|
Introduction to IT Compliance |
|
|
1 | (24) |
|
|
2 | (1) |
|
Does Security Belong within IT? |
|
|
3 | (2) |
|
|
3 | (1) |
|
Job Roles and Responsibilities |
|
|
3 | (2) |
|
What Are Audits, Assessments, and Reviews? |
|
|
5 | (18) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Penetration Tests and Red Teaming |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
Black and White Box Testing |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
The Decision Test of The Process |
|
|
11 | (2) |
|
|
13 | (1) |
|
Defintion of Internal Control |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Ethics, ``The 10 Commandments of Computer Ethics'' |
|
|
17 | (1) |
|
|
17 | (1) |
|
Examining and Evaluating Information |
|
|
18 | (1) |
|
|
18 | (1) |
|
The Program---Criteria for Defining Procedures |
|
|
18 | (1) |
|
|
19 | (1) |
|
Introduction and Background |
|
|
19 | (1) |
|
Purpose and Scope of the Report |
|
|
19 | (1) |
|
Objectives of the Project |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
IIA (The Institute of Internal Auditors) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
21 | (2) |
|
|
23 | (2) |
|
Evolution of Information Systems |
|
|
25 | (18) |
|
|
26 | (1) |
|
Terminology Used in This Book |
|
|
27 | (1) |
|
The Primary Objective of Auditing |
|
|
27 | (1) |
|
|
27 | (2) |
|
|
28 | (1) |
|
|
29 | (11) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Skilled and/or Unexpected Attacks |
|
|
30 | (1) |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
Unobtrusive Public Research |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
Follow-up and Continuing Attacks |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
Denial-of-Service (DoS) Attacks |
|
|
37 | (1) |
|
Single-Message DoS Attacks |
|
|
38 | (1) |
|
Flooding Denial-of-Service (DDoS) Attacks or Distributed DoS Attacks |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
Policy > Procedure > Audit |
|
|
40 | (1) |
|
|
41 | (2) |
|
The Information Systems Audit Program |
|
|
43 | (16) |
|
|
44 | (1) |
|
|
44 | (2) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Testing Your Organization's Security |
|
|
46 | (6) |
|
|
46 | (1) |
|
|
46 | (1) |
|
Protection Testing, Internet Security Assessments, and Ethical Attacks |
|
|
47 | (1) |
|
Protection Testing or Internet Assessments |
|
|
47 | (1) |
|
Why People Do Protection Testing |
|
|
48 | (1) |
|
Penetration Testing or Ethical Attacks Vs Protection Testing |
|
|
48 | (1) |
|
|
48 | (1) |
|
Server Operating System Security Analysis |
|
|
48 | (1) |
|
|
49 | (1) |
|
Phone/War dialing Audit Project Tasks |
|
|
49 | (1) |
|
|
49 | (1) |
|
BCP/DR Testing: Disaster Readiness Assessment |
|
|
50 | (1) |
|
What Is Covered in a BCP/DR Review? |
|
|
51 | (1) |
|
|
52 | (1) |
|
Developing and Audit Manual |
|
|
52 | (3) |
|
|
52 | (1) |
|
Criteria for Defining Procedures |
|
|
52 | (1) |
|
|
53 | (1) |
|
When to Prepare the Program |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
Summary of Recommendations |
|
|
55 | (1) |
|
|
55 | (1) |
|
Security Management Model |
|
|
55 | (3) |
|
|
58 | (1) |
|
|
59 | (14) |
|
|
60 | (1) |
|
Performance of Audit Work |
|
|
60 | (5) |
|
|
60 | (1) |
|
The Importance of Planning |
|
|
61 | (1) |
|
Examining and Evaluating Information |
|
|
61 | (1) |
|
|
61 | (1) |
|
Security Review Methodology |
|
|
62 | (1) |
|
Information Asset Identification |
|
|
62 | (1) |
|
Information Sensitivity and Criticality Assessment |
|
|
62 | (1) |
|
|
63 | (1) |
|
Security Supporting Functions Review |
|
|
63 | (1) |
|
Security Enforcing Functions Review |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (2) |
|
|
66 | (1) |
|
Statement of Purpose/Scope |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (5) |
|
|
68 | (1) |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (2) |
|
|
72 | (1) |
|
|
73 | (42) |
|
Obtaining Information and Issuing Requests |
|
|
74 | (3) |
|
|
74 | (1) |
|
Security Reviews of IT Systems |
|
|
74 | (1) |
|
|
74 | (1) |
|
Information Asset Identification |
|
|
74 | (1) |
|
Information Sensitivity and Criticality Assessment |
|
|
75 | (1) |
|
|
75 | (1) |
|
Security Supporting Functions Review |
|
|
75 | (1) |
|
A Review of an Organization's Security Enforcement Functions |
|
|
75 | (1) |
|
Policy Compliance Reviews |
|
|
76 | (1) |
|
Third-party and Government Reviews |
|
|
76 | (1) |
|
System Audit Considerations |
|
|
76 | (1) |
|
Internal and External Standards |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
How to Characterize Your Organization |
|
|
77 | (2) |
|
Steps in Characterization |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
Stages of Characterization |
|
|
79 | (1) |
|
What Happens if Documentation Is Incomplete or Unavailable? |
|
|
79 | (5) |
|
|
80 | (1) |
|
|
81 | (2) |
|
Ease of Resolution: The Ease of Removing a Vulnerability |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
What Information is Required? |
|
|
84 | (9) |
|
Information Asset Inventory |
|
|
84 | (1) |
|
|
84 | (1) |
|
Critical/Major Applications |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
System Design Documentation |
|
|
85 | (1) |
|
System Logical/Infrastructure Diagram |
|
|
85 | (1) |
|
Concept of Operations Brief |
|
|
85 | (1) |
|
List of Mandatory Requirements (if Any) |
|
|
86 | (1) |
|
|
86 | (1) |
|
List of Critical Configuration |
|
|
86 | (1) |
|
Detailed Configuration Documentation |
|
|
86 | (1) |
|
Detailed Network Diagrams |
|
|
87 | (1) |
|
|
87 | (1) |
|
System Security Policy and Administrative Security |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
Communications and Key Management Security |
|
|
88 | (1) |
|
Equipment Maintenance and Disposal |
|
|
88 | (1) |
|
|
88 | (1) |
|
Normal and Privileged Access to Systems |
|
|
88 | (1) |
|
|
88 | (1) |
|
Configuration and Change Control |
|
|
89 | (1) |
|
User Responsibilities and Awareness |
|
|
89 | (1) |
|
Service Provider Responsibilities (external service provider only) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
Operational Support Procedures |
|
|
89 | (1) |
|
Change Implementation Procedures |
|
|
90 | (1) |
|
Intrusion Detection Procedures |
|
|
90 | (1) |
|
System Integrity Testing Procedures |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Incident Detection and Response Policy |
|
|
92 | (1) |
|
Attempts to Gain Technical Information on the System |
|
|
92 | (1) |
|
Unsuccessful Attempts to Subvert the System |
|
|
92 | (1) |
|
Successful Attempts to Subvert the System |
|
|
92 | (1) |
|
Major Successful Attempts to Subvert The System |
|
|
93 | (1) |
|
|
93 | (1) |
|
General Background Information |
|
|
93 | (7) |
|
Identity LAN products used |
|
|
94 | (1) |
|
Review Administrative Documentation |
|
|
95 | (1) |
|
Identity Level of vendor support |
|
|
95 | (1) |
|
Gather information on vendor access to the network for diagnostic purposes |
|
|
95 | (1) |
|
Review duties and responsibilities of administrators for proper network security |
|
|
95 | (1) |
|
|
96 | (1) |
|
Review system documentation |
|
|
96 | (1) |
|
Understand Network Operations |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
Review Remote Communications Controls |
|
|
99 | (1) |
|
|
99 | (1) |
|
Side Issues with Gathering Passwords |
|
|
100 | (7) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (2) |
|
|
105 | (1) |
|
Password Cracking and Guessing |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Access control Techniques and Types |
|
|
107 | (5) |
|
Discretionary Access Control |
|
|
109 | (1) |
|
|
109 | (1) |
|
Lattice-Based Access Control |
|
|
109 | (1) |
|
Role-Based Access Control |
|
|
110 | (1) |
|
Rule-Based Authorization Checking |
|
|
110 | (1) |
|
|
110 | (1) |
|
Restrictions with the Bell-LaPadula Model |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (34) |
|
|
116 | (1) |
|
The Role of Policy and Procedures in Information Systems Defense |
|
|
116 | (4) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
The Policy Life Cycle Process |
|
|
119 | (1) |
|
|
120 | (5) |
|
Mission, Vision, and Values Statements |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
Issue-Specific and System-Specific Policy |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Interpreting Policy as an Auditor |
|
|
125 | (6) |
|
Simple Steps to Assess the Security Posture |
|
|
126 | (1) |
|
System Audit Considerations |
|
|
126 | (1) |
|
Security Documentation Evaluation |
|
|
127 | (1) |
|
Various Levels of Policy and Their Functions |
|
|
127 | (2) |
|
The Framework for Issue-and System-Specific Policy |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
Overview or Executive Summary |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
Compliance or Enforcement |
|
|
130 | (1) |
|
Identifying Preventive, Detective and Corrective Controls |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
Developing a Security Policy |
|
|
131 | (2) |
|
Begin by Talking About the Issue |
|
|
132 | (1) |
|
The Use of the English Language in Policy Should Be Simple |
|
|
132 | (1) |
|
Policy Should be Evaluated on Clarity and Conciseness |
|
|
133 | (1) |
|
Policy Areas to be considered |
|
|
133 | (1) |
|
Identification and Authentication |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (5) |
|
|
134 | (1) |
|
Information Security Policy |
|
|
134 | (1) |
|
|
135 | (1) |
|
Information security Infrastructure |
|
|
135 | (1) |
|
Security of Third-Party Access |
|
|
135 | (1) |
|
Assets Classification and control |
|
|
135 | (1) |
|
Accountability for Assets |
|
|
135 | (1) |
|
Information Classification |
|
|
135 | (1) |
|
|
135 | (1) |
|
Security in Job Definition and Resourcing |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Physical and Environmental Security |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Communications and Operations Management |
|
|
136 | (1) |
|
Operational Procedures and Responsibilities |
|
|
136 | (1) |
|
System Planning and Acceptance |
|
|
136 | (1) |
|
Protection from Malicious Software |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
Media Handling and Security |
|
|
137 | (1) |
|
Data and Software Exchange |
|
|
137 | (1) |
|
|
137 | (1) |
|
Business Requirement for System Access |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
Applications Access Control |
|
|
138 | (1) |
|
Monitoring System Access and use |
|
|
138 | (1) |
|
Systems Development and Maintenance |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
Security of Operational Files |
|
|
138 | (1) |
|
Security in Development and Support Environments |
|
|
138 | (1) |
|
Business Continuity Planning |
|
|
138 | (1) |
|
Aspects of Business Continuity Planning |
|
|
139 | (1) |
|
|
139 | (1) |
|
Compliance with Legal Requirements |
|
|
139 | (1) |
|
The SANS Security Policy Project |
|
|
139 | (1) |
|
Need an Example Policy or Template? |
|
|
139 | (1) |
|
|
139 | (1) |
|
Example Policy: SANS InfoSec Acceptable use Policy |
|
|
140 | (5) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
General Use and Ownership |
|
|
141 | (1) |
|
Security and Proprietary Information |
|
|
142 | (1) |
|
|
142 | (1) |
|
System and Network Activities |
|
|
142 | (2) |
|
E-mail and Communications Activities |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
145 | (2) |
|
|
147 | (2) |
|
Policy Issues and Fundamentals |
|
|
149 | (12) |
|
|
150 | (1) |
|
The Auditor's Role in Relation to Policy Creation and Compliance |
|
|
150 | (9) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
Intellectual Property Incident Handling Forms |
|
|
155 | (1) |
|
|
155 | (1) |
|
Compliance with Legal Requirements |
|
|
156 | (1) |
|
|
156 | (1) |
|
Third-Party and government Reviews |
|
|
156 | (1) |
|
System Audit Considerations |
|
|
157 | (1) |
|
Internal and External Standards |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
Human Resource (HR) Issues |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
Assessing Security Awareness and Knowledge of Policy |
|
|
161 | (34) |
|
|
162 | (1) |
|
Security Awareness and Training |
|
|
162 | (11) |
|
Awareness Programs Need to Be Implemented |
|
|
164 | (1) |
|
Scope, Goals, and Objectives |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
Development and Implementation of the Program |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
Education and Professional Development |
|
|
169 | (1) |
|
Objectives of an Awareness Program |
|
|
170 | (1) |
|
What is Information Security Awareness Training? |
|
|
170 | (1) |
|
Training Description and Scope |
|
|
170 | (1) |
|
|
171 | (1) |
|
Modify the Awareness Program if Required |
|
|
171 | (1) |
|
|
171 | (1) |
|
Security Awareness Resource Requirements |
|
|
171 | (1) |
|
Detailed Trainer Guide for Conducting The Workshops |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Guidelines for Use of Tools |
|
|
172 | (1) |
|
|
173 | (6) |
|
|
173 | (1) |
|
|
173 | (1) |
|
What Are The Issues: Slide 2 |
|
|
174 | (1) |
|
|
174 | (1) |
|
Dependence on Information Systems for Business Continuity |
|
|
174 | (1) |
|
Information Processing is No longer Centralized |
|
|
174 | (1) |
|
Greater Exposure to Accidents |
|
|
174 | (1) |
|
There is Also The Human Element |
|
|
174 | (1) |
|
|
175 | (1) |
|
What is Information? slide 3 |
|
|
175 | (1) |
|
What is Information Security - Slides 4-6 |
|
|
175 | (1) |
|
What is Information Security |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (10) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
Information Security Documentation: Slide 20 |
|
|
180 | (1) |
|
Information Security Procedures |
|
|
180 | (1) |
|
Information Security Procedures |
|
|
180 | (1) |
|
Frequently Asked Questions |
|
|
181 | (1) |
|
Your Role in Information Security: Slides 21-30 |
|
|
182 | (1) |
|
Why You Should Be Concerned About Informations Security |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
Password and USERID Controls |
|
|
183 | (1) |
|
Password Selection Techniques |
|
|
183 | (1) |
|
|
183 | (1) |
|
Secure Disposal of Information |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Secure Handling of Information |
|
|
185 | (1) |
|
There Are Legal Reasons Why You Should protect Organizational Information |
|
|
185 | (1) |
|
Operate A Clean Desk Policy |
|
|
185 | (1) |
|
Use Caution When Handling Visitors |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
Using The Organization's Computers at Home |
|
|
187 | (1) |
|
Bringing Your Own Home Computer To The Office |
|
|
187 | (1) |
|
|
188 | (1) |
|
The 10 Commandments of IT Security: Slides 31-32 |
|
|
188 | (1) |
|
The Future of Security: Slide 33 |
|
|
188 | (1) |
|
Identification Techniques |
|
|
188 | (1) |
|
|
189 | (1) |
|
Where to Get More Information: No slide at Present |
|
|
189 | (1) |
|
System Improvement Monitoring and Checks |
|
|
189 | (5) |
|
|
190 | (1) |
|
Testing Knowledge and Security Awareness |
|
|
191 | (1) |
|
Sample Managerial Assessment Interview Questionnaire |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
194 | (1) |
|
An Introduction to Network Audit |
|
|
195 | (34) |
|
|
196 | (1) |
|
What is a Vulnerabililty Assessment? |
|
|
196 | (1) |
|
The Importance of Vulnerability Assessments |
|
|
196 | (1) |
|
A Survey of Vulnerability Assessment Tools |
|
|
196 | (1) |
|
Nessus: The Leading Open Source Volnerability Assessment Tool |
|
|
196 | (1) |
|
NMAP: The King of Network Port Scanners |
|
|
196 | (1) |
|
THC-Amap: An Application Fingerprinting Scanner |
|
|
197 | (1) |
|
Paketto Keiretsu: Extreme TCP/IP |
|
|
197 | (1) |
|
|
197 | (1) |
|
NBTScan: GaThers NetBIOS Info from Windows Networks |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
197 | (5) |
|
|
198 | (3) |
|
What The Hackers Want to Know |
|
|
201 | (1) |
|
Auditing Perimeter Defenses |
|
|
201 | (1) |
|
Network Mapping from Outside Your firewall |
|
|
202 | (1) |
|
Network Mapping from Inside Your Firewall |
|
|
202 | (1) |
|
Auditing Routers, Switches, and OTher Network Infrastructure |
|
|
202 | (7) |
|
|
203 | (1) |
|
Gain an Understanding of Your System |
|
|
203 | (1) |
|
|
203 | (1) |
|
System Design, Configuration and Support Vulnerabililty Assessment |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
Why this Approach is Different |
|
|
206 | (1) |
|
|
206 | (1) |
|
Penetration Testing or Ethical Attacks Vs Protection Testing |
|
|
207 | (1) |
|
|
207 | (1) |
|
Server Operating System Security Analysis |
|
|
207 | (1) |
|
|
207 | (1) |
|
Phone/War dialing Audit Project tasks |
|
|
208 | (1) |
|
|
208 | (1) |
|
Network and Vulnerability Scanning |
|
|
209 | (18) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
Using this Feature to scan your network in background |
|
|
210 | (1) |
|
|
211 | (8) |
|
Using The feature to test your network automatically every ``X'' Hours |
|
|
219 | (1) |
|
Using The feature to keep one's KB up-to-date |
|
|
220 | (2) |
|
|
222 | (1) |
|
|
222 | (1) |
|
Before You Start Nessusd, Ensure That Sendmail is in Your $Path! |
|
|
222 | (1) |
|
Keeping your plugins Up-to-date |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
Essential Net Tools (EST) |
|
|
225 | (1) |
|
Cerberus Internet Scanner |
|
|
226 | (1) |
|
|
227 | (2) |
|
Auditing cisco Routers and Switches |
|
|
229 | (46) |
|
|
230 | (1) |
|
Functions of a Router, Its Arthitectures, and Components |
|
|
230 | (1) |
|
|
230 | (1) |
|
Configuration Files and States |
|
|
231 | (1) |
|
How a Router Can Play a Role in Your Security Infrastructure |
|
|
231 | (1) |
|
Router Technology: A TCP/IP Perspective |
|
|
232 | (1) |
|
Understanding The Auditing Issues with Routers |
|
|
232 | (5) |
|
|
233 | (1) |
|
Sevice Password Encryption |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
Controlling VVTYs and Ensuring VTY Availability |
|
|
234 | (1) |
|
|
235 | (1) |
|
Common Management Services |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Sample Router Architectures in Corporate WANs |
|
|
237 | (5) |
|
Router Audit Tool (RAT) and Nipper |
|
|
242 | (24) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (5) |
|
|
249 | (6) |
|
|
255 | (1) |
|
RAT Configuration Options |
|
|
255 | (1) |
|
Options for Downloading Device Configurations |
|
|
256 | (1) |
|
Options Affecting Rule Selection and Reporting |
|
|
256 | (1) |
|
Options for Selecting RAT Configuration files |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (3) |
|
Customizing The Parameter Settings in Nipper |
|
|
262 | (1) |
|
|
262 | (1) |
|
Modifying The nipper.ini File |
|
|
263 | (2) |
|
|
265 | (1) |
|
|
265 | (1) |
|
Cisco Security and Device Manager |
|
|
266 | (1) |
|
Security Access Controls Performed by a Router |
|
|
266 | (1) |
|
Security of The Router Itself and Auditing for Router Integrity |
|
|
267 | (2) |
|
Identifying Security Vulnerabilities |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (2) |
|
|
272 | (1) |
|
|
273 | (2) |
|
|
275 | (24) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
277 | (2) |
|
Working with Firewall Builder |
|
|
279 | (6) |
|
|
280 | (4) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Testing The Firewall Rulebase |
|
|
285 | (1) |
|
Identifying Misconfigurations |
|
|
286 | (1) |
|
Identifying Vulnerabilities |
|
|
286 | (2) |
|
Packet Flow from all Networks |
|
|
288 | (4) |
|
|
288 | (1) |
|
|
288 | (3) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (5) |
|
|
294 | (1) |
|
Automated Rulebase Validation |
|
|
294 | (1) |
|
|
294 | (1) |
|
CIS (Center for Internet Security) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (2) |
|
Auditing and Security with Wireless Technologies |
|
|
299 | (28) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
Capturing wireless Traffic |
|
|
301 | (3) |
|
|
301 | (2) |
|
|
303 | (1) |
|
Investigating rogue WLANs |
|
|
303 | (1) |
|
Conducting Wireless Site Surveys |
|
|
304 | (3) |
|
Using Maps to Document Wireless Signal Leakage |
|
|
305 | (1) |
|
Interference in Wireless Networks |
|
|
305 | (1) |
|
Sources of R F Interference |
|
|
306 | (1) |
|
Avoiding R F Interference |
|
|
306 | (1) |
|
Common Misconceptions with Wireless Security |
|
|
307 | (1) |
|
Passive WLAN Traffic Sniffing-from TCPDump to Kismet |
|
|
308 | (1) |
|
Techniques for Identifying and Locating Rogue AP's |
|
|
309 | (102) |
|
Wired-Side Analysis using AP Fingerprinting |
|
|
309 | (1) |
|
AP Fingerprinting using Nessus |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
Automating Centralized Wired-side Scanning for Rogue AP's |
|
|
310 | (1) |
|
Triangulation Techniques for Locating Transmitters |
|
|
310 | (1) |
|
Wireless ``Hacker'' Tools to Evaluate Your Network |
|
|
311 | (2) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
Designing and Deploying WLAN Intrusion Detection Services |
|
|
313 | (12) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
Wireless-Side Analysis - Wireless LAN IDS |
|
|
314 | (1) |
|
Continuous Rogue Detection |
|
|
315 | (1) |
|
Open-Source and Commercial Tools for WLAN Monitoring |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (3) |
|
|
319 | (1) |
|
|
319 | (1) |
|
Distributed Stationary Analysis with Lightweight Hardware (drone) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (4) |
|
The Backtrack Network Security Suite Linux Distribution |
|
|
324 | (1) |
|
|
325 | (2) |
|
|
327 | (20) |
|
|
328 | (1) |
|
Organizing The Mapping Results |
|
|
328 | (2) |
|
|
328 | (1) |
|
|
329 | (1) |
|
ScanPBNJ default scan options |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
Identifying Vulnerabilities |
|
|
331 | (1) |
|
|
332 | (14) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
Prioritizing Vulnerability Fixes |
|
|
333 | (1) |
|
|
334 | (1) |
|
NAC (Network Access Control) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
Benefits of Periodic Network Mapping |
|
|
335 | (3) |
|
Looking for Compromised Hosts |
|
|
338 | (1) |
|
configuration Auditing of Key Network Services (DNS, SMTP, etc.) |
|
|
338 | (2) |
|
|
340 | (2) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (3) |
|
|
346 | (1) |
|
|
346 | (1) |
|
An Introduction to Systems Auditing |
|
|
347 | (24) |
|
|
348 | (1) |
|
Automating The Audit Process |
|
|
349 | (1) |
|
Running a Network Scanner at Scheduled Times |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
Progressive Construction of a Comprehensive Audit Program |
|
|
350 | (1) |
|
|
350 | (1) |
|
Big BroTher (www.bb4.org/) |
|
|
350 | (1) |
|
|
350 | (6) |
|
Turning Off Unnecessary Services |
|
|
350 | (1) |
|
|
351 | (1) |
|
Turning Off Services in Windows |
|
|
351 | (1) |
|
Turning Off Services in UNIX |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
Install and Configure ``Bruce'' |
|
|
352 | (1) |
|
Process change Detection System |
|
|
352 | (1) |
|
|
352 | (1) |
|
Known Vulnerabilities and Exploits |
|
|
353 | (1) |
|
|
353 | (2) |
|
Example Information Systems Security Patch Release Procedures |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
Physical, Electronic and Environmental Security |
|
|
356 | (13) |
|
Secured Zones and Appropriate Levels of Security |
|
|
356 | (1) |
|
Physical Security Barriers |
|
|
357 | (1) |
|
Location of Critical Services |
|
|
357 | (1) |
|
Electronic Intruder Detection Systems |
|
|
357 | (1) |
|
Security of organization Property Off-Premises |
|
|
357 | (1) |
|
|
358 | (1) |
|
Computer and Network Management |
|
|
358 | (1) |
|
Operational Procedures and Responsibilities |
|
|
358 | (1) |
|
Documented Operating Procedures |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
Segregation of Development and Production |
|
|
359 | (1) |
|
|
359 | (1) |
|
System Management Controls |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
360 | (1) |
|
Security/Integrity Maintenance |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
Network Security Controls |
|
|
363 | (1) |
|
Media Handling and Security |
|
|
363 | (1) |
|
Management of Removable Media |
|
|
363 | (1) |
|
Security of System Documentation |
|
|
363 | (1) |
|
Banking and Payment Security |
|
|
364 | (1) |
|
Security of Office Automation Systems |
|
|
364 | (1) |
|
|
364 | (1) |
|
Business Driven Access Restrictions |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
Default and System Passwords |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
Safeguarding of The organization Records |
|
|
367 | (1) |
|
Privacy of Individuals' Information |
|
|
367 | (1) |
|
|
367 | (1) |
|
Audit Logging and Reporting |
|
|
367 | (1) |
|
Protection of Audit/Account Elements |
|
|
368 | (1) |
|
|
368 | (1) |
|
IT Compliance with Security Policy |
|
|
368 | (1) |
|
|
368 | (1) |
|
Reporting of Security Weaknesses and Incidents |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
371 | (24) |
|
|
372 | (1) |
|
|
372 | (10) |
|
Principles for Developing a Database Audit Strategy |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
Update, Delete, and Insert Triggers |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
Auditing Changes to The Database Structure |
|
|
374 | (1) |
|
Audit any Use of System Privileges |
|
|
375 | (1) |
|
Audit Data changes to Objects |
|
|
375 | (1) |
|
|
375 | (1) |
|
Attempts to Access The Database with Nonexistent Users |
|
|
375 | (1) |
|
Attempts to Access The Database at Unusual Hours |
|
|
375 | (1) |
|
Check for users Sharing Database Accounts |
|
|
375 | (1) |
|
Multiple Access Attempts for Different Users from The Same Terminal |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
Client Service Security and Databases |
|
|
378 | (1) |
|
Automated Database Audit Solutions |
|
|
379 | (2) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (5) |
|
Specialized Audit software |
|
|
382 | (1) |
|
CASE (Computer-Aided Software Engineering) Tools |
|
|
383 | (4) |
|
Vulnerability Assessment Tools |
|
|
387 | (1) |
|
|
387 | (2) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (2) |
|
|
391 | (2) |
|
|
391 | (1) |
|
CIS (The Center for Internet Security) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
Considerations in SQL Auditing |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
393 | (2) |
|
Microsoft Windows Security and Audits |
|
|
395 | (70) |
|
|
396 | (1) |
|
|
396 | (13) |
|
Windows System Information(WSI) |
|
|
396 | (1) |
|
|
397 | (3) |
|
|
400 | (7) |
|
Software and Licensing in Hyena |
|
|
407 | (1) |
|
|
407 | (2) |
|
|
409 | (8) |
|
Microsoft Baseline Security Analyzer (MBSA) |
|
|
409 | (3) |
|
How to Scan for Patch Levels Using MBSA |
|
|
412 | (1) |
|
How to Interpret the MBSA Scan Reports |
|
|
413 | (1) |
|
For the Security Update Checks |
|
|
413 | (1) |
|
For the administrative vulnerability checks |
|
|
414 | (1) |
|
Qfecheck and Hotfix Reports |
|
|
414 | (1) |
|
Downloading and Installing Qfecheck |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
417 | (7) |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
419 | (2) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
424 | (3) |
|
|
424 | (1) |
|
|
425 | (1) |
|
Running PsTools in the local host |
|
|
426 | (1) |
|
Running PsTools in a remote host |
|
|
427 | (1) |
|
|
427 | (1) |
|
Using Add or Remove Programs |
|
|
427 | (1) |
|
Software Asset Manager (SAM) |
|
|
428 | (1) |
|
|
428 | (14) |
|
Microsoft Management Console (MMC) |
|
|
429 | (2) |
|
Customizing the Display of Snap-ins in the Console: New Windows |
|
|
431 | (4) |
|
Using the Security configuration and Analysis (SCA) |
|
|
435 | (1) |
|
|
435 | (1) |
|
Creating and using template databases with SCA |
|
|
436 | (2) |
|
|
438 | (3) |
|
Correcting System Security |
|
|
441 | (1) |
|
Using Local Security Policy (LSP) |
|
|
441 | (1) |
|
Using Center for Internet Security (CIS) Benchmarks |
|
|
442 | (1) |
|
|
442 | (10) |
|
|
443 | (1) |
|
|
443 | (1) |
|
How to use Active Directory |
|
|
443 | (2) |
|
|
445 | (4) |
|
Using Resultant Set of Policy (RSoP) |
|
|
449 | (3) |
|
Service Packs, Patches and Backups |
|
|
452 | (2) |
|
|
452 | (1) |
|
Hotfixes, Fixes, Patches, Updates and Work-Around's |
|
|
453 | (1) |
|
|
453 | (1) |
|
Windows Software Update Services (WSUS) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
Log Aggregation, management and analysis |
|
|
454 | (6) |
|
|
454 | (2) |
|
|
456 | (2) |
|
|
458 | (1) |
|
|
459 | (1) |
|
Maintaining a Secure Enterprise |
|
|
460 | (1) |
|
Scheduling Automated Tasks |
|
|
460 | (1) |
|
|
460 | (3) |
|
CIS (The Center for Internet Security) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
461 | (1) |
|
Considerations in Windows Auditing |
|
|
461 | (2) |
|
|
463 | (2) |
|
|
465 | (50) |
|
|
466 | (1) |
|
Patching and Software Installation |
|
|
467 | (7) |
|
|
467 | (1) |
|
Obtaining and Installing System Patches |
|
|
468 | (1) |
|
Validating the Patch Process |
|
|
469 | (2) |
|
|
471 | (1) |
|
Example Information Systems Security Patch Release procedures |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
473 | (1) |
|
Vendor Contacts/Patch Sources |
|
|
473 | (1) |
|
Minimizing System Services |
|
|
474 | (6) |
|
Guidance for Network Services |
|
|
474 | (1) |
|
|
475 | (1) |
|
Turning Off Services in UNIX |
|
|
475 | (1) |
|
|
475 | (1) |
|
Controlling Services at Boot Time |
|
|
476 | (1) |
|
|
477 | (1) |
|
Authentication and Validation |
|
|
477 | (3) |
|
|
480 | (6) |
|
Syslog and Other Standard Logs |
|
|
480 | (2) |
|
System Accounting and Process Accounting |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
Automatic Accounting Commands |
|
|
484 | (1) |
|
System Accounting Commands that can be Run Automatically or Manually |
|
|
485 | (1) |
|
Manually Executed Commands |
|
|
485 | (1) |
|
File System Access Control |
|
|
486 | (5) |
|
|
488 | (1) |
|
Special Permissions that are set for a file or Directory on the Whole, Not by a Class |
|
|
489 | (1) |
|
The Set user, ID, setuid, or SUID permission |
|
|
489 | (1) |
|
The set group ID, setgid, or SGID permission |
|
|
489 | (1) |
|
|
489 | (1) |
|
UNIX command is for file permissions |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
``man'' the UNIX online Manual |
|
|
490 | (1) |
|
Usernames, UIDS, the Superuser |
|
|
490 | (1) |
|
Blocking Accounts, Expiration, etc |
|
|
490 | (1) |
|
Restricting Superuser Access |
|
|
491 | (1) |
|
|
491 | (1) |
|
Additional Security Configuration |
|
|
491 | (8) |
|
|
492 | (1) |
|
Use tcpd to limit access to your machine |
|
|
492 | (1) |
|
Use ssh instead of telnet, rlogin, rsh and rcp |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
Kernel Tuning for Security |
|
|
495 | (1) |
|
|
495 | (1) |
|
Solaris Kernel Parameters |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
496 | (1) |
|
|
497 | (1) |
|
Security for the cron System |
|
|
498 | (1) |
|
|
499 | (2) |
|
|
499 | (1) |
|
|
499 | (1) |
|
Compressing and Uncompressing tar images |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
Auditing to Create a Secure Configuration |
|
|
501 | (8) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
Building Your Own Auditing Toolkit |
|
|
502 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
File Integrity Assessment |
|
|
504 | (1) |
|
|
504 | (1) |
|
Operating Sytem Integrity |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (2) |
|
|
507 | (1) |
|
|
507 | (1) |
|
A Summary of the Find Command |
|
|
508 | (1) |
|
Auditing to Maintain a Secure Configuration |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
Password Assessment Tools |
|
|
510 | (1) |
|
|
510 | (2) |
|
CIS (The Center for Internet Security) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
511 | (1) |
|
Considerations in UNIX Auditing |
|
|
512 | (3) |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
Auditing Web-Based Applications |
|
|
515 | (46) |
|
|
516 | (10) |
|
|
516 | (2) |
|
|
518 | (1) |
|
|
518 | (1) |
|
Limitations with the Web Browser |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
HTTP Basic Authentication |
|
|
520 | (1) |
|
HTTP Digest Authentication |
|
|
520 | (2) |
|
HTTP Forms-Based Authentication |
|
|
522 | (1) |
|
HTTP Certificate Based Authentication |
|
|
522 | (1) |
|
HTTP Entity Authentication (Cookies) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (1) |
|
Persistent Cookie (File Based and Stored on Hard Drive) |
|
|
523 | (1) |
|
Session Cookie (Memory Based) |
|
|
523 | (1) |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
Information-Gathering Attacks |
|
|
526 | (2) |
|
|
528 | (1) |
|
User Name Harvesting/Password Harvesting |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (1) |
|
Os and Web Server Weakness |
|
|
529 | (2) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
531 | (1) |
|
Session Tracking and Management |
|
|
532 | (2) |
|
|
533 | (1) |
|
Cryptographic Algorithms for Session Tokens |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
Regeneration of Session Tokens |
|
|
533 | (1) |
|
Session Forging/Brute-Forcing Detection and/or Lockout |
|
|
533 | (1) |
|
Session Re-Authentication |
|
|
533 | (1) |
|
Session token Transmission |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
Open Web Application Security Project |
|
|
535 | (6) |
|
|
535 | (1) |
|
Cross Site Scripting (XSS) |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
536 | (1) |
|
Insecure Direct Object Reference |
|
|
536 | (1) |
|
Cross Site Request Forgery (CSRF) |
|
|
536 | (1) |
|
Information Leakage and Improper Error Handling |
|
|
536 | (1) |
|
Broken Authentication and Session Management |
|
|
536 | (1) |
|
Insecure Cryptographic Storage |
|
|
536 | (1) |
|
|
536 | (1) |
|
Failure to Restrict URL Access |
|
|
537 | (1) |
|
|
537 | (1) |
|
|
537 | (1) |
|
Web Vulnerability Database |
|
|
538 | (1) |
|
WebScarab Web Auditing Tool |
|
|
538 | (2) |
|
|
540 | (1) |
|
|
540 | (1) |
|
|
541 | (1) |
|
|
541 | (4) |
|
Cookie Theft Javascript Examples |
|
|
541 | (1) |
|
|
541 | (1) |
|
|
542 | (1) |
|
Cookie Stealing Code Snippet |
|
|
543 | (1) |
|
|
543 | (1) |
|
Is a Web Server Vulnerable? |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
543 | (1) |
|
XSS (Cross Site Scripting) Cheat Sheet |
|
|
544 | (1) |
|
|
545 | (11) |
|
What is the Same-Origin Policy? |
|
|
546 | (1) |
|
|
547 | (2) |
|
Anti-DNS Pinning (Re-Binding) |
|
|
549 | (2) |
|
|
551 | (1) |
|
Anti Anti Anti DNS Pinning |
|
|
551 | (1) |
|
The First Question Is Why? |
|
|
552 | (1) |
|
Varieties of DNS Rebinding attacks |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
Browser wants an internal IP external but it gets internal address |
|
|
553 | (1) |
|
Flash/Java wants an internal address but receives an external one |
|
|
553 | (1) |
|
Ridiculous or Farfetched? |
|
|
553 | (1) |
|
CNiping (Pronounced ``Sniping'') |
|
|
553 | (1) |
|
What are Open Network Proxies? |
|
|
554 | (1) |
|
|
554 | (1) |
|
|
554 | (1) |
|
|
555 | (1) |
|
Defending Against DNS Rebinding |
|
|
555 | (1) |
|
Powf (Passing Fingerprinting of Web Content Frameworks) |
|
|
556 | (1) |
|
|
556 | (5) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
CIS (The Center for Internet Security) |
|
|
558 | (1) |
|
|
558 | (1) |
|
|
558 | (1) |
|
Considerations in Web Auditing |
|
|
559 | (1) |
|
IIS Specific Information for the Checklist |
|
|
559 | (1) |
|
Apache Specific Information for the Checklist |
|
|
560 | (1) |
|
|
560 | (1) |
|
|
561 | (16) |
|
|
562 | (1) |
|
Mainframes and Legacy Systems |
|
|
562 | (6) |
|
|
563 | (1) |
|
|
564 | (1) |
|
Reviewing Legacy and Mainframe Systems |
|
|
565 | (2) |
|
|
567 | (1) |
|
|
567 | (1) |
|
|
568 | (3) |
|
|
568 | (1) |
|
|
568 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
FurTher information about UML |
|
|
570 | (1) |
|
Code Reviews and Testing third-Party Software |
|
|
571 | (3) |
|
|
571 | (1) |
|
|
571 | (1) |
|
|
572 | (1) |
|
The Various Levels of Testing |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
574 | (2) |
|
|
576 | (1) |
|
Risk Management, Security Compliance, and Audit Controols |
|
|
577 | (32) |
|
|
578 | (1) |
|
|
578 | (1) |
|
|
578 | (1) |
|
|
578 | (1) |
|
|
578 | (1) |
|
|
578 | (1) |
|
|
579 | (6) |
|
Implementing a Risk Mitigation Strategy |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
Risk Management, Security Compliance and Audit Controls |
|
|
580 | (1) |
|
Risk Analysis: Techniques and methods |
|
|
581 | (1) |
|
|
581 | (1) |
|
|
581 | (1) |
|
|
581 | (1) |
|
|
581 | (1) |
|
Placing a Value on Risk Management |
|
|
582 | (1) |
|
|
582 | (1) |
|
|
582 | (1) |
|
|
582 | (1) |
|
ALE-Annualized Factor (or likelilhood factor) |
|
|
583 | (1) |
|
EF - Exposure Factor (or likelihood factor) |
|
|
583 | (1) |
|
SLE - Single Loss Expectancy |
|
|
583 | (1) |
|
ARO - Annualized Rate of Occurance |
|
|
583 | (1) |
|
|
583 | (1) |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
585 | (1) |
|
|
586 | (1) |
|
CCA - Cause Consequence Analysis |
|
|
586 | (11) |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
589 | (2) |
|
Acquire Bogus User Credentials |
|
|
591 | (1) |
|
|
591 | (2) |
|
|
593 | (1) |
|
Intercept a Network Connection for a particular user |
|
|
593 | (1) |
|
Denial of service against a partiular user or all users |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
Time-Based Analysis (TBA) |
|
|
595 | (1) |
|
|
595 | (1) |
|
Some Existing Tools for Risk Analysis |
|
|
596 | (1) |
|
|
596 | (1) |
|
|
597 | (1) |
|
|
597 | (1) |
|
|
597 | (1) |
|
Creating an Information Systems Risk Program |
|
|
597 | (6) |
|
|
598 | (1) |
|
|
599 | (1) |
|
Preparation and Identification |
|
|
600 | (1) |
|
Current Business Practices |
|
|
600 | (1) |
|
|
600 | (1) |
|
Identification of Information Assets |
|
|
600 | (1) |
|
|
600 | (1) |
|
|
600 | (1) |
|
Security Architure Analysis |
|
|
601 | (1) |
|
Requird Security Architecture |
|
|
601 | (1) |
|
Identification of Current Security Architecture |
|
|
601 | (1) |
|
|
601 | (1) |
|
|
601 | (1) |
|
|
601 | (1) |
|
|
601 | (1) |
|
|
601 | (1) |
|
|
602 | (1) |
|
Assessment and Conclusion |
|
|
602 | (1) |
|
|
602 | (1) |
|
Risk Managements is an Issue for Management, no Technology |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (2) |
|
Counter Strategy and Counter Measures |
|
|
604 | (1) |
|
|
605 | (1) |
|
|
606 | (1) |
|
|
606 | (1) |
|
|
607 | (2) |
|
|
607 | (2) |
|
Information Systems Legilation |
|
|
609 | (64) |
|
|
610 | (1) |
|
|
610 | (1) |
|
|
611 | (10) |
|
|
612 | (1) |
|
Problems with Electronic Contracting |
|
|
613 | (1) |
|
|
614 | (1) |
|
The Postal Acceptance Rule |
|
|
615 | (1) |
|
|
616 | (1) |
|
Invitation to Treat, Offers and Acceptance |
|
|
617 | (2) |
|
|
619 | (1) |
|
|
620 | (1) |
|
Acceptance in Unilateral Contracts |
|
|
621 | (1) |
|
Other Issues in Contractual Formation that Impact Offer and Acceptance |
|
|
621 | (1) |
|
Jurisdiction and Communication of Acceptance |
|
|
621 | (1) |
|
|
621 | (12) |
|
|
622 | (1) |
|
|
623 | (1) |
|
|
624 | (1) |
|
|
624 | (1) |
|
|
625 | (1) |
|
|
626 | (1) |
|
Hate Crimes, Defamation and The Things We Say |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
628 | (3) |
|
|
631 | (1) |
|
E-mail Crimes and Violations |
|
|
631 | (1) |
|
|
631 | (1) |
|
|
631 | (1) |
|
|
631 | (1) |
|
|
632 | (1) |
|
|
632 | (1) |
|
Distributing a Virus or OTher Malware |
|
|
632 | (1) |
|
Defamation and Injurious Falsehood |
|
|
633 | (1) |
|
Harassment and Cyber Stalking |
|
|
634 | (1) |
|
|
635 | (3) |
|
Child Pornography and Obscenity |
|
|
636 | (2) |
|
|
638 | (1) |
|
Searches and The Fourth Amendment |
|
|
639 | (2) |
|
|
640 | (1) |
|
Anton Piller (Civil Search) |
|
|
640 | (1) |
|
|
641 | (1) |
|
|
641 | (1) |
|
|
641 | (6) |
|
|
642 | (2) |
|
Investigating Copyright Status |
|
|
644 | (1) |
|
|
645 | (1) |
|
Patents and Patent Infringement |
|
|
646 | (1) |
|
|
647 | (1) |
|
Interpol and Information Technology Crime |
|
|
648 | (6) |
|
Remedy in Tort and Civil Suits |
|
|
648 | (1) |
|
|
649 | (2) |
|
|
651 | (1) |
|
|
651 | (2) |
|
|
653 | (1) |
|
|
654 | (1) |
|
|
655 | (5) |
|
Introduction to Document Management Policy |
|
|
655 | (1) |
|
Applications to Internal Audit |
|
|
656 | (1) |
|
Minimum Document Retention Guidelines |
|
|
657 | (1) |
|
|
658 | (1) |
|
|
658 | (1) |
|
The Health Insurance Portability Accountability Act |
|
|
658 | (1) |
|
|
658 | (1) |
|
Destruction of Adverse Documents |
|
|
659 | (1) |
|
The Litigation Process of discovery |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
Due Care and Due Diligence |
|
|
660 | (1) |
|
|
660 | (1) |
|
Reviewing and Auditing Contracts |
|
|
660 | (1) |
|
Issues with Electronic Contracting |
|
|
661 | (1) |
|
|
661 | (1) |
|
|
662 | (11) |
|
|
662 | (11) |
|
|
673 | (22) |
|
|
674 | (2) |
|
The Concepts of Organizational OPSEC (Operation Security) |
|
|
674 | (2) |
|
Administrative Management |
|
|
676 | (8) |
|
|
677 | (1) |
|
|
678 | (1) |
|
|
679 | (1) |
|
Deterrent (or Directive) Controls |
|
|
679 | (1) |
|
|
679 | (1) |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
681 | (1) |
|
|
681 | (1) |
|
|
681 | (1) |
|
|
681 | (1) |
|
|
681 | (1) |
|
Hardware Inventory and Configuration |
|
|
681 | (1) |
|
|
681 | (1) |
|
Configuration Change Management (CCM) |
|
|
682 | (1) |
|
|
683 | (1) |
|
Individual Accountability |
|
|
684 | (1) |
|
Group vs. Individual Accountability |
|
|
684 | (1) |
|
|
684 | (1) |
|
|
684 | (1) |
|
|
685 | (2) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
686 | (1) |
|
Hardware Physical Control |
|
|
686 | (1) |
|
Protection of Operational Files |
|
|
687 | (1) |
|
|
687 | (3) |
|
|
688 | (1) |
|
|
689 | (1) |
|
Inform the Appropriate People |
|
|
689 | (1) |
|
|
689 | (1) |
|
Auditing to Determine What Went Wrong |
|
|
690 | (3) |
|
|
690 | (1) |
|
Evidence of Past Incidents |
|
|
691 | (1) |
|
|
691 | (1) |
|
|
692 | (1) |
|
|
693 | (2) |
|
|
693 | (2) |
Index |
|
695 | |