&#8217;, and describes the best practices for service management within the scope of ISO 20000-1. It comprises the same sections as &#8216;part 1&#8242; but excludes the &#8216;Requirements for a Management system&#8217; as no requirements are imposed by &#8216;part 2&#8242;.</p>
<p>ISO 20000, like its BS 15000 predecessor, was originally developed to reflect best practice guidance contained within the <a title="Information Technology Infrastructure Library" href="http://en.wikipedia.org/wiki/Information_Technology_Infrastructure_Library">ITIL</a> (<a title="Information Technology Infrastructure Library" href="http://en.wikipedia.org/wiki/Information_Technology_Infrastructure_Library">Information Technology Infrastructure Library</a>) framework, although it equally supports other <span class="mw-redirect">IT Service Management</span> frameworks and approaches including Microsoft Operations Framework and components of ISACA&#8217;s CobIT framework. It comprises two parts: a specification for <span class="mw-redirect">IT Service Management</span> and a code of practice for service management. The differentiation between ISO 20000 and BS 15000 has been addressed by Jenny Dugmore<sup id="cite_ref-aidb_0-0" class="reference"><a href="http://en.wikipedia.org/wiki/ISO_20000#cite_note-aidb-0"><span></span></a></sup>.</p>
<p>The standard was first published in December 2005.</p>
<p><strong>Taken From</strong> : http://en.wikipedia.org/wiki/ISO_20000</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=92</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>An Introduction to ITIL and CobiT</title>
		<link>http://ipsecs.com/web/?p=56</link>
		<comments>http://ipsecs.com/web/?p=56#comments</comments>
		<pubDate>Sun, 03 May 2009 11:47:27 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Management]]></category>
		<category><![CDATA[BS15000]]></category>
		<category><![CDATA[CobiT]]></category>
		<category><![CDATA[ISO 20000]]></category>
		<category><![CDATA[ITIL]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=56</guid>
		<description><![CDATA[In the bowl of alphabet soup that feeds our industry lurk two acronyms that actually have little to do with technology, and everything to do with how we use it: ITIL (the IT Infrastructure Library) and CobiT (Control Objectives for Information and related Technology). These two complementary sets of best practices deal, respectively, with service [...]]]></description>
				<content:encoded><![CDATA[<p><img class="alignright" src="http://ipsecs.com/images/cobit.jpg" alt="Cobit" width="136" height="86" />In the bowl of alphabet soup that feeds our industry lurk two acronyms that actually have little to do with technology, and everything to do with how we use it: ITIL (the IT Infrastructure Library) and CobiT (Control Objectives for Information and related Technology).</p>
<p>These two complementary sets of best practices deal, respectively, with service management and with governance in IT organizations. Between them, the ITIL and CobiT provide guidelines to help companies cut support costs, increase IT efficiency, and meet regulatory requirements.</p>
<p>The ITIL was developed by the British government in the 1980s as a best practice framework for IT service management. It is vendor-independent, and the Crown still holds copyright to ensure no organization can hijack the framework for its own purposes. It really is a library, too, originally consisting of over forty individual volumes, each one dedicated to a separate area of service management. ITIL Service Management is currently embodied in the ISO 20000 standard (previously BS 15000).<span id="more-56"></span></p>
<p>Those forty-odd books have since been distilled into a more manageable seven (and will soon be down to five, in ITIL version 3), consisting of volumes on:</p>
<p>* Service Support.<br />
* Service Delivery.<br />
* Planning to Implement Service Management.<br />
* ICT Infrastructure Management.<br />
* Applications Management.<br />
* Security Management.<br />
* The Business Perspective.</p>
<p>Each volume in subdivided into sections breaking down its topic further. For example, Service Support is divided into:</p>
<p>* Service Desk: How to establish and run a service desk as the central point of contact with the user.<br />
* Incident Management: Restoring normal operations as quickly as possible.<br />
* Problem Management: Diagnoses root causes of incidents reported by the service desk and arranges changes in the IT infrastructure to prevent their recurrence.<br />
* Change Management: Processes and procedures to ensure prompt and efficient handling of changes.<br />
* Release Management: Planning of changes so both IT and non-IT aspects are considered.<br />
* Configuration Management: Identifies, controls, and maintains the configurations of items and services.</p>
<p>And Service Delivery is divided into:</p>
<p>* Availability Management: Maintaining the availability of services that allow the business to function effectively.<br />
* Capacity Management: The process for predicting future needs.<br />
* IT Service Continuity Management: Managing the ability to provide pre-defined levels of service after a disaster or other business interruption.<br />
* Service Level Management: Agreeing upon, monitoring, and reporting IT achievements and establishing ways to eliminate poor service.<br />
* Financial Management for IT Services: Budgeting, accounting, and charging for IT services.</p>
<p>Each book provides processes and vocabularies, so every ITIL-certified individual can describe situations in the same way, and understand precisely what?s going on. This is particularly valuable in situations where several IT organizations are being merged.</p>
<p>Yes, I did say certified. Independent examining bodies provide several levels of certification for ITIL practitioners, from the very basic Foundation Certificate to advanced management. And certification implies training, such as that provided by the improbably-named Pink Elephant, a global leader in all things ITIL, ITIL Training World, which offers online courses, and even IBM Global Services.</p>
<p>ITIL best practices have been rolled into many commercial products. Remedy help desk and CA Unicenter are compliant, for example, and Microsoft has adopted the framework as well, and in fact uses it in-house.</p>
<p>Where ITIL concentrates on service delivery, CobiT looks at governance. It is, according to its Web site, &#8220;an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. COBIT enables clear policy development and good practice for IT control throughout organizations.&#8221; It was developed by the ISACA (Information Systems Audit and Control Association) and the IT Governance Institute (ITGI) in the 1990s, and is now in its fourth edition.</p>
<p>CobiT&#8217;s framework is built on four domains (Plan and Organise, Acquire and Implement, Deliver and Support, Monitor and Evaluate) with 34 high-level control objectives, which are in turn broken down into detailed control objectives. The primary IT governance focus areas in CobiT are as follows:</p>
<p>*Strategic alignment focuses on ensuring the linkage of business and IT plans, on defining, maintaining and validating the IT value proposition, and on aligning IT operations with enterprise operations.</p>
<p>*Value delivery is about executing the value proposition throughout the delivery cycle, ensuring that IT delivers the promised benefits against the strategy, concentrating on optimizing costs and proving the intrinsic value of IT.</p>
<p>*Resource management is about the optimal investment in, and the proper management of, critical IT resources: processes, people, applications, infrastructure and information. Key issues relate to the optimization of knowledge and infrastructure.</p>
<p>*Risk management requires risk awareness by senior corporate officers, a clear understanding of the enterprise&#8217;s appetite for risk, transparency about the significant risks to the enterprise, and embedding of risk management responsibilities into the organization.</p>
<p>*Performance measurement tracks and monitors strategy implementation, project completion, resource usage, process performance and service delivery, using tools such as balanced scorecards that translate strategy into action to achieve goals measurable beyond conventional accounting.</p>
<p>CobiT, like ITIL, comes with the possibility of certification, although it currently only has a foundation level of certification available. Training consists of two online, self-paced courses; there&#8217;s a newly-minted third course specifically dealing with Sarbanes-Oxley. Information on CobiT education can be found here.</p>
<p>Where do ITIL and CobiT fit into the business IT world? ITGI positions CobiT as a better alternative to ITIL and other frameworks in its 2004 paper, CobiT Mapping Overview of International IT Guidance, but IT service management guru Malcolm Fry thinks that each of the two brings an important component to the table. In a 2005 interview in IT Business Edge, Fry said, &#8220;The ITIL is basically running the day-to-day operations of IT. What CobiT does is it brings in check points, security points, so in other words, in a certain point in the procedure you can&#8217;t go past here unless you&#8217;ve got authority or proof or you meet some kind of criteria. So when you&#8217;re implementing ITIL to support the corporate TQM, then CobiT you will implement at the same time to put the control points in.&#8221;</p>
<p><strong>Taken From</strong> : http://business.itbusinessnet.com/articles/viewarticle.jsp?id=51745-1</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=56</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Comprehensive Computer Network Security Assessment</title>
		<link>http://ipsecs.com/web/?p=41</link>
		<comments>http://ipsecs.com/web/?p=41#comments</comments>
		<pubDate>Sat, 02 May 2009 05:40:56 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Management]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=41</guid>
		<description><![CDATA[Introduction How secure is your companyâ€™s information? In this age of distributed computing and of client-server and Internet-enabled information access, computer security consistently rises to the top of most â€œimportant issuesâ€ lists. To answer this question with certainty is difficult. There are no absolutes with security. An important first step for most corporations is a [...]]]></description>
				<content:encoded><![CDATA[<p><strong>Introduction</strong></p>
<p>How secure is your companyâ€™s information? In this age of distributed computing and of client-server and Internet-enabled information access, computer security consistently rises to the top of most â€œimportant issuesâ€ lists.</p>
<p>To answer this question with certainty is difficult. There are no absolutes with security. An important first step for most corporations is a security policy that establishes acceptable behavior. The next, and more critical step, is to enforce that security policy and measure its effectiveness. A security policy is in tension with user convenience, creating forces that move security practices away from security policy. Additionally when new machines or applications are configured the security related issues are often overlooked. Therefore the gap between central policy and decentralized practice can be immense. These are significant tasks, as are identifying problems and taking corrective action on a constantly changing network. Many enterprises typically fall back on blind faith rather than wrestle with the fear of the unknown.</p>
<p><strong>Sources of Risk</strong></p>
<p>In order to assess your true security profile, you must first understand the sources of risk. The most infamous risk is embodied by the external hacker accessing a corporate information systems via the Internet. Traditionally these hackers view breaking into a system as</p>
<p style="text-align: left;"><img class="alignleft" src="http://ipsecs.com/images/netassess.gif" alt="Comprehensive assessment" width="275" height="226" /></p>
<p>mountain climbers view scaling a cliff, for them its the next great challenge. However, as ever increasing numbers of corporations interconnect their information systems successful break-ins become commercially rewarding. Practitioners of industrial espionage now view the computers on the Internet as valuable potential sources of information. Often these â€œprofessionalsâ€ masquerade as the traditional hacker to disguise their true purposes.</p>
<p style="text-align: left;">Although the threats from external attacks are real, they are not the principle source of risk. FBI statistics show that more than 60% of computer crimes originate inside the enterprise. These risks can take multiple forms. Unscrupulous employees may be searching for organizational advantages. A disgruntled employee may be co-opted by an industrial espionage agent. Increasingly corporations are turning to contractors for specialized skills or to absorb temporary increases in work-load. These contractors are often given access to the corporate information system and thus they can also present a risk to corporate information.</p>
<p><strong>Lines of Defense for the Corporate Information System</strong></p>
<ul>
<li><strong>Firewalls</strong></li>
</ul>
<p>Many enterprises erect a firewall as the first and often only line of defense for their information systems. A firewall is a device that controls the flow of communication between internal networks and external networks, such as the Internet. Many corporations assume that, once they have installed a firewall, they have reduced all their network security risks.<span id="more-41"></span></p>
<p>A firewall must be configured to allow or deny appropriate traffic. The configuration process can be highly susceptible to human error. In a dynamically changing environment, system managers routinely reconfigure firewalls without regard to security implications. Access control lists on a firewall can be numerous and confusing. You must be sure that the firewall has been set up correctly and that it is performing well.</p>
<ul>
<li><strong>Internal Defenses </strong><strong></strong></li>
</ul>
<p>Even when properly configured the firewall can only repel connection attempts that come through the firewall itself. This represents the logical equivalent of the Maginot line that defended Franceâ€™s border with Germany before World War II. The forts and defenses of the Maginot line were impenetrable; however, an attack around the line through other neighboring countries completely circumvented the line. The attackers were able to easily move through the rest of the country because the French defense efforts had been focused on the Maginot line. A information attack can be mounted via modem on the internal network. If all of the enterpriseâ€™s defenses are focused on the firewall then an attack that circumvents firewall though a modem or an internally based attack will have free reign over the information systems.</p>
<p>Thus the security features of the internal computers must also be employed. The important balance between convenience for the users and security concerns must be considered. That is the computer systems must be allowed to be collaborative in nature with appropriate access to information and functions across systems. At the same time this access provides a wide open avenue for the industrial espionage attack.</p>
<p>Often the elements of the enterpriseâ€™s computer system must be updated to eliminate security risks introduced by bugs in operating systems and network service programs. If a bug creates a performance related problem then it is a â€œsqueaky wheelâ€ that will drive the upgrade. A functioning version of a program or service with the security bugs can be easily overlooked as an important item for upgrades. By the time a security related bug becomes the proverbial â€œsqueaky wheelâ€ &#8211; its too late.</p>
<p><strong>Assessing IT Security</strong></p>
<p>Security must be assessed from multiple viewpoints for the best over all picture. These perspectives range from the physical security of the machines to the configuration of the firewalls to the trustworthiness of workers. The history of industrial espionage has been in the physical world and thus numerous practices have been developed to handle the this portion of security assessment. The age of network based industrial espionage has a brief history and thus less developed security assessment practices.</p>
<p>The security profile of a network of machines can be assess from three principle vantage points.</p>
<ol>
<li>From the outside of the Enterprise &#8211; the view of the computer infrastructure through the firewall</li>
<li>From the inside of the Enterprise &#8211; the view of computers from behind the firewall</li>
<li>From the computer keyboard &#8211; the view from the actual operating system of the individual machine itself.</li>
</ol>
<p>Each of these perspectives will reveal unique security vulnerabilities. Removing the vulnerabilities as seen from outside the enterprise is the first step to halt the efforts of the casual hacker and industrial espionage age. Removing the vulnerabilities as they appear from behind the firewall accomplishes two goals. It creates a second line of defense should the firewall become compromised. It also creates a defense for the â€œblitzkriegâ€ attack around the firewall through a modem or other non-protected entryway. Finally evaluating security from the machines themselves will close vulnerabilities that could be exploited through a firewall or from other machines on the network. It also hardens the security of the machines, restricting the avenues of attack for the disgruntled worker or the co-opted contractor.</p>
<p><strong>Assessment Strategies</strong></p>
<ul>
<li><strong>The Ideal Strategy</strong></li>
</ul>
<p>The ideal assessment strategy begins with the individual machines before they are ever inter-connected. Each machineâ€™s vulnerabilities are corrected, putting the network of machines off to a reasonable start. Next the network of computers are probed for security vulnerabilities. Typically the move from individual machines to an internetwork of interdependent machines creates a significant number of exploitable holes. Thus the network of computers is examined for security vulnerabilities. Finally the external network defenses, the firewall, are verified. In this final stage the last layer of defense &#8211; the first layer encountered by an information adversary &#8211; can be thoroughly checked. Problems are more easily isolated to the configurations and performance of the firewall connections themselves.</p>
<ul>
<li><strong><strong>Pragmatist strategy</strong></strong></li>
</ul>
<p>In real life the machines, the internetwork of computers and often the external connections to the Internet already exist. Additionally a significant number of vulnerabilities exist at each level of the enterpriseâ€™s information systems. Often the number of known vulnerabilities exceeds an organizationâ€™s capacity to implement corrective action. This imbalance between known vulnerabilities and corrective capacity is a chief contributor to the gap between an enterpriseâ€™s security policy and security practice. An enterprise in this position often does not care to learn of more security vulnerabilities, following a â€œwhat I donâ€™t know wonâ€™t hurt meâ€ philosophy.</p>
<p>The real danger in this situation is that the scarce resources available to implement corrective security policies are squandered on the most well know vulnerabilities instead of being allocated to the vulnerabilities with the greatest risk to the enterprise. Firms in this position should invest in knowledge so that their limited resources are optimally deployed. The first step in a resource investment decision to is fully understand the range of options available and then pick the portfolio of investments that presents the highest aggregate return. In security assessment the firms must first evaluate all the vulnerabilities from all perspectives: system, internal and external. Aggregating and prioritizing the list of vulnerabilities will then provide a guideline for investing in corrective action to improve the match between security practice and security policy.</p>
<p><strong>Continuous Security Improvement</strong></p>
<p>As individual vulnerabilities are corrected under any security improvement process these vulnerabilities should stay fixed. Thus the corrections must always to monitored. By monitoring these changes over time the firm can look for the root causes of frequently occurring vulnerabilities. Then the enterprise can move on to lower priority vulnerabilities.</p>
<p>By undertaking a strategy of consistently fixing vulnerabilities, monitoring them to make sure they stay fixed and analyzing the causes of recurring vulnerabilities the enterprise enters the mode of continuous security improvement. The feedback loop of a security assessment provides the information flow necessary to improve the security of the enterprise&#8217;s information systems</p>
<p><strong>SUCCESSFUL SECURITY ASSESSMENT PRACTICE</strong></p>
<p><strong></strong></p>
<p>To be the successful the security audit must be thorough, it can not leave out possible vulnerabilities. It must also be repeatable to provide a consistent perspective on the firm&#8217;s security practice. By its very nature a security assessment will initially increase the workload for an MIS department. These seemingly conflicting goals can be met through the use of a security audit tools that can provide thorough and repeatable process with an effective means of implementing corrective actions.</p>
<p>SAFEsuite(TM) &#8211; the comprehensive family of network security assessment tools designed to audit, monitor and respond to all aspects of your enterprise network security. Specifically designed to assess a variety of network devices, SAFEsuite tests for security vulnerabilities found and exploited in web sites, firewalls, operating systems and networked UNIX(R) and Windows NT(TM) hosts and workstations. It scans for the most comprehensive set of security vulnerabilities and provides you with the power and flexibility to assess all aspects of your network security policy. SAFEsuite also provides your system administrator with the added ability to monitor your networks in real time. With RealSecure, you can detect, alert and stop all unauthorized activity on your network.</p>
<p><strong>WEB SECURITY SCANNER(TM)</strong></p>
<p><strong></strong></p>
<p>Web Security Scanner tests the configuration of the Web server, evaluates the security of the underlying file system, searches for CGI scripts with known vulnerabilities and attempts to exploit custom CGI scripts.</p>
<p>Web Security Scanner traverses the HTML directory structure scanning for HTML links, Java, Java scripts and CGI links. Each link is followed in the HTML directory structure and any new links are added to the cached file. If the local link cannot be resolved it is noted for the user. Each subdirectory is checked to see if a GET request returns an index as expected or returns an entire directory listing. If the directory listing is returned, it is flagged as a vulnerability.</p>
<p>Web Security Scanner examines CGI scripts for the existence of the following potentially vulnerable executables:</p>
<ul>
<li>finger</li>
<li>phf</li>
<li>test-CGI</li>
<li>sh</li>
<li>csh</li>
<li>perl</li>
<li>bash</li>
<li>tcsh</li>
</ul>
<p>These services are tested for possible exploits by Web Security Scanner and any vulnerabilities are reported.</p>
<p>Custom CGI scripts are also tested for holes that allow execution of unauthorized commands that could lead to compromise of the server.</p>
<p>The Web Security Scanner identifies the existence of Private HTML pages that are password protected. It then does a Bruteforce account and password check to identify easily guessed or default passwords. Any cracked passwords are identified as vulnerabilities.</p>
<p>The Web Security Scanner checks for versions of http servers that are known to be vulnerable such as NCSA 1.2 and 1.3.</p>
<p><strong>FIREWALL SCANNER(TM)</strong></p>
<p><strong></strong></p>
<p>Firewalls are an important component of network security, but many organizations assume that they are adequately protected because they employ a firewall. However, a firewall must be correctly configured to provide effective protection. Firewall Scanner has added a number of firewall security checks to the base Intranet Scanner tests, including source porting, source routing, SOCKs, TCP sequence prediction (IP spoofing), and Denial of Service Attacks.</p>
<p><strong>Source Porting</strong></p>
<p><strong></strong></p>
<p>Filter rules typically are based on source and destination port addresses. A TCP/IP-enabled machine has 65,535 possible virtual ports; some of them are defined for certain services; for example, e-mail is port 25. When one machine FTPs to another and wants to transfer a file back from the FTP server, typically the server opens source port 20 to connect to the FTP client and transfer data. Therefore, many firewalls allow source port 20 into a network. An intruder can modify telnet to make the connections come from source port 20, thereby penetrating the firewall. Firewall Scanner checks to see if source port 20 is allowed to connect to the network.</p>
<p><strong>Source Routing</strong></p>
<p><strong></strong></p>
<p>Source routing is an IP protocol option that allows you to define how packets are routed. When source routing is on, many firewall filter rules are often bypassed. Many router-based firewalls allow source-routed packets to pass. Many hosts have source routing built into the kernel and do not allow it to be turned off. Firewall Scanner assesses susceptibility to source-routed packets.</p>
<p><strong>SOCKS</strong></p>
<p><strong></strong></p>
<p>SOCKs is a library of proxy-application firewalls designed to allow certain services through and keep intruders out. The fundamental problem with SOCKs is the same as with many security tools: SOCKs is often misconfigured. Often the administrator establishes rules to allow certain services through the firewall, but the rules necessary for denying access to intruders are never implemented. Consequently, services seemingly work fine with the firewall, but the firewall&#8217;s inability to keep intruders out is not recognized until an intruder breaks through. Even then, the cause of the problem may never be recognized. Firewall Scanner attempts to connect to important services through the SOCKs port, to see whether filter rules have been configured properly.</p>
<p><strong>TCP Sequence Prediction</strong></p>
<p><strong></strong></p>
<p>TCP sequence prediction, or IP spoofing &#8211; the technique that Kevin Mitnick used to break into many networks across the Internet &#8211; tries to trick a host that trusts another host. For example, if host A and host B are in a corporate network and host A is trusted by host B, then host A is allowed to log into host B based on this trust, without a password. An intruder who can make his host C look like host A will also be able to log into host B. Firewall Scanner determines a firewall&#8217;s vulnerability to IP spoofing.</p>
<p><strong>Direct RPC Scan</strong></p>
<p><strong></strong></p>
<p>The portmapper is a service, such as NIS, that allows you to identify the ports on which the RPC (Remote Procedure Commands) reside. Many filter-based firewalls may block the portmapper on port 111. The RPC commands themselves remain in place on various machine ports. It usually is hard to determine where the services are if the portmapper is blocked. However, if an intruder scans directly for the RPC services, the intruder could bypass this type of security. Firewall Scanner scans directly for the RPC services to determine whether they are exploitable.</p>
<p><strong>Stealth Scanning</strong></p>
<p><strong></strong></p>
<p>In stealth scanning, an intruder does not attempt to establish a connection, but rather uses packets at a low level with the interface. These low level packets elicit different responses depending on whether or not a port is active. This technique allows TCP port scanning many times faster than a regular connect routine on UNIX and does not trigger alarms built into many SATAN detectors and tcp_wrappers. While many firewalls block particular packets that would establish a connection, Firewall Scanner&#8217;s stealth scanning packets do not attempt to establish a connection; therefore, they can bypass firewall security and identify services running on an internal network.</p>
<p><strong>Denial Of Service</strong></p>
<p><strong></strong></p>
<p>A denial of service attempts to force the firewall into a failure condition, typically forcing a reboot of the machine. As an example, flooding a machine with sync packets or connections attempts can cause an overflow condition in buffers and log files. At this point the firewall can cease operation and close all connections, it can continue operations while stopping the logging operations or it can continue operations in a more open environment. Firewall Scanner has a battery of denial of service attacks to assess a firewall&#8217;s durability.</p>
<p><strong>Intranet ScannerO</strong></p>
<p><strong></strong></p>
<p>Intranet Scanner assesses security from the TCP/IP services perspective. It learns your network and systematically probes each network device for security vulnerabilities. Network devices might include a UNIX host, a Microsoft NT/Windows 95 system, a router, a web server, and even an X terminal. Network security is only as strong as the weakest link. Administrators may try to protect only machines that hold sensitive information. Intruders know this and look for machines that might not be protected, such as infrequently used print or fax servers. Then, once in the network, an intruder can set up sniffers to capture sensitive data, such as passwords, going over the internal network. If the intruder is using a machine that is already part of the internal network, sniffing and trust relationships usually allow springboarding into access to sensitive machines. An administrator does not have time to identify the devices on the network that actually could be used as springboards. Intranet Scanner can quickly find these weak links and identify the vulnerable services.</p>
<p><strong>Brute force Attacks</strong></p>
<p><strong></strong></p>
<p>Many networked machines are shipped with default accounts that allow an administrator to gain immediate access to a machine and to configure it. If the administrator doesn&#8217;t change the defaults, an intruder can use them to gain access to the network. When the administrator adds accounts to a machine, those accounts may get installed with an easy password. A brute force attack against a machine looks for common defaults and known accounts that might be vulnerable. If a default or login account becomes compromised, the services telnetd, ftpd, rsh, and rexec allow access to a machine. Intranet Scanner performs, through these services, brute force tests for default and vulnerable accounts.</p>
<p><strong>Anonymous FTP</strong></p>
<p><strong></strong></p>
<p>Anonymous FTP is a service that allows the easy transferring of files. The FTP server has many configuration issues. An improper configuration could allow unauthorized access to the rest of the machine. Intranet Scanner checks for these configuration flaws and determine whether the FTP site is vulnerable.</p>
<p><strong>Networked File Systems</strong></p>
<p><strong></strong></p>
<p>NFS allows many machines to have a virtual hard drive that operates over the network. If improperly configured, NFS may allow anyone to access this virtual hard drive. An intruder could then copy, modify, and possibly delete critical data from the NFS, and even gain full access to the machine. Intranet Scanner finds misconfigured NFS servers.</p>
<p><strong>File Sharing</strong></p>
<p><strong></strong></p>
<p>Windows NT and Windows 95 use a service called file sharing that allows for sharing files between networked computers. Unfortunately, many people do not realize that this may also allow access to their computers by anyone on the Internet. Intranet Scanner finds misconfigured file-shared machines and allow the administrator to take corrective action.</p>
<p><strong>Rexd</strong></p>
<p><strong></strong></p>
<p>Rexd, an old service from when UNIX was first being networked, was not developed with security in mind. It has little or no authentication to stop intruders from gaining access to a network. Intranet Scanner discovers this service. The administrator can then remove it from the machines on the network.</p>
<p><strong>Rsh and Rlogin</strong></p>
<p><strong></strong></p>
<p>Both Rlogin and Rsh vulnerabilities give an intruder instant access to the machine. The Rlogin vulnerability affects AIX and Linux machines. It allows anyone to rlogin as root without a password. An intruder issuing the command rlogin hostname.com -l -froot sees the login banner and a shell. Intranet Scanner locates these vulnerable services and enable the administrator to take corrective action.</p>
<p><strong>X windows</strong></p>
<p><strong></strong></p>
<p>Many users have xhost + in their configuration file. This permits access to the<br />
X Display by anyone, anywhere. An intruder who can access the X Display can obtain keystrokes and remotely execute commands as the user running the<br />
X Display. It is possible to configure the xhost to authorize only certain hosts, but even then any user from those remote hosts can use the X Display to compromise data. Intranet Scanner detects vulnerable X Displays.</p>
<p><strong>System security ScannerO</strong></p>
<p><strong></strong></p>
<p>System Security Scanner completes the computer network security assessment triangle by evaluating the security profile of individual hosts from the operating systems (OS) perspective. System Security Scanner checks for file ownership and permissions; OS configurations; Trojan Horse programs; and signs of a hacker&#8217;s presence. System Scanner allows the administrator to automate the process of eliminating security vulnerabilities.</p>
<p><strong>File ownership and permission tests</strong></p>
<p><strong></strong></p>
<p>There are many potential vulnerability problems where the files are not owned by the proper accounts or the permission may not be set up correctly. There are two types of tests to check for:</p>
<ol>
<li>Have a list of known permissions for certain files and directories, including home directories.</li>
<li>Build a baseline specific for the machine being tested and compare and contrast this library with future assessment tests of the machine.</li>
</ol>
<p><strong><strong>Configuration and access file tests</strong></strong></p>
<p>Many system files can configure the machine insecurely and need to be checked. Users have certain files that allow access from certain services, these configurations should be checked against the security policy.</p>
<p><strong>MD5 Signaturing</strong></p>
<p><strong></strong></p>
<p>The best known method for checking if a file has the correct data content is through a md5 signature test. This digital signature is like a fingerprint. A database of fingerprints of good and bad programs can detect which files have been modified or which ones need to be upgraded to the latest version. There are three types of MD5 checksums tests to be considered:</p>
<ol>
<li>List of filenames with the good checksums and bad checksums to identify whether the machine is currently up to date.</li>
<li>A list of only bad checksums and filenames that signify vulnerable versions of binary programs. This is for programs that do not have a specific location, such as a web browser.</li>
<li>A baseline of md5 checksums for the machine currently being tested so that future scans can contrast the checksums to look for modifications to the machine&#8217;s important files.</li>
</ol>
<p><strong><strong>Hacker specific testing</strong></strong></p>
<p>There are certain things that a hacker may do that can be detected. Checking if the machine is in promiscuous mode can detect whether a hacker is sniffing from that machine and catching passwords going across the network. There are also certain directories that hackers place files in that should be checked for odd files.</p>
<p><strong>Taken From</strong> :http://www.windowsecurity.com/whitepapers/Comprehensive_Computer_Network_Security_Assessment_.html</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=41</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Building and Deploying Effective Security Policies</title>
		<link>http://ipsecs.com/web/?p=25</link>
		<comments>http://ipsecs.com/web/?p=25#comments</comments>
		<pubDate>Thu, 30 Apr 2009 16:53:02 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Management]]></category>
		<category><![CDATA[ISO/IEC]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[standard]]></category>
		<category><![CDATA[tips trik]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=25</guid>
		<description><![CDATA[Defining Effective Security Policies First, we must define what we mean when we say policies are â€œeffective.â€ One way to build this definition is by looking at the ways organizations feel their policies are not effective. For this discussion, we use the following criteria: 1. Effective policies adequately define the high-level security goals of the [...]]]></description>
				<content:encoded><![CDATA[<p><strong>Defining Effective Security Policies</strong></p>
<p>First, we must define what we mean when we say policies are â€œeffective.â€ One way to build this definition is by looking at the ways organizations feel their policies are not effective. For this discussion, we use the following criteria:<br />
1. Effective policies adequately define the high-level security goals of the company to reduce operational risk.<br />
2. Effective policies adequately protect an organization against legal action for possible violations.<br />
3. Effective policies are read and understood by all employees and contractors in various roles within the organization.</p>
<p><img class="alignright" src="http://ipsecs.com/images/image7.png" alt="security policy" width="213" height="213" /></p>
<p>Criteria #1 is based on the need for policies to be complete. An organizationâ€™s policies must adequately cover the topics of an effective security program, including compliance with regulations.</p>
<p>Criteria #2 reflects the organizationâ€™s fear of damaging lawsuits, including possible violation of legislation. In fact, these fears are justified. Recent court cases are establishing precedents that would in fact hold most organizations liable.</p>
<p>Criteria #3 reflects most organizations highest concern when it comes to security. In fact, these three criteria are intricately related, and it is virtually impossible to adequately satisfy one without the other two.<span id="more-25"></span></p>
<p><strong>Ten Steps to Effective Policy</strong></p>
<p>In the following steps, we will discuss how each relates to the effective policy attributes listed above. One reference we make is to the guidelines of the US Sentencing Commission and the Office of Inspector General. They have defined seven elements for measuring if a breach in compliance has occurred. Another common reference we make is to ISO/IEC 17799, the international standard for security code of practice. We also provide tips within each section to help organizations achieve these goals.</p>
<p><strong>1. Pick a standard structure for your policy documents</strong></p>
<p>The policy development process is extremely challenging. Not only because of the subject matter, but because of the various personnel required to create, update, review and approve them. When done properly, policies follow a standard structure and are updated on a regular basis. Policies should include basic items such as effective date, responsible party, scope, exception reporting, and enforcement. The best way to encourage this is through a standard policy template used consistently throughout the organization. If our goal is to create a consistent security message that is read and understood by each member of the organization, the easiest way to fail is to have multiple different document types in different formats and in different places. (Only you know if this is true of your organization!)</p>
<p>A great way to help this process is to define three types of documents: Policies, Standards and Procedures. Policies are high-level statements that should remain relatively consistent over time. Standards, on the other hand, are the detailed items that enforce a high-level policy. Standards can be authored by department managers or IT staff, and can change more frequently. Procedures are the detailed steps that individuals will follow to implement the standards. This simple structure can be referred to as a â€œPolicy Governance Structureâ€ and can greatly reduce the simplicity of your security policy process.</p>
<p>This structure provides another great advantage that we will discuss in the area of monitoring compliance. By documenting procedures and standards in separate documents, organizations can easily map these business requirements against the security tools they monitor for compliance. Most security technologies, including firewalls, access control and vulnerability assessors are not designed to enforce a policy. They are designed to enforce a specific technical control on a particular platform.</p>
<p><strong>2. Write it all down</strong></p>
<p>Step #1 leads directly to the second requirement â€“ making sure that you formally document all of your policies, standards and procedures. This requirement is either explicitly or implicitly stated in many security frameworks and regulatory requirements. The HIPAA Final Security Rule, for example, requires that policies and procedures are documented, and that these documents be kept for at least 7 years. The first â€œkey controlâ€ of the ISO 17799 policy framework is to have a written security policy that is accessible to all employees.</p>
<p>The guidelines from the US Sentencing Commission note that an organization must have â€œdocumentedâ€ architecture of policy, operational, and technical controls. It sounds simple, but how can you validate compliance if you donâ€™t know what you are validating against?</p>
<p>If you donâ€™t have written policies, a good resource is Information Security Policies Made Easy, by Charles Cresson Wood. This resource contains over 1500 pre-written security policies covering all the domains of ISO 17799.</p>
<p><strong>3. Assign responsibility for various security roles</strong></p>
<p>This is another area where regulatory requirements are clear. It is critical that you identify and document key individuals who are responsible for various operational security roles.</p>
<p>For example, which high-level executive is sponsoring your security program? Which team or individual is responsible for updating security policy documents? Which team or individual is responsible for responding to security incidents? Most security or audit frameworks such as ISO 17799 and COBIT have clear requirements for assigning securityresponsibilities in these areas. However, if you donâ€™t document these, it is unlikely you will be able to prove that these roles actually existed. Imagine a trial lawyer asking for evidence that you were serious about security within the company. What document would you produce? How many times have you seen a policy document that has an â€œauthorâ€ who is no longer with the company?</p>
<p>If you donâ€™t have documented security roles, a good resource is Information Security Roles and Responsibilities Made Easy, by Charles Cresson Wood. This resource has pre-written job descriptions and reporting relationships that you can easily customize.</p>
<p><strong>4. Use a security framework</strong></p>
<p>This item relates to Criteria #1 of completeness. Security frameworks are an organized set of security requirements, usually broken down into numerous categories or domains. Fortunately, there are a number of these available. For example, ISO-IEC 17799:2005 provides a framework of ten security domains. The Information Security Forum Standard of Good Practice is another framework similar to ISO. For federal governments, the National Institute of Standards provides a framework for evaluating security in 17 key topic areas. NIST also provides guidance on how to measure effectiveness in each of these categories.</p>
<p>Security domains provide a benchmark for measuring the completeness of your policy program. Once again, if your goal isÂ  completeness â€“ how can you measure progress against your goal?</p>
<p><strong>5. Do risk assessments and have an exception process</strong></p>
<p>Risk assessments are another key to effective policies. First, your policies should document when and how risk assessments are performed. In addition to being a foundation of most security programs, risk assessments allow organizations to define what levels of control are appropriate for their organization. If you look into the language of most security regulations, you see something like:</p>
<p><em>â€œadministrative, technical, and physical safeguards appropriate to the size and complexity of the [bank] and the nature and scope of its activities.â€ â€“ Gramm-Leach-Bliley Act<br />
</em></p>
<p>For example, the HIPAA Final Security Rule has a number of â€œrequiredâ€ and â€œaddressableâ€ controls. Addressable controls are deemed optional providing that an organization document that they performed a risk assessment and why they chose not to implement a particular control.</p>
<p>Once again, imagine facing the trial attorney who is asking that you document that your organization followed â€œdue careâ€ in your security program. Would a formal risk assessment help?</p>
<p>Key to this process is a â€œRisk Acceptance Memorandum.â€ This is a simple form that documents who is accepting the risk, how long the exception should last, and what mitigating controls are in place. Sample risk acceptance memos are widely available on the internet.</p>
<p><img class="alignleft" src="http://ipsecs.com/web/wp-content/themes/librio/images/security-padlock.jpg" alt="security policy" width="213" height="213" /></p>
<p><strong>6. Communicate your policies regularly</strong></p>
<p>This requirement would be the â€œAchilles Heelâ€ of policy. You have heard it by various names including â€œshelfwareâ€ and â€œpolicies collecting dust.â€ And yet precedent after precedent shows that this is key to any policy program. For example, a number of lawsuits have been filed and won by employees who were fired for security policy violations. When the court looked at the data, they found that the companies rarely or never communicated their policies to employees in the company.</p>
<p>In a recent lawsuit against a large public company, the court ruled that a simple email notification was not sufficient to notify employees of a change in policy. In fact, employees must acknowledge the receipt of this notification and demonstrate that they have some understanding of how the changes would affect them.</p>
<p>The Federal sentencing guidelines are clear on this point. Organizations must communicate compliance program requirements effectively, and employees and business partners must be aware of their role in complying with laws and policies. This is a key point: employees and partners must be aware of their role in security and compliance.</p>
<p>Communicating is not only required for your policies to be enforceable, is addresses the key area of security awareness. What better way to create security awareness than to educate your users on your own policies? Again, security-related regulations are clear on this point. For example, the HIPAA Final Security Rule requires security awareness and training in</p>
<p><em>[...organizations must] â€œImplement a security awareness and training program for all members of its workforce (including management).â€<br />
- HIPAA</em></p>
<p><strong>7. Enforce consistently</strong></p>
<p>Policies should document the process of enforcement, including who is responsible for enforcement. Policies should also be enforced consistently. Holding employees responsible for security, but given exemptions to senior executives is a common practice. Not only does this send a bad message to employees, but it will unravel your compliance program. The Federal sentencing guidelines state that â€œcontrols [policies] must be uniformly applied in the organization as they support compliance objectives.â€</p>
<p>Again, imagine yourself in front of the trial attorney, providing documentation that you have consistently enforced your policies. The first document would be your documented sanctions policy, and then the audit log which shows that every employee in the company understands what might happen in the event of a security violation.</p>
<p><strong>8. Include incident response</strong></p>
<p>Policies should define the organizational goals and responsibilities for incident response. Most organizations will experience security incidents, and the level to which they respond and recover can have serious impact on their business. Not only is incident response a key element of security frameworks, most legislation that defines security requirements has specifics about incident response.</p>
<p>Incident response policies should not only define what an incident is, but they should clearly define how incidents should be reported and handled. Guidelines should be established on when and how incidents should be report to law enforcement. Once again, critical parts of your incident response policy should be communicated to employees and business partners.</p>
<p>A question to ask yourself is this: Would your employees know how and where to report a security incident?</p>
<p><strong>9. Audit your policies for compliance</strong></p>
<p>Your entire policy framework should be designed around the concept of auditing. Once again, performing security audits is a key part of security and regulatory frameworks. â€œComplianceâ€ is the tenth key domain from ISO 17799, and includes action items like â€œreviewing security policies and technologies for legal and technical compliance.â€ But what are you auditing against? The answer is your stated policy.</p>
<p>When you write a policy, you should consider what evidence would support an audit of this policy. For written policies, it may simply be the written document. When you create a standard or a procedure, it is a good idea to create the â€œtest caseâ€ for that procedure. While auditing can be done easily on certain technologies, the questions get a bit trickier when we involve the human elements of security. For example, how can I verify that every employee in my organization has read and understood our security policies? Do I have evidence or an audit trail to support this?</p>
<p><strong>10. Use automation for enforcement and auditing</strong></p>
<p>As you consider all that is required for an effective policy program, you quickly realize that doing all of this â€œby handâ€ is nearly impossible. For example, how can I distribute my policy documents to every user in a company of 5,000 employees, and then demonstrate that they have read and understood them? Similarly, how can I verify that all of my Windows and Unix systems are enforcing my stated password and automated logoff standards? The only effective way is through automation.</p>
<p>This is an area where recent developments in automated policy tools can help. New intranet based tools, such as VigilEnt Policy Center from NetIQ Corp., can actually target individual policy and procedure documents at various individuals based on their organizational role. Management reports organize and track who has read and acknowledged policy documents by department or role. These tools provide detailed audit logging of which policies were effective on which dates, and who signed off on which policies. Thinking like an auditor, these tools provide a great way for organizations to demonstrate compliance with training and awareness requirements.</p>
<p>On the technology side, there are numerous host-based vulnerability assessment tools that can verify the security settings on your various platforms. This is where the organization of your documents is key: If you define detailed standards in a separate document, you can easily verify that the controls (i.e. the individual machine settings that enforce these standards) match what is written in your documents.</p>
<p><strong>Summary</strong></p>
<p>Security policies form the foundation for your security and compliance programs. However, having written policies is not enough. Policies must possess certain criteria if they are to be effective in reducing organizational risk. Following these steps will dramatically increase your ability to defend yourself in both audits and possible lawsuits relating to information security.</p>
<p><strong>Taken From :</strong> <a href="http://www.informationshield.com/papers/">www.informationshield.com/papers/</a></p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=25</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Introduction to ISO/IEC 27002</title>
		<link>http://ipsecs.com/web/?p=9</link>
		<comments>http://ipsecs.com/web/?p=9#comments</comments>
		<pubDate>Thu, 30 Apr 2009 10:15:32 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Management]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[ISO/IEC]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[standard]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=9</guid>
		<description><![CDATA[ISO/IEC 27002 part of a growing family of ISO/IEC ISMS standards, the &#8216;ISO/IEC 27000 series&#8217; is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) as ISO/IEC 17799:2005 and subsequently renumbered ISO/IEC 27002:2005 in July 2007, bringing it into line with the other ISO/IEC 27000-series standards. [...]]]></description>
				<content:encoded><![CDATA[<p><strong>ISO/IEC 27002</strong> part of a growing family of ISO/IEC ISMS standards, the &#8216;ISO/IEC 27000 series&#8217; is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) as <strong>ISO/IEC 17799:2005</strong> and subsequently renumbered ISO/IEC 27002:2005 in July 2007, bringing it into line with the other ISO/IEC 27000-series standards. It is entitled <em>Information technology &#8211; Security techniques &#8211; Code of practice for information security management</em>. The current standard is a revision of the version first published by ISO/IEC in 2000, which was a word-for-word copy of the British Standard (BS) 7799-1:1999.</p>
<p><img src="http://ipsecs.com/images/logo_intro_iso_27002.gif" alt="ISO 27002 introduction" /></p>
<p>ISO/IEC 27002 provides best practice recommendations on information security management for use by <span class="mw-redirect">those who are responsible</span> for initiating, implementing or maintaining <a class="mw-redirect" title="ISMS" href="http://en.wikipedia.org/wiki/ISMS">Information Security Management Systems</a> (ISMS). Information security is defined within the standard in the context of the <span class="mw-redirect">C-I-A triad</span>:<span id="more-9"></span></p>
<p><em>The preservation of <a title="Confidentiality" href="http://en.wikipedia.org/wiki/Confidentiality">confidentiality</a> (ensuring that information is accessible only to those authorised to have access), <a title="Integrity" href="http://en.wikipedia.org/wiki/Integrity">integrity</a> (safeguarding the accuracy and completeness of information and processing methods) and <a title="Availability" href="http://en.wikipedia.org/wiki/Availability">availability</a> (ensuring that authorised users have access to information and associated assets when required)</em>.</p>
<p>the standard contains the following twelve main sections:</p>
<ol>
<li>Risk assessment</li>
<li>Security policy &#8211; management direction</li>
<li>Organization of information security &#8211; governance of information security</li>
<li>Asset management &#8211; inventory and classification of information assets</li>
<li>Human resources security &#8211; security aspects for employees joining, moving and leaving an organization</li>
<li>Physical and environmental security &#8211; protection of the computer facilities</li>
<li>Communications and operations management &#8211; management of technical security controls in systems and networks</li>
<li>Access control &#8211; restriction of access rights to networks, systems, applications, functions and data</li>
<li>Information systems acquisition, development and maintenance &#8211; building security into applications</li>
<li>Information security incident management &#8211; anticipating and responding appropriately to information security breaches</li>
<li>Business continuity management &#8211; protecting, maintaining and recovering business-critical processes and systems</li>
<li>Compliance &#8211; ensuring conformance with information security policies, standards, laws and regulations</li>
</ol>
<p>Within each section, information security controls and their objectives are specified and outlined. The information security controls are generally regarded as best practice means of achieving those objectives. For each of the controls, implementation guidance is provided.</p>
<p>Reference : http://en.wikipedia.org/wiki/ISO_17799</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=9</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
