Information Systems Asset Protection: Monitoring SYSTEM ATTACKS - - PowerPoint PPT Presentation

information systems asset protection monitoring
SMART_READER_LITE
LIVE PREVIEW

Information Systems Asset Protection: Monitoring SYSTEM ATTACKS - - PowerPoint PPT Presentation

Information Systems Asset Protection: Monitoring SYSTEM ATTACKS Kevin Henry CISA CISM CRISC CISSP Kevinmhenry@msn.com Asset Protection Monitoring Agenda: Security Testing Investigating Systems Attacks and Monitoring Incidents


slide-1
SLIDE 1

Kevinmhenry@msn.com

CISA CISM CRISC CISSP

Kevin Henry

SYSTEM ATTACKS

Information Systems Asset Protection: Monitoring

slide-2
SLIDE 2

Investigating Incidents Security Testing and Monitoring Systems Attacks

Asset Protection – Monitoring

Agenda:

slide-3
SLIDE 3

Systems Attacks

slide-4
SLIDE 4

Systems Attacks

Incidents that impact:

  • Confidentiality
  • Theft or exposure of data
  • Integrity
  • Non-repudiation
  • Availability
  • Denial of service
  • Distributed denial of service

§ Botnets and zombies

slide-5
SLIDE 5

Systems Attacks

In order to ensure appropriate and adequate protection from attacks, the auditor should review and assess the accuracy, timely and thoroughness of:

  • Risk assessment
  • BIA
  • Previous incidents
  • Previous audits
  • External sources threat intelligence
  • Actions taken on identified threats
slide-6
SLIDE 6

Computer Crime

Most crimes are crimes using a computer:

  • Fraud
  • Abuse / stalking

These are usually addressed through traditional laws, however the investigation is often challenging as seen in Module three of this course

slide-7
SLIDE 7

Malware Denial of Service

Computer Crime

A computer crime is a crime against a computer or network

slide-8
SLIDE 8

Lack of skilled staff

Prevention, detection, investigation

Insecure implementations

Unpatched and misconfigured

No time limits on access Globally accessible

Factors That Contribute to Computer Crime

Causal factors that affect computer crime

slide-9
SLIDE 9

Impact of Computer Crime

Financial loss

  • Direct
  • Cost to repair / recover
  • Indirect
  • Fines, customer confidence

Loss of intellectual property

  • Competitive advantage

Greater costs of compliance Increased insurance costs

slide-10
SLIDE 10

Attacks

Understanding the threat source:

  • Human factor:
  • Accidental/Intentional

§ Employees § Customers § Criminals

  • APTs

§ Hackers

slide-11
SLIDE 11

Natural events

Storms, earthquake, flood

Threat Source Continued

Circumstantial

Neighboring building

Utility Supply chain

Defective products

slide-12
SLIDE 12

Passive

Stealth

Active

Attack Types

slide-13
SLIDE 13

Vulnerabilities

The auditor seek to identify any vulnerabilities:

  • Patches
  • Policy
  • Procedures
  • Being followed
  • Training
  • Monitoring
slide-14
SLIDE 14

Physical / Environmental

Operational

Technical / Logical Managerial / Administrative

Control Review

Controls may be

slide-15
SLIDE 15

s h s s h s

Most compromises of networks and systems are the result of a combination of factors – usually not related to the skill of the attacker:

  • Misconfiguration
  • Poor controls
  • Poor monitoring

Key Points Review

slide-16
SLIDE 16

Examining Attacks

slide-17
SLIDE 17

System Attacks

Attacks may come via:

  • Networks
  • Denial of service
  • Compromise of devices connected to

the network

  • Misrouting of traffic
  • Sniffing, eavesdropping
  • Alteration of traffic
slide-18
SLIDE 18

Auditor Responsibility Regarding Network Attacks

Review for:

  • Network management
  • Diagrams

§ Network segmentation

  • Training of staff
  • Change control
  • Single points of failure
  • Redundancy
  • Monitoring
slide-19
SLIDE 19

System Attacks

Attacks may come via:

  • Software
  • Applications
  • Operating systems
  • Drivers, utilities, hypervisors
  • Application Program Interfaces (APIs)
slide-20
SLIDE 20

System Attacks

Software attack surface

  • Inputs
  • Validation
  • Outputs
  • Distribution
  • Logic flaws
  • Bugs
  • Version control
  • Regression testing
slide-21
SLIDE 21

Monitoring Designed-in and Built-in Security

Baseline configurations

Hardening

Change control Version control

Auditor Responsibility Regarding Software Attacks

Review for: Software management

slide-22
SLIDE 22

System Attacks

Attacks may come via:

  • Hardware
  • Process isolation

§ Meltdown, Specter

  • Failure

§ Unpatched, unmaintained

slide-23
SLIDE 23

Auditor Responsibility Regarding Hardware Attacks

Review for:

  • Hardware management
  • Age
  • Maintenance
  • Patching
  • Redundancy

§ Reliance on a single dependency

  • Power
  • Backplane
  • Vendor
slide-24
SLIDE 24

System Attacks

Attacks may come via:

  • Physical
  • Theft or loss of equipment
  • Loss of power
  • Heating, ventilation and air

conditioning malfunction

  • Fire
  • Water damage

§ Flooding § Broken water pipes, leaky roof

slide-25
SLIDE 25

Asset inventory Labeling of equipment Preparedness for natural events Review of fire suppression systems

Adequate backup power

UPS Generators

Auditor Responsibility Regarding Physical Attacks

Review for

slide-26
SLIDE 26

System Attacks

Attacks may come via:

  • People
  • Untrained
  • Discontent
  • Not following procedures or policy
  • Pressure to ‘get the job done’
  • Stress / overwork
slide-27
SLIDE 27

‘Trusted staff’ Escalated permissions Senior staff

Fraud

The auditor should assess the risk of fraud or irregular acts during every audit

slide-28
SLIDE 28

Auditor Responsibility Regarding People Attacks

Review for:

  • Training
  • Procedures / policy
  • Access controls
  • Least privilege / Need-to-know
  • Separation of duties
  • Monitoring
  • Human Resources practices
  • Hiring, development, termination
  • Promotion – treated fairly
slide-29
SLIDE 29

s h s s h s

An information system is built using many components – technical, people and processes

  • The auditor must evaluate the

performance of all components in order to ensure reliable and secure system

  • perations

Key Points Review

slide-30
SLIDE 30

Malware Attacks

slide-31
SLIDE 31

Worm Logic Bomb Ransomware Virus Trojan Horse Spyware

Examples of Malware Attacks

Malware

slide-32
SLIDE 32

Preventing or Responding to Malware

Training and awareness Technical solutions Patching Monitoring Backups Network segmentation Virtual environments

slide-33
SLIDE 33

Targeted Attacks

Many attacks are based on opportunity

  • Not targeted

Some (such as APTs) are targeted against a specific industry or organization

  • Governments
  • Municipal
  • Military
  • Research and development
  • Industry sectors
  • Health care
  • Financial
slide-34
SLIDE 34

Threat intelligence

Events affecting similar organizations Honeypots IDS / IPS

Incident management program

Prevent, detect, respond

Preparation for Attacks

slide-35
SLIDE 35

t h s

Attacks are inevitable – and perhaps so are incidents

  • But due care requires taking steps to

avoid or minimize the effect of attacks

  • Due diligence is following up and

ensuring that there are adequate and appropriate controls in place

  • Managerial
  • Technical
  • Physical

Summary