Free Essay

Information Security Threat Mitigation

In:

Submitted By nsofwaf40
Words 789
Pages 4
Information Security Threats Mitigation

By
Francis Nsofwa Mubanga
Keller Graduate School of Management
Devry University

Professor Sandra Kirkland
SE572
July 14th, 2011

Table of Contents Introduction 1 Steps 1 Denial-of-Service attacks (DoS) 1 Distributed Denial-of-Service attacks (DDoS) 1 Masquerading and IP Spoofing attacks 2 Smurf attacks 2 Land .c attacks 2 Man-in-the-Middle attacks 3 Conclusion 3 References 4

Introduction

Our company faces the largest information security threat and we need to take steps to mitigate the risks associated with each one of them. Steps

Denial-of-Service attacks (DoS)

We will analyze the attack as best as we can and implement the correct defense. We will ask ourselves if there are any common packet signatures that are easy to filter against. We will ask ourselves if all attackers hitting a single target if they can be sacrificed. We will also need to find out as to which network the attack is coming from, and if we can verify it (remember that spoofed packets can come from anywhere, including our own network). Once we’ve found a reasonable match for the attack, pass the filters to our upstream provider(s) and seek their help getting them propagated outwards. We will need to make sure we filter or redirect traffic with a minimum amount of actual downtime (Kaeo, 2004).
Distributed Denial-of-Service attacks (DDoS)

CluB: a Cluster-Based architecture is the method we will use to prevent DDoS attacks proactively. In CluB, the network consists of a set of clusters —in the Internet, these can be e.g. Autonomous Systems (AS), or neighborhoods of AS. Packets need permissions to exit, enter, or pass-by different clusters. We can build on earlier work and improve on distribution of control aspects, a proactive method, using CluB, we will mitigate DDoS attacks. The method must balance the effectiveness-overhead tradeoff by addressing the issue of granularity of control in the network. We can use CluB to collaborate with different routing policies in the network and also use contemporary datagram options (Fu, 2010).
Masquerading and IP Spoofing attacks

We will use the Unicast Reverse Path Forwarding (uRPF) feature a security tool that helps mitigate source IP address spoofing by discarding IP packets that lack a verifiable IP source address in the IP routing table. An uRPF is also a common technique used to mitigate source address spoofing. When we use uRPF, the source address of IP packets is checked to ensure that the route back to the source uses the same interface that the packet arrived on. The input interface might be feasible but if not the path to the source network, the packet will be dropped. There are two types of uRPF implementation namely Strict Mode complying with RFC 2827 filters on Network Ingress Edge and Best Current Practices (BCP 38) and Loose Mode for ISP to ISP Edge, for RTBH filtering (Cisco Systems, 2011).
Smurf attacks

We will need to disable IP-directed broadcast functionality on every router. Generally this functionality will not be missed. The attacker may still be able to launch a Smurf attack from inside our LAN, in which even if we disable IP broadcast functionality at the router their will be no effect. To protect against such an attack, our operating systems must be set to prevent computers from responding to IP-directed broadcast requests.
Land .c attacks

We will need to patch the operating systems to prevent the attacks. If we prevent traffic coming into the network that has a source address that we are using, we will have prevented Land .c attacks.
Man-in-the-Middle attacks

First, static IP and MAC addresses could be mapped to prevent unauthorized changes. Second, ARP monitoring tools could be used to alert of any unauthorized ARP activities. Third, network switch port security could be turned on to prevent users (and attackers) from changing their MAC addresses or require authorization.
Conclusion

Having explained the steps to mitigate the above threats for our company, we will stay alert every time in order to prevent internal and external attacks.

References Cisco Systems (2011) Cisco IOS Security Configuration Guide, Release 12.4; Configuring Unicast Reverse Path Forwarding Retrieved on July 12, 2011 from http://www.cisco.com/en/US/docs/ios/security/configuration/guide/sec_cfg_unicast_rpf_ps6350_TSD_Products_Configuration_Guide_Chapter.html Fu, Z (2010) Mitigating Distributed Denial-of-Service Attacks: Application-defense and Network-defense Methods Retrieved on July 12th, 2011 from http://www.cse.chalmers.se/~zhafu/Lic-thesis.pdf ZHang Fu 2010
Gregory, H. P. (2010). All in One Certified Information Systems Auditor. New York: McGraw- Hill
Kaeo, M. (2004). Designing Network Security. Indianapolis: Cisco Press
Ramachandran, J. (2002). Designing Security Architecture Solutions. New York: John Wiley & Sons, Inc.

Similar Documents

Premium Essay

Security

...White Paper IT Security Risk Management By Mark Gerschefske Risk Analysis How do you predict the total cost of a threat? Is it only the cost to restore the comprised system and lost productivity? Or does it include lost revenue, customer confidence, and trust of investors? This paper provides an overview of the risk management process and its benefits. Risk management is a much talked about, but little understood area of the IT Security industry. While risk management has been practiced by other industries for hundreds of years, little historical data exists to support qualitative analysis in the IT environment.1 The industry approach has been to buy technology without really understanding the potential underlying risks. To further complicate matters, new government regulations create additional pressure to ensure sensitive data is protected from compromise and disclosure. Processes need to be developed that not only identify the sensitive data, but also identify the level of risk posed due to noncompliance of corporate security policies. Verizon has developed security procedures based on industry standards that evaluate and mitigate areas deemed not compliant to internal security policies and standards. Through the use of quantitative analysis, Verizon is able to determine areas that present the greatest risk, which allows for identification and prioritization of security investments. Risk Mitigation Process The Risk Mitigation Process (RMP) is a part of risk management...

Words: 2021 - Pages: 9

Premium Essay

Information Systems Security

...Information Systems Security Strayer University CIS 333 June 18, 2014 David Bevin Information Systems Security The scope of our assignment as an information officer at Whale Pharmaceuticals is to safeguardour daily operations which require a combination of both physical and logical access controls to protect medication and funds maintained on the premises and personally identifiable information and protected health information of our customers. The immediate supervisor has tasked us with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate all risks identified. There are few basic things to be cognizant of as we carry out this task. Security is easiest to define by breaking it into pieces. An information system consists of the hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations. Information systems security is the collection of activities that protect the information system and the data stored in (Kim & Solomon 2012). We should also be aware of what we are up against. Cyberspace brings new threats to people and organizations. People need to protect their privacy. Businesses and organizations are responsible for protecting both their intellectual property and any personal or private data they handle. Various laws require organizations to use security controls to protect private and confidential...

Words: 3283 - Pages: 14

Premium Essay

Hipaa

...notice is not removed. When information from this document is used, HIPAA COW shall be referenced as a resource. They may not be sold for profit or used in commercial documents without the written permission of the copyright holder. This Guide and the Toolkit documents are provided “as is” without any express or implied warranty. This Guide and the Toolkit documents are for educational purposes only and do not constitute legal advice. If you require legal advice, you should consult with an attorney. Unless otherwise noted, HIPAA COW has not addressed all state pre-emption issues related to this Guide and the Toolkit documents. Therefore, these documents may need to be modified in order to comply with Wisconsin/State law. The Toolkit provides an example HIPAA Security Risk Assessment and documents to support completing a Risk Analysis and Risk Mitigation Implementation Plan. While it covers a broad spectrum of the requirements under the HIPAA Security Rule and HITECH, it may not cover all measures needed to secure your patients’ electronic protected health information (ePHI). It is not meant to be construed as a one-size-fits all Toolkit. As previously stated, this includes only an example method to complete a HIPAA Security Risk Assessment. The HIPAA Security Rule requires this be completed on an ongoing basis, but does not prescribe how to accomplish this. The authors of these documents carefully considered and included information that are believed to be of most...

Words: 3778 - Pages: 16

Free Essay

The Elements of a Risk Management Plan

...Chapter 7: Statutory Authority Chapter Outline 1. Introduction of topics and concepts to be discussed in the chapter. a. Legal basis of modern emergency management in the United States. b. Budget authority. c. Program eligibility. d. Roles and responsibilities. 2. Case Studies a. The National Earthquake Hazard Reduction Program (NEHRP): Legislation to Address a Particular Hazard b. The Homeland Security Act of 2002: A New Emergency Management c. The Disaster Mitigation Act of 2000: A Shift to Pre-Disaster Mitigation 3. Additional Sources of Information 4. Glossary of Terms 5. Acronyms 6. Discussion Questions a. General b. NEHRP c. Homeland Security Act of 2002 d. DMA 2000 7. Suggested Out of Class Exercises Introduction No emergency management system anywhere in the world can properly function without statutory authority and consistent budget appropriations. Statutory authority defines disasters programs, determines who is eligible for these programs, provides the legal support needed to implement disaster programs and establishes the legal foundation for funding the programs and activities of the disaster agency. Without such authority, a government agency is powerless. Legal Basis of Modern Emergency Management in the United States The first recorded emergency management legislation in the United States occurred in 1803 when a Congressional Act was passed to provide financial...

Words: 25108 - Pages: 101

Premium Essay

Team E Final Unix-Linux Paper

...Enterprise Security Plan University Of Phoenix CMGT 430 Carol Eichling March 26, 2014 Enterprise Security Plan Huffman trucking company is a national transportation company. The company’s 1,400 employee’s work in its logical hubs located in Los Angeles, California, St. Louis, Missouri, and Bayonne, New Jersey; its central maintenance facility is in Cleveland, Ohio; and as drivers of its 800 road tractors. (University of Phoenix, 2005) Team A has been consulted to create an enterprise security plan that will identify the information security challenges within Huffman trucking company network and establish mitigation plans to offset those challenges. The enterprise security plan will address some of the top vulnerabilities and risks that Huffman trucking company has the potential of experiencing. The plan will also include a list of physical and logical vulnerabilities within the company, and a specific list of remediation or mitigation steps for those vulnerabilities or threat pairs. “Enterprise security planning (ESP) is the aligning of information security policies and practices and applicable security technologies with the business rules and the evolving information models and technical architectures being used by a government or business”. (Erutal, L., Braithwaite, T., Bellman, B., 2012 pg. 144) As we started our examination of Huffman trucking vulnerabilities and risk, we took a strategic look at their assets and the possible vulnerabilities that could have an...

Words: 1665 - Pages: 7

Premium Essay

Risk Management

...process of identifying vulnerabilities and threats to information resources used by a company in reaching business objectives and deciding what measures to take in reducing risk to an acceptable level. An effectual risk management process is an essential component of a successful IT security program. The paramount goal of an organization's risk management process should be to protect the organization and its ability to perform their mission, not just its IT assets. With that in mind, the risk management process should not be treated primarily as a technical function by IT experts, but rather as an essential management function of the organization. The objective of performing risk management is to enable the organization to accomplish its mission(s) (1) by better securing the IT systems that store, process, or transmit organizational information; (2) by enabling management to make well-informed risk management decisions to justify the expenditures that are part of an IT budget; and (3) by assisting management in authorizing (or accrediting) the IT systems on the basis of the supporting documentation resulting from the performance of risk management . “Effective risk management begins with a clear understanding of the organization's appetite for risk2. This drives all risk management efforts and impacts future investments in technology. Risk management encompasses four key elements: Risk identification, risk mitigation, risk acceptance, and risk analysis. When these...

Words: 3059 - Pages: 13

Premium Essay

Rights to Contemptment

...Risk Management Principles CMGT/430 INTRODUCTION Riordan Manufacturing is a company that is commited to handling their business in an ethical and logical manner. In order to provide the proper risk management plan for the company there needs to be a conference with all of management and stakeholders to get an oversight on the company and what it needs for mitigation control and risk management. The company needs to reconsider getting input from internal auditors, external auditors and outsources. Management will also need to get all of the department heads and key people together to discuss all of the initial assessments of the risk management capabilities and how effective it can be on the network/system. This assessment will be able to decide rather to have or continue with a more in tune risk management plan. There is also the need to discuss how to make the plan stronger for the company and how the analysts should focus on the risk management mitigation for Riordan manufacturing. Risk Management Principles Riordan Manufacturing is a corporation that is consistent of many different businesses. This new plan that needs to be implemented will help each business to deal with and handle their everyday risks and teach them how to make the proper decisions on what can or could be done. In order for this new plan to be implemented, eack business will have to be able to weigh out the risks with the strategies and be able to know and choose the proper decision when responding...

Words: 1084 - Pages: 5

Premium Essay

Risk Assesment Plan

...that handles individual risk. RISK PLAN OBJECTIVES The scope of this risk assessment assessed the system’s use of resources and controls (implemented or planned) to eliminate and/or manage vulnerabilities exploitable by threats internal and external to the Project. If exploited, these vulnerabilities could result in: • Unauthorized disclosure of data • Unauthorized modification to the system, its data, or both • Denial of service, access to data, or both to authorized users This Risk Assessment Report evaluates the confidentiality (protection from unauthorized disclosure of system and data information), integrity (protection from improper modification of information), and availability (loss of system access) of the system. Recommended security safeguards will allow management to make decisions about security-related initiatives. PROJECT RISKS This risk assessment methodology and approach was conducted using the guidelines in NIST SP 800-30, Risk Management Guide for Information Technology Systems. The assessment is broad in scope and evaluates security vulnerabilities affecting confidentiality, integrity, and availability. The assessment recommends appropriate security safeguards, permitting management to make knowledge-based decisions about security-related initiatives. The methodology addresses the following types of controls: • Management Controls: Management of the...

Words: 1565 - Pages: 7

Free Essay

Df Sdfsdf Sdfsdf Sdfsdfsdf

...THREAT MODELING AND ITS USAGE IN MITIGATING SECURITY THREATS IN AN APPLICATION Thesis Submitted in partial fulfillment of the requirements for the degree of MASTER OF TECHNOLOGY in COMPUTER SCIENCE & ENGINEERING - INFORMATION SECURITY by EBENEZER JANGAM (07IS02F) DEPARTMENT OF COMPUTER ENGINEERING NATIONAL INSTITUTE OF TECHNOLOGY KARNATAKA SURATHKAL, MANGALORE-575025 JULY, 2009 Dedicated To My Family, Brothers & Suraksha Group Members DECLARATION I hereby declare that the Report of the P.G Project Work entitled "THREAT MODELING AND ITS USAGE IN MITIGATING SECURITY THREATS IN AN APPLICATION" which is being submitted to the National Institute of Technology Karnataka, Surathkal, in partial fulfillment of the requirements for the award of the Degree of Master of Technology in Computer Science & Engineering - Information Security in the Department of Computer Engineering, is a bonafide report of the work carried out by me. The material contained in this report has not been submitted to any University or Institution for the award of any degree. ……………………………………………………………………………….. (Register Number, Name & Signature of the Student) Department of Computer Engineering Place: NITK, SURATHKAL Date: ............................ CERTIFICATE This is to certify that the P.G Project Work Report entitled " THREAT MODELING AND ITS USAGE IN MITIGATING SECURITY THREATS IN AN APPLICATION" submitted by Ebenezer Jangam (Register Number:07IS02F)...

Words: 18945 - Pages: 76

Premium Essay

Risk Management Plan

...Management Plan……………..…….....4 2.0 Risk Management Procedure……….…………………………………...4 2.1 Objectives……………………………………………………4 2.2 Scope………………………………………………………...4 2.3 Compliance Laws and Regulations…………….………………….…....5 2.3.1 PCI DSS Summary ………………………………..…....…5 2.3.2 Sarbanes Oxley Act Summary ………………………..…..6 2.4 Roles and Responsibilities……………………………………..….…..6 2.4.1 Threat Identification………………………………………..7 2.4.2 Methods for Risk Identification……………………...…….7 2.4.3 Vulnerability Identification...………………………...…….7 2.4.4 Pair Threats & Vulnerabilities……………………...………8 2.5 Risk Analysis………………………………………………….……......8 2.6 Risk Monitoring……………………………………………....………..9 2.6.1 Risk Management Plan Approval………………………….10 Executive Summary A risk is an event or condition that if a threat exploits vulnerability there could be a positive or negative effect on a business or project. Risk Management is the practice of identifying, assessing, controlling and mitigating risks. This document is a guideline in completing a Risk Management Plan. The Risk Management Plan describes the vulnerabilities and threat pairs that could be a potential risk, and outlines a plan to be performed, recorded, and monitored with control measures. The Risk Management Plan is important because it outlines the potential risks and actions being taken to eliminate or reduce the potential loss to the business. 1.0 Introduction 1.1 Purpose of the Risk Management Plan The Risk Management Plan...

Words: 1648 - Pages: 7

Free Essay

Test One

...Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544 June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems Highlights of GAO-15-544, a report to congressional committees. Why GAO Did This Study What GAO Found Since 2010, the United States has suffered grave damage to national security and an increased risk to the lives of U.S. personnel due to unauthorized disclosures of classified information by individuals with authorized access to defense information systems. Congress and the President have issued requirements for structural reforms and a new program to address insider threats. The Department of Defense (DOD) components GAO selected for review have begun implementing insider-threat programs that incorporate the six minimum standards called for in Executive Order 13587 to protect classified information and systems. For example, the components have begun to provide insider-threat awareness training to all personnel with security clearances. In addition, the components have incorporated some of the actions associated with a framework of key elements that GAO developed from a White House report, an executive order, DOD guidance and reports, national security systems guidance, and leading practices recommended by the National Insider Threat Task Force. However, the components...

Words: 17616 - Pages: 71

Premium Essay

Is305 Project

... October 1, 2013 RISK management PLAN INTRODUCTION 2 PURPOSE AND SCOPE 2 RISK MANAGEMENT PLANNING 3 RISK MANAGEMENT ASSIGNMENTS 6 RISK MANAGEMENT TIMELINE 7 MITIGATION PLAN Introduction 8 Cosiderations 8 Prioritizing 9 Cost benefit analysis 10 Implementation 11 Follow-up 11 Buisness impact analysis Introduction 12 Scope 12 PURPOSE AND objectives 13 Steps of bia 13 final review 15 BUSINESS CONTINUITY PLAN Introduction 16 oBJECTIVES 16 BCP PLANNING 17 PLAN UPDATES AND TRAINING 21 computer incident response team Introduction 22 Purpose 22 elements of the plan 23 incident handling process 23 cirt members 23 detection 24 containment 24 recovery and review 24 cirt policies 25 FINAL THOUGHT RISK MANAGEMENT PLAN INTRODUCTION A risk management plan is a process for identifying, assessing, and prioritizing risks that could cause the company a loss. Identifying these risks, threats and vulnerabilities and taking action to prevent or control them now and in the future. Creating a risk management consists of measuring and prioritizing risks involved and taking actions to reduce any loss the company may encounter. Being that indirectly we work with the Department of Defense, which as you knows is a department of the United States Government dealing with national security, a well-developed risk management plan is of the upmost importance. Without updating our current plan and conforming to newer technologies are company may see unexpected...

Words: 5009 - Pages: 21

Premium Essay

Week 4 Assignment 1

...Development of a Security Strategy SEC 404 – Cyber Security ACME, a technology services corporation of about 300 employees has recently inaugurated their new Headquarters. In an effort to establish a stable and operational IT infrastructure, the newly implement Information Technology (IT) department has requested the security team to put develop a corporate security strategy that will layout the foundation of the day-to-day operations of the organization. An important piece of an information security strategy is mitigating risks while complying with legal, statutory, contractual, and any internal requirements. With the development of technology, the evolution of IT systems and the insider threat risk, it is critical that mitigation strategy is developed. Following the results of a risk assessment, mitigation strategies are presented to the organization’s stakeholders. Below are a few examples of mitigation strategies that can be implemented on a new organization. * Ensure to consider prevention, detection and response mechanisms. * Ensure to consider the implementation of lest permissions and least privilege concepts. * Ensure to consider layered controls so that multiple control points are established between threats and assets of the organizations. * Ensure to consider policies that guide IT security officers and employees in implementing and managing the security program. The strategy developed will be used to define control objectives, and...

Words: 511 - Pages: 3

Premium Essay

Risk Management Plan

...Management Plan Introduction Version 1.2.0 Designed by: Defense Logistics Information Systems Designers: Matthew Gugumuck Michael Mawyer Daryl Giggetts | Overview | * The goal of the Risk Management plan is to design and execute the implementation of various security policies and different counter-measures in the event of any type of risk, threat, and/or vulnerabilities against the organizations daily operations and sensitive information. By combining both hardware devices and software applications will boost the effectiveness of security and preventing unauthorized access and effectively repulsing attacks. | Authority/Ownership | * Any information and sensitive contents contained in this document has been planned and developed by DLA Logistics Information Service and in which is the rightful owner of this document. All materials contained within this document is considered CLASSIFIED and is also copyrighted by DLA Logistics Information Service (DLIS). Any wrongful use of such material and/or reference to this document without the rightful expressed and written consent of the owner(s) may result in criminal prosecution. | Sections contained in DLIS Risk Management Plan | * Risk Management Overview * Planning and Implementation of Risk Management * Key Personnel Roles * Risk Assessment Plan * System Analysis and Characterization * Threat Identifications * Vulnerability Identifications * Control Analysis...

Words: 4166 - Pages: 17

Premium Essay

Ccsecurity Mp Outlin

...SECURITY MASTER PLAN OUTLINE for CHABOT LAS POSITAS Community College District Submitted by: CATALYST Consulting Group, Inc. 851 Napa Valley Corporate Way, Suite D Napa, CA 94558 In Association With: DMJM, Program Management For Measure B Bond Program 6601 Owens Drive, Suite 238 Pleasanton, CA 94588 May 2, 2005 9/21/2005 2 SECURITY MASTER PLAN OUTLINE Chabot Community College District This outline presents the fundamental topics of the Security Master Plan, an independent document incorporated by reference into the TBP Architecture District Master Plan for the Chabot College campus new construction and building improvements. To develop the Security Master Plan, CATALYST has first performed numerous site surveys and interviews, analyzed crime index data, reviewed the relevant technologies, and assessed the campus physical environment to define the risks and vulnerabilities that need to be addressed for a long-term vision of campus security. From this goal set, CATALYST has developed the guidelines and recommendations for the District to standardize the approach and cost of physical security on their campuses. The Security Master Plan will include the topic sections listed in the outline following. The primary intent of the Security Master Plan is to define security mitigation standards that integrate efficiently with new building construction and building improvements, saving upgrade costs today by planning for the campus of tomorrow. By first prioritizing...

Words: 1345 - Pages: 6