Security Analysis, Assessment, and Assurance JAGC
Security Analysis, Assessment, and Assurance JAGC
Security Analysis, Assessment, and Assurance JAGC
Asset
Treats Identification
Security by Analysis
Security Assesment and Assurance
BACKGROUND
A good security analysis process begins with a
complete identification of all the organization’s
assets.
By identifying the assets, identifying threats to each
asset makes it easy to identify most threats to the
system.
And it makes it easy for the next and subsequent
stages of the analysis process, like:
Threat sources
Types
Analysis techniques.
ASSET (information security, computer
security and network security)
An asset is any data, device, or other component of
the environment that supports information-related
activities.
Assets generally include hardware (e.g. servers and
switches), software (e.g. mission critical applications
and support systems) and confidential information.
THREAT IDENTIFICATION
A cyber security threat refers to any possible
malicious attack that seeks to unlawfully access
data, disrupt digital operations or damage
information
Communication
Human-machine interface
New tools and technologies
Training
The human component in the computer systems is
considerable and plays a vital role in the security of
the system.
Where possible, identifying the threat impact on all critical system resources.
Identifying known and plausible threats for each identified resource in the
system (known vulnerabilities are much easier to deal with than vulnerabilities
that are purely speculative.)
When computer systems were still in stand-alone mode, it was easy to deal
with security issues.
In any case, there was no massive sharing of information beyond passing a
floppy.
in the network
Security Assessment and Assurance
Security assessment:
is a process that consists of a comprehensive and continuous analysis of the security threat risk to
the system.
It involves:
auditing the system
assessing the vulnerabilities of the system
maintaining a credible security policy
Maintaining a vigorous regime for the installation of patches and security updates.
The defenses of a system are not dependent only on secure technology, but they also depend
on the effectiveness of staffing and training.
A well trained and proficient human component makes a good complement to the security
of the system, and the system as a whole can withstand and react to intrusion and malicious
code.
System performance
Network security
Network performance and diagnosis
Networking links
Dynamic internet protocol (IP) and DNS event loggers.
Remote control and file sharing
File transfer tools.
Type of Data Gathered/Collected
Because of the large number of events that take place
in a computer system, the choice of what event to
monitor can be difficult.
Most event loggers are preset to monitor events based
on set conditions.
For example, for work stations and servers, the
monitor observes system performance, including
central processing unit (CPU) performance, memory
usage, disk usage, system, security, DNS server,
directory service, and file replication service.
In addition, the monitor also may
receive syslog messages from other
computers, routers, and firewalls on
a network.
In a network environment, the
logger may generate notifications
that include e-mail, a network pop-
up, pager, syslog forwarding, or
broadcast messages to users or the
system administrator in real time,
following preset specified criteria.
Analyzed Information
The purpose of a system monitoring tool is to capture vital system data,
analyze it, and present it to the user in a timely manner and in a form in
which it makes sense. The logged data is then formatted and put into a
form that the user can utilize. Several of these report formats are:
Alert is a critical security control that helps in reporting monitored system
data in real time.
Chart is a graphic object that correlates performance to a selected object
within a time frame.
Log is the opposite of alerting, in that it allows the system to capture data
in a file and save it for later viewing and analysis.
Report is a more detailed and inclusive form of system logs. Log Reports
provide statistics about the system’s resources and how each of the selected
system resource is being used and by whom.
Auditing
Auditing is another tool for the security assessment and
assurance of a computer system and network.
Unlike monitoring, auditing is more durable and not ongoing, and,
therefore, it is expensive and time consuming.
Like monitoring, auditing measures the system against a predefined
set of criteria, noting any changes that occur.
The criteria are chosen in such a way that changes should indicate
possible security breaches.
A full and comprehensive audit should include the following steps:
Review of all aspects of the system’s stated criteria
Review of all threats identified