What is a security plan?
What are the main contents of a security plan?
Policy - high level statement of the organizations goals on security
Current State - listing of vulnerabilities to which the system is exposed
Requirements - Functional and performance demands on the system
Recommendations - Security techniques and mechanisms to be put in place to meet the requirements
Accountability - Who is responsible for each security activity
Timetable - timelines to achieve goals
Evaluation methodology - how do you measure the effectiveness of the plan
What are the questions to be addressed (phases of the security plan)
Inspection - what needs to be protected
Protection - how to protect
Detection - how to detect intrusion
Reaction - how to react to a network attack
Reflection - how to recover from the network attack
Describe inspection
Want to protect the item with the highest risk leverage.
Describe Protection
Deploy tools for achieving the seven security goals for each resource or set of resources starting with the ones with the highest risk leverage
Describe detection
(some tools)
Signature analysis - collection of event log data
Anomaly Detection - look for unusual activities or statistically anomalous behaviour
Dynamic analysis = signature analysis + anomaly detection
Honey pots - subnetworks configured with vulnerabilities but have resources of no value
Describe reaction
Describe reflection