William Slater's CYBR 515 Blog
Sunday, November 20, 2011
Post 054 - CYBR 515
Post 053 - CYBR 515
Picture Source: http://withfriendship.com/images/b/8701/trojan-horse-virus.png
Post 052 - CYBR 515
Thursday, November 17, 2011
Post 051- CYBR 515
Theme for the Week - Validating a Secure Design
Learning Objectives:
• Describe how PCI Data Security Standards are used to enhance payment card data security.
• Design a certification and evaluation plan for a secure network.
• Propose solutions to network security vulnerabilities that are exposed during an audit.
Readings:
• https://www.pcisecuritystandards.org/security_standards/index.php
• https://www.pcisecuritystandards.org/security_standards/documents.php
• https://www.pcisecuritystandards.org/documents/pci_dss_saq_instr_guide_v2.0.pdf
This week:
Now that you've created a design for a secure network, how do you know that it meets acceptable standards and practices for security? After all, both threats and the technology to meet them are constantly evolving. You need a way of ensuring that your network provides an acceptable level of risk. Fortunately, there are several organizations and methodologies that are in place to help you. Our reading assignments for this week expose you to some of the more important ones, and they, in turn, will point you to others by way of reference. If you take the time to examine these documents, you will be provided with a considerable amount of insight into how networks are certified, managed, and audited.
Some things to remember. Our networks are not static, and many of the technologies we implement can undo or circumvent security that we painstakingly put in place. Wireless is a good example. We need to consider the impact of all changes that we make and stay up to date on the latest tools and methodologies for identifying and eliminating vulnerabilities.
As part of our reading, we reference the Payment Card Industry’s Data Security Standards (PCI DSS) and their Documents Library. We also examine their Self-Assessment Questionnaire. These two documents explain the requirements for security to support payment processing. In addition, we'll review documents from the SANS. They have a Security Consensus Operational Readiness Evaluation (SCORE) that has benchmarks, scoring tools, checklists. and step-by-step guides. You can use these tools to evaluate an IT architecture. Please begin your lessons.
Week 12 Discussion
This week's reading involved both Security Consensus Operational Readiness Evaluation (SCORE) and Payment Card Industry (PCI) Data Security Standard 2.0. In your post this week, mention one important concept you have learned regarding these two assessment methodologies.
General Posting Guidelines (for participation): Postings are counted as participation for the week. Make sure all postings for this week's assignments are posted to this week's discussion forum. You must post at least two substantive messages to get minimum credit for participation (a 'C' grade). Two messages on different days gets a 'B' for participation - more postings (including answering other questions) get more credit. To qualify for an 'A' grade, you must post at least three critical thinking messages on three different days. Postings on the last day of the lesson will not count for credit since other students will not have sufficient time to respond or participate in your discussion. Post early and often. Don't wait until the last minute!
Assignment 12_2 (Attach to this assignment)
This assignment involves an evaluation of a secure design. Using the materials from your reading assignment, perform a security evaluation on the fictitious organization in the case study attached to this assignment. Use SCORE or PCI assessment methodology from your reading for your evaluation. Please use this week's discussion forum to post any questions or comments you have about this assignment. Save your findings in a word document named CYBR515 Assignment 12_2 , and attach it to this assignment.
Assignment 12-3 MIlestone 5 (Attach to this assignment)
Your project deliverable for this milestone is a brief PowerPoint presentation that could be presented to senior management explaining your recommendations. In your presentation, provide an overview of the present system, including any security vulnerabilities that you found. Outline the main points/diagrams/recommendations. Use the Notes section of the PowerPoint slides to explain any details about the slide. Review your semester project document for additional information on this assignment.
Please include CYBR515 Assignment 12-3 and your name in the file name for your PowerPoint presentation and attach it to the appropriate assignment for grading.
Thursday, November 10, 2011
Post 050 - CYBR 515
Wednesday, November 9, 2011
Post 049 - CYBR 515
Monday, November 7, 2011
Post 048 - CYBR 515
Project Manager / Program Manager
http://billslater.com/career
Chicago, IL
United States of America
Sunday, November 6, 2011
Post 047 - CYBR 515
USA PATRIOT ACT essentially nullified 5 of the first 10 Amendments to the U.S. Constitution.
Many citizens feel strongly that the powers now granted to the Executive branch of government and its agents are in direct conflict with the 1st, 4th, 5th, 6th and 8th Amendments in the Bill of Rights to the U.S. Constitution (see Bill of Rights, below.). In other words, we now live in such times that many of the rights to privacy that we thought we were guaranteed under the U.S. Constitution, are now preempted, at least temporarily by the PATRIOT Act. In fact, the only way that the PATRIOT Act could be successfully passed in both chambers of Congress was to include a “Sunset Clause,” which caused many of the more far-reaching provisions of the Act to expire automatically, unless they were again reviewed and approved by both chambers of Congress. Though there was a “Sunset Clause" the PATRIOT Act has now been renewed TWICE, once under President Bush and once under President Obama.
= = = = = = = = = = = = = = = = = = = = = = = = = = = =
Bill of Rights – First 10 Amendments to the U.S. Constitution
ARTICLES IN ADDITION TO, AND AMENDMENTS OF, THE Amendments to the Constitution
CONSTITUTION OF THE UNITED STATES OF AMERICA, PROPOSED BY CONGRESS, AND RATIFIED BY THE LEGISLATURES OF THE SEVERAL STATES, PURSUANT TO THE FIFTH ARTICLE OF THE ORIGINAL CONSTITUTION
Article [I.]
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.
Article [II.]
A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.
Article [III.]
No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.
Article [IV.]
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Article [V.]
No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.
Article [VI.]
In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defence.
Article [VII.]
In Suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury, shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.
Article [VIII.]
Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.
Article [IX.]
The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.
Article [X.]
The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.
References:
The Constitution of the U.S. (1788). U.S. Constitution. Retrieved from the web athttp://www.billslater.com/wfs_us_constitution.htm on November 6, 2011.
Wikipedia. (2011). USA PATRIOT Act. A Wikipedia article retrieved from the web athttp://en.wikipedia.org/wiki/Usa_patriot_act on November 6, 2011.
===========================
William F. Slater, III, M.S., MBA, PMP, CISSP, SSCP, CISA, MCITP, MCSE, ISO 20000, ISO 27002, MCP #3585
Project Manager / Program Manager
Chicago, IL
slater@billslater.com
http://billslater.com/career
Thursday, November 3, 2011
Post 046 - CYBR 515
Foreign Spies Stealing US Economic Secrets in Cyberspace
Many of you may want to read this report and perhaps share it with your families, friends, and colleagues.
Foreign Spies Stealing US Economic Secrets in Cyberspace
http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf
It details the threats of China and Russia and how active they are in their respective efforts to steal secrets from U.S. Companies.
More about this report in this article from the web:
In a world of cybertheft, U.S. names China, Russia as main culprits
The threats described in these reports are some of the main reasons that I signed up for this 18 month program for an M.S. in Cybersecurity at Bellevue University in Bellevue, NE.
==========================================================
William F. Slater, III, M.S., MBA, PMP, CISSP, SSCP, CISA, MCITP, MCSE, ISO 20000, ISO 27002, MCP #3585
Project Manager / Program Manager
Chicago, IL
slater@billslater.com
http://billslater.com/career
Post 045 - CYBR 515
Wednesday, November 2, 2011
Post 044 - CYBR 515
Readings:
• Chapter 11 in your textbook.
http://www.cisco.com/en/US/products/hw/vpndevc/index.html (this page leads to several Cisco product lines for secure networking)