'Security'에 해당되는 글 19건

  1. 2008.12.09 Apple's Security Paradox by CEOinIRVINE
  2. 2008.12.09 China irks US with computer security review rules by CEOinIRVINE
  3. 2008.12.04 Security Job by CEOinIRVINE
  4. 2008.12.04 Apple's Security Paradox by CEOinIRVINE
  5. 2008.11.29 Creating a Computer Security Incident Response Team: A Process for Getting Started by CEOinIRVINE
  6. 2008.11.22 Network Security Breaches Plague NASA by CEOinIRVINE
  7. 2008.11.21 Comercial Vulnerability Alerts by CEOinIRVINE
  8. 2008.11.17 Iraqi Cabinet Approves Security Pact With U.S. by CEOinIRVINE
  9. 2008.11.16 Iraq: Negotiators agree on US security pact draft by CEOinIRVINE

Apple's Security Paradox

Business 2008. 12. 9. 03:20

Even as Macs have multiplied, the number of viruses and Trojans targeting them has fallen.

As Apple's slice of the computer market grows, cyber security researchers have long warned that hackers would someday turn their attention away from PCs and toward innocent Macbooks and iPhones.

That day, it turns out, has yet to come. But virus-fearing Apple (nasdaq: AAPL - news - people ) fans could be forgiven for thinking it had.

On Monday, Washington Post blogger Brian Krebs wrote that Apple had "quietly published" a note on its technical support site recommending Apple users install antivirus software. In fact, the recommendation had been on Apple's site for more than a year. But other blogs and media outlets took the Post's story as evidence that Apple computers have finally lost the "immunity" to viruses and other malicious code that the company touts in its "Mac vs. PC" ads.

On Tuesday evening, Apple deleted the antivirus recommendation, writing in a statement to the press that it was "old and inaccurate," and reiterating the claim that Apple devices are safe "right out of the box."

That sounds like a bold statement--but at least for now, it's also true, say security researchers.

Even as Apple's share of the computer market has risen, the incidence of viruses and Trojans has--surprise--gone down. In the last six months, Finnish cyber security firm, F-Secure, has detected 13 new samples of malicious software, or "malware," targeting Apple's OS X operating system.

By contrast, every day F-Secure pulls from the Internet between 20,000 and 30,000 new samples of malicious code aimed at PCs. "I can't even calculate the percentage that targets Macs," says Patrik Runald, a researcher with F-Secure. "It's peanuts."


'Business' 카테고리의 다른 글

Businesses Move To Voice-Over-IP  (0) 2008.12.10
Microsoft opens Swiss R&D center for Voice-over-IP  (0) 2008.12.10
The Strong Get Stronger In Recession  (0) 2008.12.09
Ditch Your TV  (0) 2008.12.09
Dow Chemical to close facilities, cut 5,000 jobs  (0) 2008.12.09
Posted by CEOinIRVINE
l

The Chinese government is stirring trade tensions with Washington with a plan to require foreign computer security technology to be submitted for government approval, in a move that might require suppliers to disclose business secrets.

Rules due to take effect May 1 require official certification of technology widely used to keep e-mail and company data networks secure. Beijing has yet to say how many secrets companies must disclose about such sensitive matters as how data-encryption systems work. But Washington complains the requirement might hinder imports in a market dominated by U.S. companies, and is pressing Beijing to scrap it.

"There are still opportunities to defuse this, but it is getting down to the wire," said Duncan Clark, managing director of BDA China Ltd., a Beijing technology consulting firm. "It affects trade. It's potentially really wide-scale."

Beijing tried earlier to force foreign companies to reveal how encryption systems work and has promoted its own standards for mobile phones and wireless encryption.

Those attempts and the new demand reflect Beijing's unease about letting the public keep secrets, and the government's efforts to use its regulatory system to help fledgling Chinese high-tech companies compete with global high-tech rivals. Yin Changlai, the head of a Chinese business group sanctioned by the government, has acknowledged that the rules are meant to help develop China's infant computer security industry by shielding companies from foreign rivals that he said control 70 percent of the market.

The computer security rules cover 13 types of hardware and software, including database and network security systems, secure routers, data backup and recovery systems and anti-spam and anti-hacking software. Such technology is enmeshed in products sold by Microsoft Corp. (nasdaq: MSFT - news - people ), Cisco Systems Inc. (nasdaq: CSCO - news - people ) and other industry giants.

Giving regulators the power to reject foreign technologies could help to promote sales of Chinese alternatives. But that might disrupt foreign manufacturing, research or data processing in China if companies have to switch technologies or move operations to other countries to avoid the controls. Requiring disclosure of technical details also might help Beijing read encrypted e-mail or create competing products.





Posted by CEOinIRVINE
l

Security Job

Hacking 2008. 12. 4. 12:41

Rank 544 658
Rank change on same period last year Up+114
Matching permanent IT job ads 331 333
As % of all UK permanent IT job ads sampled 0.222 % 0.151 %
As % of the category below 0.378 % 0.273 %
Salaries quoted 260 245
Average minimum salary £49,504 £47,462
Average salary £55,087 £53,437
% change on same period last year +3.08 %
Average maximum salary £60,670 £59,412
UK excluding London average salary £53,532 £52,738
% change on same period last year +1.50 %
IT Job Market, Processes & Methodologies Processes & Methodologies
UK
Matching permanent IT job ads 87580 122189
As % of all UK permanent IT job ads sampled 58.83 % 55.45 %
Salaries quoted 73512 98005
Average minimum salary £42,973 £44,478
Average salary £46,983 £48,593
% change on same period last year -3.31 %
Average maximum salary £50,994 £52,707
UK excluding London average salary £42,938 £44,651
% change on same period last year -3.83 %

Penetration Testing
Demand Trend

The chart provides the 3-month moving total beginning in 2004 of permanent IT jobs citing Penetration Testing within the UK as a proportion of the total demand within the Processes & Methodologies category.

Penetration Testing Demand Trend

Penetration Testing
Salary Trend

The chart provides the 3-month moving average for salaries quoted in permanent IT jobs citing Penetration Testing within the UK.

Penetration Testing Salary Trend

Penetration Testing
Salary Histogram

The chart provides a salary histogram for IT jobs citing Penetration Testing over the 3 months to 3 December 2008 within the UK.

Penetration Testing Salary Histogram

Penetration Testing
Top 30 Job Locations

The table below looks at the demand and provides a guide to the average salaries quoted in IT jobs citing Penetration Testing within the UK over the 3 months to 3 December 2008. The 'Rank Change' column provides an indication of the change in demand within each location based on the same 3 month period last year. A positive number indicates a relative increase in demand.

Location Rank Change
on Same Period
Last Last
Matching
Permanent
IT Job Ads
Average Salary
Last 3 Months
Average Salary
% Change
on Same Period
Last Year
England Up+137 312 £55,205 +7.46 %
South East Up+122 98 £58,093 +17.60 %
London Up+79 94 £58,864 +8.30 %
West Sussex New entry- 41 £66,220 -
Gatwick New entry- 41 £66,220 -
North West Up+28 31 £43,542 -10.44 %
Manchester Up+17 28 £43,571 -9.15 %
South West Up+18 24 £47,250 -24.40 %
Yorkshire Up+41 23 £42,900 +7.79 %
West Yorkshire Up+22 21 £42,375 +6.47 %
Berkshire Up+56 18 £51,885 -20.48 %
City of London Down-12 17 £57,917 +27.16 %
West Midlands Up+18 15 £48,889 +33.94 %
East of England Up+46 14 £51,727 +18.00 %
Hampshire Up+26 14 £43,846 +3.77 %
Somerset Down-24 13 - -
Bath Down-26 13 - -
Leeds Up+20 11 £41,667 +4.69 %
Surrey Up+44 9 £50,056 +2.85 %
Hammersmith New entry- 8 £37,500 -
Staffordshire Up+9 7 £48,333 -
Worcestershire New entry- 5 - -
Cambridge Up+15 5 £45,000 +23.71 %
Canary Wharf New entry- 5 £69,000 -
Essex New entry- 5 £61,000 -
Cambridgeshire Up+26 5 £45,000 +23.71 %
Hertfordshire Up+15 4 £43,000 -26.80 %
Reading Up+6 4 £46,250 -33.24 %
Cheltenham New entry- 4 £45,000 -
Watford New entry- 4 £43,000 -

Penetration Testing
Top 30 Related IT Skills

For the 6 months to 3 December 2008, IT jobs within the UK citing Penetration Testing also mentioned the following IT skills in order of popularity. The figures indicate the number of jobs and their proportion against the total number of IT job ads sampled that cited Penetration Testing.

1 212 (29.65 %) Information Security
2 210 (29.37 %) CISSP
3 183 (25.59 %) Network Security
4 174 (24.34 %) Firewall
5 129 (18.04 %) Finance
6 124 (17.34 %) Security Testing
7 113 (15.80 %) Degree
8 101 (14.13 %) Cisco
9 99 (13.85 %) UNIX
10 90 (12.59 %) TCP/IP
11 88 (12.31 %) ISO27001
12 86 (12.03 %) PCI DSS
13 85 (11.89 %) Security Cleared
14 81 (11.33 %) Windows
15 76 (10.63 %) Risk Assessment
16 72 (10.07 %) Linux
17 71 (9.930 %) Microsoft
17 71 (9.930 %) Government
18 66 (9.231 %) Security Management
18 66 (9.231 %) Internet
19 65 (9.091 %) Ethical Hacking
20 64 (8.951 %) SC Cleared
21 62 (8.671 %) Perl
22 61 (8.531 %) Risk Management
23 60 (8.392 %) Java
24 59 (8.252 %) VPN
25 54 (7.552 %) Cisco Certification
26 51 (7.133 %) CheckPoint
26 51 (7.133 %) Telecoms
27 49 (6.853 %) CISM

Penetration Testing
Top Related IT Skills by Category

For the 6 months to 3 December 2008, IT jobs within the UK citing Penetration Testing also mentioned the following IT skills grouped by category. The figures indicate the number of jobs and their proportion against the total number of IT job ads sampled that cited Penetration Testing. Up to 20 skills are shown per category.

IT Job Market, Application DevelopmentApplication Development
1 34 (4.755 %) .NET
2 20 (2.797 %) CSS
2 20 (2.797 %) Ruby on Rails
3 16 (2.238 %) ASP.NET
4 12 (1.678 %) WebServices
5 7 (0.979 %) XML
6 6 (0.839 %) JSP
7 5 (0.699 %) WebSphere
8 4 (0.559 %) Java ME
8 4 (0.559 %) AJAX
9 3 (0.420 %) Spring
9 3 (0.420 %) SOAP
9 3 (0.420 %) Struts
9 3 (0.420 %) J2EE
9 3 (0.420 %) ASP
10 2 (0.280 %) HTML
10 2 (0.280 %) Java SE
10 2 (0.280 %) FIX Protocol
10 2 (0.280 %) CGI
10 2 (0.280 %) LAMP
IT Job Market, Application PlatformsApplication Platforms
1 7 (0.979 %) IIS
2 4 (0.559 %) MS Exchange
2 4 (0.559 %) WebLogic
3 3 (0.420 %) Apache
3 3 (0.420 %) SharePoint
4 1 (0.140 %) ColdFusion
4 1 (0.140 %) Exchange Server 2003
IT Job Market, ApplicationsApplications
1 17 (2.378 %) MS Excel
2 15 (2.098 %) MS Office
IT Job Market, Communications & NetworkingCommunications & Networking
1 183 (25.59 %) Network Security
2 174 (24.34 %) Firewall
3 90 (12.59 %) TCP/IP
4 66 (9.231 %) Internet
5 59 (8.252 %) VPN
6 44 (6.154 %) Intrusion Detection
7 40 (5.594 %) LAN
8 33 (4.615 %) Wireless
9 32 (4.476 %) VoIP
10 31 (4.336 %) WAN
11 27 (3.776 %) Cisco PIX
12 23 (3.217 %) NetScreen
13 18 (2.517 %) LDAP
14 17 (2.378 %) H.323
14 17 (2.378 %) Cisco IOS
15 16 (2.238 %) IPsec
15 16 (2.238 %) SSL
15 16 (2.238 %) WLAN
16 15 (2.098 %) HTTP
17 12 (1.678 %) FTP
IT Job Market, Database & Business IntelligenceDatabase & Business Intelligence
1 49 (6.853 %) GIS
2 36 (5.035 %) SQL Server
3 20 (2.797 %) MySQL
4 15 (2.098 %) DB2
5 11 (1.538 %) Oracle 8/8i
IT Job Market, Development ApplicationsDevelopment Applications
1 17 (2.378 %) Paros
1 17 (2.378 %) Metasploit
2 5 (0.699 %) AppScan
3 3 (0.420 %) LoadRunner
4 2 (0.280 %) Rational Robot
4 2 (0.280 %) JMeter
4 2 (0.280 %) QuickTest Pro
4 2 (0.280 %) SilkTest
4 2 (0.280 %) QARun
4 2 (0.280 %) WATIR
4 2 (0.280 %) Selenium
4 2 (0.280 %) WebLOAD
4 2 (0.280 %) FitNesse
IT Job Market, GeneralGeneral
1 129 (18.04 %) Finance
2 71 (9.930 %) Government
3 51 (7.133 %) Telecoms
4 49 (6.853 %) Banking
5 44 (6.154 %) Auditing
6 31 (4.336 %) Financial Institution
7 25 (3.497 %) Insurance
8 20 (2.797 %) FMCG
9 17 (2.378 %) Health
10 13 (1.818 %) Education
10 13 (1.818 %) Investment Banking
10 13 (1.818 %) Pensions
11 9 (1.259 %) Legal
12 7 (0.979 %) Home Office
12 7 (0.979 %) International Banking
13 6 (0.839 %) Online Betting
13 6 (0.839 %) Games
14 4 (0.559 %) Retail
15 3 (0.420 %) Military
16 2 (0.280 %) Publishing
IT Job Market, Job TitlesJob Titles
1 214 (29.93 %) Consultant
2 134 (18.74 %) Tester
3 129 (18.04 %) Penetration Tester
4 95 (13.29 %) Security Manager
5 90 (12.59 %) Security Consultant
6 76 (10.63 %) Analyst
7 70 (9.790 %) Security Analyst
8 39 (5.455 %) IT Security Manager
9 36 (5.035 %) Security Specialist
10 29 (4.056 %) Senior Consultant
11 26 (3.636 %) Security Engineer
12 24 (3.357 %) Team Leader
13 22 (3.077 %) Information Manager
14 21 (2.937 %) Test Consultant
14 21 (2.937 %) Developer
15 20 (2.797 %) Operations Analyst
15 20 (2.797 %) Internet Developer
16 18 (2.517 %) Senior Analyst
16 18 (2.517 %) Applications Tester
17 15 (2.098 %) Senior Security Analyst
IT Job Market, MiscellaneousMiscellaneous
1 45 (6.294 %) Computer Science
2 35 (4.895 %) CESG
3 24 (3.357 %) Management Information System
4 20 (2.797 %) PKI
5 19 (2.657 %) Biometrics
6 18 (2.517 %) Data Protection Act
7 16 (2.238 %) Cryptography
8 12 (1.678 %) Mainframe
9 10 (1.399 %) Client/Server
10 8 (1.119 %) CESG CLAS
11 6 (0.839 %) French Language
12 3 (0.420 %) German Language
13 2 (0.280 %) Italian Language
13 2 (0.280 %) Russian Language
13 2 (0.280 %) Spanish Language
13 2 (0.280 %) IBM Mainframe
13 2 (0.280 %) iSeries
13 2 (0.280 %) SecurID
14 1 (0.140 %) Clustering
14 1 (0.140 %) N-Tier
IT Job Market, Operating SystemsOperating Systems
1 99 (13.85 %) UNIX
2 81 (11.33 %) Windows
3 72 (10.07 %) Linux
4 26 (3.636 %) Solaris
5 9 (1.259 %) Windows Server 2003
6 4 (0.559 %) Windows XP
6 4 (0.559 %) AIX
7 3 (0.420 %) HPUX
8 1 (0.140 %) Windows 2000
8 1 (0.140 %) Windows NT
8 1 (0.140 %) Windows Server 2008
IT Job Market, Processes & MethodologiesProcesses & Methodologies
1 212 (29.65 %) Information Security
2 124 (17.34 %) Security Testing
3 85 (11.89 %) Security Cleared
4 76 (10.63 %) Risk Assessment
5 66 (9.231 %) Security Management
6 65 (9.091 %) Ethical Hacking
7 64 (8.951 %) SC Cleared
8 61 (8.531 %) Risk Management
9 44 (6.154 %) Business Continuity
10 39 (5.455 %) Identity Management
11 35 (4.895 %) Vulnerability Assessment
12 33 (4.615 %) BCP
13 29 (4.056 %) Data Protection
14 26 (3.636 %) Business Development
15 19 (2.657 %) OWASP
15 19 (2.657 %) ITIL
16 18 (2.517 %) Service Delivery
17 17 (2.378 %) OSSTMM
18 16 (2.238 %) Project Management
18 16 (2.238 %) Data Security
IT Job Market, Programming LanguagesProgramming Languages
1 62 (8.671 %) Perl
2 60 (8.392 %) Java
3 37 (5.175 %) C++
4 33 (4.615 %) Python
5 32 (4.476 %) C
6 28 (3.916 %) Ruby
7 24 (3.357 %) JavaScript
7 24 (3.357 %) PHP
8 22 (3.077 %) SQL
9 11 (1.538 %) VB
10 10 (1.399 %) Shell Script
11 8 (1.119 %) C#
12 5 (0.699 %) VBScript
13 2 (0.280 %) DHTML
13 2 (0.280 %) Jython
IT Job Market, QualificationsQualifications
1 210 (29.37 %) CISSP
2 113 (15.80 %) Degree
3 54 (7.552 %) Cisco Certification
4 49 (6.853 %) CISM
5 40 (5.594 %) CEH
6 37 (5.175 %) ISEB
7 31 (4.336 %) CISA
8 21 (2.937 %) CCNA
9 20 (2.797 %) CCNP
9 20 (2.797 %) Microsoft Certification
10 18 (2.517 %) GIAC
11 13 (1.818 %) MCSE
12 12 (1.678 %) CCIE
13 11 (1.538 %) CCSP
13 11 (1.538 %) CCDP
14 8 (1.119 %) CCSE
15 6 (0.839 %) CCSA
16 4 (0.559 %) CHFI
17 2 (0.280 %) SCNA
18 1 (0.140 %) CISMP
IT Job Market, Quality Assurance & ComplianceQuality Assurance & Compliance
1 88 (12.31 %) ISO27001
2 86 (12.03 %) PCI DSS
3 41 (5.734 %) PCI QSA
4 30 (4.196 %) Sarbanes-Oxley
5 15 (2.098 %) COBIT
5 15 (2.098 %) BS7799
6 9 (1.259 %) ISO17799
7 4 (0.559 %) QA
8 1 (0.140 %) HIPAA
8 1 (0.140 %) PABP
8 1 (0.140 %) COSO
IT Job Market, System SoftwareSystem Software
1 32 (4.476 %) Active Directory
2 25 (3.497 %) Nmap
3 17 (2.378 %) ISA Server
4 5 (0.699 %) WebInspect
5 2 (0.280 %) ProxySG
6 1 (0.140 %) Snort
6 1 (0.140 %) Backup Exec
IT Job Market, Systems ManagementSystems Management
1 27 (3.776 %) Nessus
2 15 (2.098 %) CA SiteMinder
3 4 (0.559 %) MOM
4 1 (0.140 %) Systems Management Server (SMS)
4 1 (0.140 %) MAILsweeper
IT Job Market, VendorsVendors
1 101 (14.13 %) Cisco
2 71 (9.930 %) Microsoft
3 51 (7.133 %) CheckPoint
4 44 (6.154 %) Oracle
5 28 (3.916 %) Juniper
6 17 (2.378 %) Nortel
7 12 (1.678 %) Blue Coat
8 11 (1.538 %) HP
9 10 (1.399 %) Symantec
10 9 (1.259 %) Nokia
10 9 (1.259 %) Sybase
11 8 (1.119 %) IBM
12 7 (0.979 %) McAfee Security
13 6 (0.839 %) Crossbeam
14 5 (0.699 %) Reuters
15 3 (0.420 %) VMware
15 3 (0.420 %) WatchGuard
15 3 (0.420 %) IronPort
16 2 (0.280 %) Finjan
16 2 (0.280 %) Websense

'Hacking' 카테고리의 다른 글

Getting Started Reverse Engineering  (0) 2008.12.16
Problems with Penetration Testing  (0) 2008.12.08
Manual Unpacking of UPX Packed PE File  (0) 2008.12.04
General IP Stack Tuning Recommendations  (0) 2008.11.29
Denial of Service Attacks  (0) 2008.11.29
Posted by CEOinIRVINE
l

Apple's Security Paradox

Business 2008. 12. 4. 09:06

Even as Macs have multiplied, the number of viruses and Trojans targeting them has fallen.

As Apple's slice of the computer market grows, cyber security researchers have long warned that hackers would someday turn their attention away from PCs and toward innocent Macbooks and iPhones.

That day, it turns out, has yet to come. But virus-fearing Apple (nasdaq: AAPL - news - people ) fans could be forgiven for thinking it had.

Article Controls


On Monday, Washington Post blogger Brian Krebs noted that Apple had "quietly published" a note on its technical support site recommending Apple users install antivirus software. In fact, the recommendation had been on Apple's site for more than a year. But other blogs and media outlets took the Post's story as evidence that Apple computers have finally lost the "immunity" to viruses and other malicious code that the company touts in its "Mac vs. PC" ads.

On Tuesday evening, Apple deleted the antivirus recommendation, writing in a statement to the press that it was "old and inaccurate," and reiterating the claim that Apple devices are safe "right out of the box."

That sounds like a bold statement--but at least for now, it's also true, say security researchers.

Even as Apple's share of the computer market has risen, the incidence of viruses and Trojans has--surprise--gone down. In the last six months, Finnish cyber security firm, F-Secure, has detected 13 new samples of malicious software, or "malware," targeting Apple's OS X operating system.

By contrast, every day F-Secure pulls from the Internet between 20,000 and 30,000 new samples of malicious code aimed at PCs. "I can't even calculate the percentage that targets Macs," says Patrik Runald, a researcher with F-Secure. "It's peanuts."

'Business' 카테고리의 다른 글

Starbucks to offer limited free Wi-Fi service  (0) 2008.12.04
Penetration Tester  (0) 2008.12.04
Rising royalties send Yahoo's Launchcast to CBS  (0) 2008.12.04
Apple iPod sales surprise analyst  (0) 2008.12.04
Apple iPod sales surprise analyst  (0) 2008.12.04
Posted by CEOinIRVINE
l
 

Creating a Computer Security Incident Response Team: A Process for Getting Started

Introduction
What are the questions?
What are some of the best practices for creating a CSIRT?
     Step 1: Obtain management support and buy-in
     Step 2: Determine the CSIRT strategic plan
     Step 3: Gather relevant information
     Step 4: Design the CSIRT vision
     Step 5: Communicate the CSIRT vision and operational plan
     Step 6: Begin CSIRT implementation
     Step 7: Announce the operational CSIRT
     Step 8: Evaluate CSIRT effectiveness
Remember that patience can be a key
Resources and more information on creating a CSIRT


Keeping organizational information assets secure in today's interconnected computing environment is a true challenge that becomes more difficult with each new "e" product and each new intruder tool. Most organizations realize that there is no one solution or panacea for securing systems and data; instead a multi-layered security strategy is required. One of the layers that many organizations are including in their strategy today is the creation of a Computer Security Incident Response Team, generally called a CSIRT.

Motivators driving the establishment of CSIRTs include

  • a general increase in the number of computer security incidents being reported
  • a general increase in the number and type of organizations being affected by computer security incidents
  • a more focused awareness by organizations on the need for security policies and practices as part of their overall risk-management strategies
  • new laws and regulations that impact how organizations are required to protect information assets
  • the realization that systems and network administrators alone cannot protect organizational systems and assets

What Are the Questions?

As organizations begin to build their incident response capability, they are looking to determine the best strategy for putting such a structure in place. They not only want to know what has worked well for others, but also want some guidance on the process and requirements they must follow to establish an effective incident response capability.

CSIRTs and their parent organizations have numerous questions they want answered to help them design their response capability. They are also interested in knowing what other teams in similar industry sectors are doing. Typical questions being asked include but are not limited to the following:

  • What are the basic requirements for establishing a CSIRT?
  • What type of CSIRT will be needed?
  • What type of services should be offered?
  • How big should the CSIRT be?
  • Where should the CSIRT be located in the organization?
  • How much will it cost to implement and support a team?
  • What are the initial steps to follow to create a CSIRT?

There is not a standard set of answers to these questions. CSIRTs are as unique as the organizations they service, and as a result, no two teams are likely to operate in the exact same manner. It is important for the organization to decide why it is building a CSIRT and what it wants that CSIRT to achieve. Once this is determined, then the unique set of answers to these questions can be formulated.

This document is the first in a series of articles that will discuss the issues and decisions to be addressed when planning and implementing a CSIRT. This first article will focus on an overview of the basic high-level steps to be taken by organizations as they design and build a CSIRT. The article is written as a general guideline for any organization that is thinking about undertaking such an endeavor or for any individuals who are members of a project team that is working to establish a CSIRT.

What Are Some Best Practices for Creating a CSIRT?

Although CSIRTs will differ in how they operate depending on the available staff, expertise, budget resources, and unique circumstances of each organization, there are some basic practices that apply to all CSIRTs. We will discuss some of those practices as they relate to creating a CSIRT. (For more information on what a CSIRT is, see the CSIRT FAQ.) Although these actions are presented as steps, the process is not sequential; many steps can occur in parallel.

The steps are as follows:

Step 1: Obtain Management Support and Buy-In

Our experience shows that without management approval and support, creating an effective incident response capability can be extremely difficult and problematic. This support must be shown in numerous ways, including the provision of resources, funding, and time, to the person or group of people who will act as the project team for implementing the CSIRT. This also includes executive and business or department managers and their staffs committing time to participate in this planning process; their input is essential during the design effort.

It is important to elicit management's expectations and perceptions of the CSIRT's function and responsibilities. Without this information, a team may be built whose services and authority are not understood or appropriately used by the rest of the organization.

Along with obtaining management support for the planning and implementation process, it is equally important to get management commitment to sustain CSIRT operations and authority for the long term. Once the team is established, how is it maintained and expanded with budget, personnel, and equipment resources? Will the role and authority of the CSIRT continue to be backed by management across the various constituencies or parent organization? Without this continued support the CSIRT's long-term success may be in jeopardy.

Step 2: Determine the CSIRT Development Strategic Plan

Think about how to manage the development of the CSIRT. What administrative issues must be dealt with, and what project management issues must be addressed?

  • Are there specific timeframes to be met? Are they realistic, and if not, can they be changed?
  • Is there a project group? Where do the group members come from? You want to ensure that all stakeholders are represented. Some may not be on the team for the whole project, but brought in to provide subject matter expertise and input as needed. You also want to incorporate best practices in project management, organizational behavior theory, and communications theory into your plan. If anyone has a background in these areas, consider having them participate on the team.
  • How do you let the organization know about the development of the CSIRT? A memo sent from the CIO, CEO, or other high-level manager announcing the project and asking each key stakeholder and area to provide assistance in any way possible is a good way to start. Letting the organization know about the plan for a CSIRT in the early stages of development can help staff feel they are part of the design process.
  • If you have a project team, how do you record and communicate the information you are collecting, especially if the team is geographically dispersed?

Step 3: Gather Relevant Information

Gather information to determine the incident response and service needs that the organization has. Take a look at the types of incident activity currently being reported within your constituency. This helps determine not only what type of services to offer but also the types of skills and expertise the CSIRT staff will need. For example, if your organization has been the victim of computer virus or worm activity, you will need staff with virus experience to handle the response. You will also need virus scanning, elimination, and recovery procedures, along with the appropriate anti-virus tools. You may want people with good training and documentation skills to help develop user awareness programs as a proactive step in dealing with virus activity.

Identify what information you need to know to plan and implement the CSIRT. Determine who has that information and how best to elicit that information, either through general discussions or interviews or by making them part of the project.

Meet with key stakeholders to discuss not only their incident response needs, but to achieve an initial consensus on the expectations, strategic direction, definitions, and responsibilities of the CSIRT. Your definition of what a CSIRT is and does may be very different from your manager's definition or the definition of another part of your organization. Use these discussions with the stakeholders to outline and identify how each group will need to interact with the CSIRT. The stakeholders could include but are not limited to

  • Business managers. They need to understand what the CSIRT is and how it can help support their business processes. Agreements must be made concerning the CSIRT's authority over business systems and who will make decisions if critical business systems must be disconnected from the network or shut down.
  • Representatives from IT. How does the IT staff and the CSIRT interact? What actions are taken by IT staff and what actions are taken by CSIRT members during response operations? Will the CSIRT have easy access to network and systems logs for analysis purposes? Will the CSIRT be able to make recommendations to improve the security of the organizational infrastructure?
  • Representatives from the legal department. When and how is the legal department involved in incident response efforts? Legal staff may also be needed to review non-disclosure agreements, develop appropriate wording for contacting other sites and organizations, and determine site liability for computer security incidents.
  • Representatives from human resources. They can help develop job descriptions to hire CSIRT staff, and develop policies and procedures for removing internal employees found engaging in unauthorized or illegal computer activity.
  • Representatives from public relations. They must be prepared to handle any media inquiries and help develop information-disclosure policies and practices.
  • Any existing security groups, including physical security. The CSIRT will need to exchange information with these groups about computer incidents and may share responsibility with them for resolving issues involving computer or data theft.
  • Audit and risk management specialists. They can help develop threat metrics and vulnerability assessments, along with encouraging computer security best practices across the constituency or organization.
  • General representatives from the constituency, who can provide insight into their needs and requirements.

Stakeholders should also include anyone who will be involved in the incident-handling or notification process. Think about who will need to be notified during different types of incidents. Are there people in other parts of the organization or constituency who can provide information or input to the CSIRT or with whom the CSIRT will need to share or obtain information? These may include other parts of the IT or security departments, including any groups doing vulnerability assessments, intrusion detection, or network monitoring. Knowing what the CSIRT will need to do can help you identify the right people to be involved in developing the procedures.

Find out if anyone else is currently performing any of the services that the CSIRT may be looking to provide. Determine if those services should stay with the current group or move to the CSIRT over some agreed-to period of time. Addressing these types of issues in the planning stages can help identify what responsibilities will need to be delineated and what information will need to be gathered.

There may also be some resources available for review that will help in your information gathering. These may include

  • organization charts for the enterprise and specific business functions
  • topologies for organizational or constituency systems and networks
  • critical system and asset inventories
  • existing disaster-recovery or business-continuity plans
  • existing guidelines for notifying the organization of a physical security breach
  • any existing incident-response plans
  • any parental or institutional regulations
  • any existing security policies and procedures

Reviewing these documents serves a dual purpose: first, to identify existing stakeholders, resources, and system owners; and second, to provide an overview of existing policies to which the CSIRT must adhere. As a bonus, these documents may contain text that can be adapted when developing CSIRT policies, procedures, or documentation. They may also include general notification lists of organizational representatives who must be contacted during emergencies. Such lists may be adapted for CSIRT work and processes.

In addition, investigate what similar organizations are doing to provide incident handling services or to organize a CSIRT. If you have contacts at these organizations, see if you can talk to them about how their team was formed. Take a look at other CSIRTs' web sites, and check their missions, charters, funding scheme, and service listing. This may give you ideas for organizing your team. Review any books or other publications about incident handling or CSIRTs. An initial list of resources can be found at the CERT CSIRT Development web page.

Attend courses or conferences that include sessions for developing incident response strategies or creating CSIRTs. These venues can provide you with opportunities to exchange ideas and interact with others in the incident response field. A good place to start may be to attend the annual FIRST conference.

Step 4: Design your CSIRT Vision

As the information gathered brings to the forefront the incident response needs of the constituency and as you build your understanding of management expectations, you can begin to identify the key components of the CSIRT. This allows you to define the vision for the CSIRT and its goals and functions. You need both management and constituent buy-in and support of these goals and functions for the CSIRT to be successful.

It is important to achieve clear agreement on the definition and expectations for the CSIRT being formed. What the CSIRT staff thinks the team will do and what the managers and general constituency think the CSIRT will do may be completely different. A number of people have the perception that a CSIRT is a "cyber cop" for an organization or constituency. While this may be true for a small number of teams, it is not generally the main focus of a CSIRT. The main focus is to prevent and respond to incidents. The vision for the CSIRT must include a clear explanation of where these CSIRT functions fit into the current organizational structure and how the CSIRT interacts with its constituency. The vision explains what benefits the CSIRT provides, what processes it enacts, who it coordinates with, and how it performs its response activities.

In creating your vision, you should

  • Identify your constituency. Who does the CSIRT support and service?
  • Define your CSIRT mission, goals, and objectives. What does the CSIRT do for the identified constituency?
  • Select the CSIRT services to provide to the constituency (or others). How does the CSIRT support its mission?
  • Determine the organizational model. How is the CSIRT structured and organized?
  • Identify required resources. What staff, equipment, and infrastructure is needed to operate the CSIRT?
  • Determine your CSIRT funding. How is the CSIRT funded for its initial startup and its long-term maintenance and growth?

Step 5: Communicate the CSIRT Vision

Communicate the CSIRT vision and operational plan to management, your constituency, and others who need to know and understand its operations. As appropriate, make adjustments to the plan based on their feedback.

Communicating your vision in advance can help identify process or organizational problems before implementation. It is a way to let people know what is coming and allow them to provide input into CSIRT development. This is a way to begin marketing the CSIRT to the constituency and gaining the needed buy-in from all organizational levels.

You may receive information that was missed or not available during the information-gathering stage. Use this information and input to make any final adjustments to the CSIRT organizational structure and processes.

Step 6: Begin CSIRT Implementation

Once management and constituency buy-in is obtained for the vision, begin the implementation:

  • Hire and train initial CSIRT staff.
  • Buy equipment and build any necessary network infrastructure to support the team.
  • Develop the initial set of CSIRT policies and procedures to support your services.
  • Define the specificiations for and build your incident-tracking system.
  • Develop incident-reporting guidelines and forms for your constituency.

A main resource you will need for your constituency is your incident-reporting guidelines. These guidelines define how your constituency interacts with your CSIRT, what constitutes an incident, what types of incidents to report, who should report an incident, why an incident should be reported, the process for reporting an incident, and the process for responding to an incident. They should be clear and understandable by the constituency being served.

The process for reporting an incident includes a detailed description of the mechanisms for submitting reports: phone, email, web form, or some other mechanism. It should also include details about what type of information should be included in the report.

The process for responding to an incident details how the CSIRT prioritizes and handles received reports. This includes how the person reporting an incident is notified of its resolution, any response timeframes that must be followed, and any other notification that occurs.

For an example of incident reporting guidelines, see the CERT/CC Incident Reporting Guidelines.

Step 7: Announce the CSIRT

When the CSIRT is operational, announce it broadly to the constituency or parent organization. It is best if this announcement comes from sponsoring management. Include the contact information and hours of operation for the CSIRT in the announcement. This is an excellent time to make available the CSIRT incident-reporting guidelines. You may also want to develop information to publicize the CSIRT, such as a simple flyer or brochure outlining the CSIRT mission and services, which can be distributed with the announcement. Some teams have held an open house or special celebration to announce the operational CSIRT.

Step 8: Evaluate the Effectiveness of the CSIRT

Once the CSIRT has been in operation for a while, management will want to determine the effectiveness of the team and use evaluation results to improve CSIRT processes and ensure that the team is meeting the needs of the constituency. The CSIRT, in conjunction with management and the constituency, will need to develop a mechanism to perform such an evaluation.

Information on effectiveness can be gathered through a variety of feedback mechanisms, including

  • benchmarking against other CSIRTs
  • general discussions with constituency representatives
  • evaluation surveys distributed to constituency members on a periodic basis
  • creation of a set of criteria or quality parameters that is then used by an audit or third party group to evaluate the team

It may be helpful to review previously collected information on the state of the constituency or organization before the implementation of the team. This information can be used as a baseline in determining the effect of the CSIRT on the constituency. Information collected for comparison may include

  • number of reported incidents
  • response time or time-to-live of an incident
  • number of incidents successfully resolved
  • information reported to the constituency about computer security issues or ongoing activity
  • attentiveness to security issues within the organization
  • preventative techniques and security practices in place

See section 2.2.4 of the Handbook for Computer Security Incident Response Teams for more information on evaluating the quality of CSIRT services.

Remember that Patience Can Be a Key

The length of time it will take to design, plan, and implement a team will vary with each organizational situation. We have seen CSIRTs become operational across a wide range of times, from two months to two years. It is important to realize that it can take about 12-18 months to work out the processes and procedures, especially for a large, distributed enterprise. After the team is operational, it can take another 12-18 months to obtain a good level of trust and comfort with your constituency. Many teams show a large growth in the number of incidents reported over their first year of operation. The longer you are in operation, the more your constituency will understand the work you are doing and the more likely that they will report to you.

Resources and More Information on Creating a CSIRT

The components discussed above are more fully discussed in the following:

These resources may provide additional insight:

  • Forming an Incident Response Team
    A paper examining the role a response team may play in the community and the issues that should be addressed both during the formation and after commencement of operations. This paper was written by a former member of the Australian Computer Emergency Response Team.

  • Expectations for Computer Security Incident Response (RFC 2350)
    This is a best practices document, which recommends general requirements and behaviors that a CSIRT should follow when establishing or operating a team. It focuses on methods for letting the CSIRT constituency know about the team's services and processes.

  • Avoiding the Trial-by-Fire Approach to Security Incidents
    This article discusses the importance of having an organized and defined process for detecting and responding to computer security incidents.

  • The CERT® Guide to System and Network Security Practices
    The CERT security practices have been compiled in this book published by Addison-Wesley and available at walk-in and online bookstores. Using a practical, phased approach, the book shows administrators how to protect systems and networks against malicious and inadvertent compromise based on security incidents reported to the CERT/CC
Posted by CEOinIRVINE
l

Network Security Breaches Plague NASA

Repeated attacks from abroad on NASA computers and Web sites are causing consternation among officials and stirring national security concerns

http://images.businessweek.com/story/08/600/1120_mz_nasa.jpg

Space Shuttle Discovery preparing for launch in July 2005 NASA/SSPL/The Image Works

America's military and scientific institutions—along with the defense industry that serves them—are being robbed of secret information on satellites, rocket engines, launch systems, and even the Space Shuttle. The thieves operate via the Internet from Asia and Europe, penetrating U.S. computer networks. Some of the intruders are suspected of having ties to the governments of China and Russia, interviews and documents show. Of all the arms of the U.S. government, few are more vulnerable than NASA, the civilian space agency, which also works closely with the Pentagon and American intelligence services.

In April 2005, cyber-burglars slipped into the digital network of NASA's supposedly super-secure Kennedy Space Center east of Orlando, according to internal NASA documents reviewed by BusinessWeek and never before disclosed. While hundreds of government workers were preparing for a launch of the Space Shuttle Discovery that July, a malignant software program surreptitiously gathered data from computers in the vast Vehicle Assembly Building, where the Shuttle is maintained. The violated network is managed by a joint venture owned by NASA contractors Boeing (BA) and Lockheed Martin (LMT).

Undetected by the space agency or the companies, the program, called stame.exe, sent a still-undetermined amount of information about the Shuttle to a computer system in Taiwan. That nation is often used by the Chinese government as a digital way station, according to U.S. security specialists.

By December 2005, the rupture had spread to a NASA satellite control complex in suburban Maryland and to the Johnson Space Center in Houston, home of Mission Control. At least 20 gigabytes of compressed data—the equivalent of 30 million pages—were routed from the Johnson center to the system in Taiwan, NASA documents show. Much of the data came from a computer server connected to a network that tracks malfunctions that could threaten the International Space Station.

BEYOND HACKERS

Seven months after the initial April intrusion, NASA officials and employees at the Boeing-Lockheed venture finally discovered the flow of information to Taiwan. Investigators halted all work at the Vehicle Assembly Building for several days, combed hundreds of computer systems, and tallied the damage. NASA documents reviewed by BusinessWeek do not refer to any specific interference with operations of the Shuttle, which was aloft from July 26 to Aug. 9, or the Space Station, which orbits 250 miles above the earth.

The startling episode in 2005 added to a pattern of significant electronic intrusions dating at least to the late 1990s. These invasions went far beyond the vandalism of hackers who periodically deface government Web sites or sneak into computer systems just to show they can do it. One reason NASA is so vulnerable is that many of its thousands of computers and Web sites are built to be accessible to outside researchers and contractors. Another reason is that the agency at times seems more concerned about minimizing public embarrassment over data theft than preventing breaches in the first place.

In 1998 a U.S.-German satellite known as ROSAT, used for peering into deep space, was rendered useless after it turned suddenly toward the sun. NASA investigators later determined that the accident was linked to a cyber-intrusion at the Goddard Space Flight Center in the Maryland suburbs of Washington. The interloper sent information to computers in Moscow, NASA documents show. U.S. investigators fear the data ended up in the hands of a Russian spy agency.




Posted by CEOinIRVINE
l

eEye Preview (http://research.eeye.com/html/services/)
3Com TippingPoint DVLabs (http://dvlabs.tippingpoint.com)
VeriSign iDefense Security Intelligence Services (http://labs.idefense.com/services/)

'Hacking' 카테고리의 다른 글

Manually Unpacking a Morphine-Packed DLL with OllyDbg  (1) 2008.11.23
Dynamic-Link Library Creation  (0) 2008.11.21
Investigation of Vulnerabilities  (0) 2008.11.21
1.4. Assessment Service Definitions  (0) 2008.11.21
Snort Configuration : Linux  (0) 2008.11.18
Posted by CEOinIRVINE
l
Iraqi Prime Minister Nouri al-Maliki speaks to the news media in al-Zawra park in Baghdad, Iraq on Saturday, Nov. 15, 2008. The provincial council of Baghdad organized a celebration Saturday on the occasion of Baghdad Day. (AP Photo/Khalid Mohammed)



Iraqi Prime Minister Nouri al-Maliki speaks to the news media in al-Zawra park in Baghdad, Iraq on Saturday, Nov. 15, 2008. The provincial council of Baghdad organized a celebration Saturday on the occasion of Baghdad Day. (AP Photo/Khalid Mohammed) (Khalid Mohammed - AP)

BAGHDAD, Nov. 16 -- After months of painstaking negotiations between Baghdad and Washington, the Iraqi Cabinet on Sunday approved a bilateral agreement allowing U.S. troops to remain in this country for three more years.

The accord still needs approval by Iraq's parliament, but the Cabinet vote indicated that most major Iraqi parties supported it. The Iraqi government spokesman portrayed the pact as closing the book on the occupation that began with the U.S.-led 2003 invasion.

"The total withdrawal will be completed by Dec. 31, 2011. This is not governed by circumstances on the ground," the spokesman, Ali al-Dabbagh, told Iraqi reporters, pointedly rejecting the more conditional language that the U.S. government had earlier sought in the accord.

American officials have pointed out that there is nothing stopping the next Iraqi government from asking some U.S. troops to stay on. The Iraqi military is years away from being able to defend the country from external attack, according to both U.S. and Iraqi officials.

Still, there is no doubt that the accord, if passed by parliament, will sharply reduce the U.S. military's power in Iraq. American soldiers will be required to seek warrants from Iraqi courts to execute arrests, and to hand over suspects to Iraqi authorities. U.S. troops will have to leave their combat outposts in Iraqi cities by mid-2009, withdrawing to bases.

The U.S. government has lobbied hard for the status-of-forces agreement, which would replace a United Nations mandate authorizing the U.S. presence that expires on Dec. 31. Without some legal umbrella, the 150,000 U.S. forces would have to end their operations in Iraq in a few weeks' time, military officials said.

"We welcome the Cabinet's approval of the agreement today," the U.S. Embassy said in a statement read by a spokeswoman. "This is an important and positive step."

The Iraqi spokesman noted his government could cancel the agreement if its own forces became capable of controlling security at an earlier point.

"That matches the vision of U.S. President-elect Barack Obama," Dabbagh said, referring to the Democrat's plan to withdraw American combat troops within 16 months. "The Iraqi side would not mind [withdrawal] when the readiness of its forces is achieved."

While the Cabinet vote indicated that Prime Minister Nouri al-Maliki had rounded up the support of most of Iraq's major parties, final passage of the accord is not guaranteed, politicians said.

One issue is timing: The notoriously slow-moving Iraqi parliament is scheduled to adjourn on Nov. 25 for a three-week break to allow lawmakers to make the hajj pilgrimage.

"We have a limited window of time," warned Hoshyar Zebari, the foreign minister.


Posted by CEOinIRVINE
l
By QASSIM ABDUL-ZAHRA , 11.15.08, 09:32 AM EST
pic

U.S. and Iraqi negotiators have agreed on a draft of a security pact that would allow American troops to stay in Iraq for three more years after their U.N. mandate expires Dec. 31, a senior aide to Prime Minister Nouri al-Maliki said Saturday.

The aide said the draft could be put to a Cabinet vote in an emergency meeting Sunday or Monday. Transport Minister Amir Abdul-Jabbar said he had been notified by the Cabinet secretariat that a Cabinet meeting was scheduled for Sunday to vote on the agreement. If adopted by the Cabinet, it would then require parliamentary approval

Also Saturday, 10 Iraqis died and 20 were wounded in a suicide car bombing in the northern city of Tal Afar, the U.S. military said. Tal Afar is near the volatile city of Mosul and has been the site of several recent bombings. The latest attack highlighted the continuing threat to security in Iraq despite a sharp drop in violence since last year.

The U.S. military also said an American Marine died from wounds suffered in a roadside bombing west of Baghdad. The blast occurred Friday in Anbar province, a former insurgent stronghold where security gains were made after a U.S.-funded Sunni revolt against al-Qaida in Iraq.

In Washington, National Security Council spokesman Gordon Johndroe described the final document on the security pact as beneficial to the allied nations.

"We think this is a good document that serves both Iraqis and Americans well. We remain hopeful that the Iraqi government will conclude this process soon," Johndroe said Saturday.

The al-Maliki aide, speaking on condition of anonymity because of the sensitivity of the subject, said the agreement stood "a good chance" of being passed by a two-thirds majority in the 37-member Cabinet.


'Business' 카테고리의 다른 글

Eco-Logic Green Life  (0) 2008.11.16
China to spend $59 bln on airports by end-2010  (0) 2008.11.16
Bush cites progress at world economic summit  (0) 2008.11.16
How Smart Is Your Car?  (0) 2008.11.16
Devices Become You iPhone  (0) 2008.11.15
Posted by CEOinIRVINE
l