NU MSIT 458 - Security Policy and Ethical Hacking

Unformatted text preview:

Northwestern University MSIT 458 Information SecurityTopics for DiscussionThe CISO AgendaRiskAudit SupportComplianceCompliance cont’dISO Leading PracticesCompliance in ActionInternal PolicyInternal Policy cont’dInternal Policy cont’dInternal Policy cont’dPolicy Business CasePolicy Business Case cont’dPolicy Business Case cont’dEthical HackingEthical HackingEthical HackingEthical HackingBacktrack BacktrackBacktrackBacktrackWanna Break In?NMAPNMAP cont’dNMAP cont’dNMAP cont’dNMAP cont’dNMAP cont’dNMAP cont’dVulnerabilitiesNessusHow Do We Exploit?MetaSploitMetaSploit cont’dMetaSploit cont’dMetaSploit cont’dEthical Hacking cont’dEthical Hacking cont’dQ & ANorthwestern UniversityMSIT 458Information SecuritySecurity Policy&Ethical HackingBrandon Hoffman KPMG, LLPTopics for Discussion• IT Security in the Business– Risk, Audit Support, Compliance• Policies, Standards, and Procedures– IT Security’s Role in Creation and Enforcement• Typical IT Security Technical Work– Ethical Hacking/Penetration Testing– Backtrack 4– Common Methods and Sample OutputsThe CISO AgendaCore FunctionsBusinessRegulatory ComplianceTechnologyEnablementAlignment with Business Goals / ObjectivesBrand Protection & EnhancementLinkage to EnterpriseRisk MgmtMetrics / BenchmarkingBusiness ContinuityCompliance / Internal AuditDisaster RecoveryStrategyPrivacy / Security BreachVulnerability / Patch ManagementStaffing SupportHigh AvailabilityIdentity ManagementM&AExecutive / Board ReportingMobile ComputingEvolving ThreatsManaging 3rd Party Risk (Outsourcers)Culture / AwarenessCISORiskIT Security performs a critical role in assessing risk in the organization.• Vulnerability Scanning• Penetration Testing• Industry Trends• IT Strategy•Familiarity with Audit and Compliance measuresAudit SupportIn many cases, IT Security is heavily relied upon to perform in depth testing required by an audit organization. Security is enlisted by audit because:• Technical expertise • Familiarity with current issues from internal testing•Familiarity with Policies, Standards, and ProceduresComplianceCompliance may relate to internal compliance or external compliance.Internal compliance:• Policies and Standards• Security and Configuration baselines• Framework use – ISO, COBIT, ITIL, GAISP, NIST•Best PracticesCompliance cont’dExternal compliance:• SOX (Sarbanes Oxley)– COSO Framework• HIPAA• PCI•Safe HarborISO Leading PracticesSource: www.rsa.comCompliance in ActionSource: www.rsa.comInternal PolicyIT Security is regularly tasked with creation and enforcement of IT policies, standards, and procedures. Creation and enforcement of these documents require:• Understanding of audit roles and procedures• Familiarity with all systems, networks, and applications• Compliance considerationsInternal Policy cont’dDefinitions:• A Policy is a set of directional statements and requirements aiming to protect corporate values, assets and intelligence. Policies serve as the foundation for related standards, procedures and guidelines.• A Standard is a set of practices and benchmarks employed to comply with the requirements set forth in policies. A standard should always be a derivation of a policy, as it is the second step in the process of a company’s policy propagation.• A Procedure is a set of step-by-step instructions for implementing policy requirements and executing standard practices.Internal Policy cont’dInternal Policy cont’dPolicy creation and enforcement cyclePolicy Business CaseA top 5 global food retailer has a massive IT/IS infrastructure and good governance….but no real policies!Policies are the foundation for enforcing IT compliance and governance.What policies were written for the client…Policy Business Case cont’dPolicies written for IT Security:• Acceptable Use Policy• Information Classification & Ownership Policy• Risk Assessment & Mitigation Policy• Access Control Policy• Network Configuration and Communication Policy• Remote Access Policy• Business Continuity Policy• Incident Response Policy• Third Party Data Sharing Policy• System Implementation & Maintenance• Secure Application Development• Cryptography & Key Management• Mobile Computing• Physical & Environmental SecurityPolicy Business Case cont’dSample PoliciesEthical HackingEthical hacking is a very common profession within the IT security industry.• White hat, Grey hat, Black hat• Sometimes synonymous with penetration testing – A method of assessing the security posture of a system or network by simulating an “attack”Ethical HackingWhy perform an ethical hack?• Determine flaws and vulnerabilities• Provide a quantitative metric for evaluating systems and networks• Measure against pre-established baselines• Determine risk to the organization• Design mitigating controlsEthical HackingEthical HackingAdministrative items:• Authorization letter – “Get out of jail free card”• Risk report– Likelihood of risk– Mitigation plans– Trends (performed with recurring clients)Backtrack • Backtrack is a Linux based hacking toolkit provided by the people at www.remote-exploit.com• It includes a massive amount of hacking tools all for free • Compile tools yourself? Maybe check this out instead.Backtrack• Tool categories in BT4:– Digital Forensics– Information Gathering– Access Maintenance– Network Mapping– Penetration– Privilege Escalation– Radio Network Analysis (Wireless)– Reverse Engineering– VOIP– Vulnerability Identification– Web Applications–MiscellaneousBacktrack• Backtrack DemoBacktrack• Ways to use backtrack– Live CD: The most popular method• No state save• Highly portable– USB Drive/Stick• Highly portable (more so than CD)• Can make stateful• Prone to loss– Full HD install• Using your machine as a “hacktop”• Dual boot– Virtual Machine• Networking gets tricky• Resource availabilityWanna Break In?The first step in any ethical hack is to obtain information in the most stealth fashion.USE NMAP!!NMAPPowerful free linux tool – www.insecure.orgSyntax:nmap [ <Scan Type> ...] [ <Options> ] { <target specification> }TARGET SPECIFICATION:Can pass hostnames, IP addresses, networks, etc.Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254-iL <inputfilename>: Input from list of hosts/networks-iR <num hosts>: Choose random targets--exclude


View Full Document

NU MSIT 458 - Security Policy and Ethical Hacking

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download Security Policy and Ethical Hacking
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Security Policy and Ethical Hacking and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security Policy and Ethical Hacking 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?