You are on page 1of 8

Security, Personnel, and IS Maintenance 1

Security, Personnel, and IS Maintenance of Essay

James Wyatt

Grantham University

Abstract
Security, Personnel, and IS Maintenance 2

Todays Cyber Security requirements have created a need to redesign the Station Automation

Architectures to provide secure access for Operations and Maintenance Systems and Personnel.

This paper will review several architectures being used and planned by utilities today

Security, Personnel, and IS Maintenance


Security, Personnel, and IS Maintenance 3

1. Search your librarys database and the Web for an article related to individuals

violating their organizations policy and being terminated. Did you find many? Why or why not?

I found a lot of this article and they all have the same outcome. It seems to me that everyone that

got fired had it coming for breaking the rules. The companies want the world to know about this

so people who work for the companies know what will happen to them.

2. Go to the (ISC)2 Web site at www.isc2.org. Research the knowledge areas included in

the tests for both the CISSP and the SSCP. What areas must you study that are not included in

this text? In order to sit for the CISSP exam, the candidate must possess at least three years of

direct full-time security professional work experience in one or more of the ten domains of

information security knowledge listed below. The CISSP exam itself, which covers all ten

domains, consists of 250 multiple-choice questions and must be completed within six hours.

Access Control, Application Security, Business Continuity and Disaster Recovery Planning

Cryptography, Information Security and Risk Management, Legal, Regulations, Compliance, and

Investigations, Operations Security, Physical (Environmental) Security, Security Architecture and

Design, Telecommunications and Network Security. The SSCP exam consists of 125 multiple-

choice questions and must be completed within three hours. Instead of the ten domains of the

CISSP, the SSCP covers seven domains: Access Controls, Cryptography, Malicious Code and

Activity, Monitoring and Analysis, Networks and Communications, Risk, Response, and

Recovery, Security Operations and Administration.

3. Using the Web, identify some certifications with an information security component

that were not discussed in this chapter. NetScreen, Microsoft Certified Professional (MCP),

Microsoft Certified Systems Engineer (MCSE), Microsoft Certified Professional Internet

(MCP+I), Microsoft Certified Systems Administrator (MCSA), Microsoft Certified Professional


Security, Personnel, and IS Maintenance 4

Site Building (MCP+SB), Microsoft Certified Solutions Developer (MCSD), Microsoft Certified

Database Administrator (MCDBA), Microsoft Certified Application Developer (MCAD),

Microsoft Certified Trainer (MCT), Microsoft Office User Specialist (MOUS), and more.

4. Search the Web for at least five job postings for a security administrator. What

qualifications do the listings have in common? BS in Computer Science, 2- 5 years experience

working in a technology company, Certified Information Systems Security Professional (CISSP)

is preferred, Cisco Certified Security Professional (CCSP) is preferred, Cisco and Microsoft

Network certifications are preferred, and more.

1. Search the Web for the Forum of Incident Response and Security Teams (FIRST). In

your own words, what is the forums mission? FIRST are the Forum of Incident Response and

Security Teams. The idea of FIRST goes back until 1989, only one year after the CERT

Coordination Center was created after the infamous Internet worm. Back then incidents already

were impacting not only one closed user group or organization, but any number of networks

interconnected by the Internet.

It was clear from then on that information exchange and cooperation on issues of mutual

interest like new vulnerabilities or wide ranging attacks - especially on core system like the DNS

servers or the Internet as a critical infrastructure itself - were the key issues for security and

incident response teams.

Since 1990, when FIRST was founded, its members have resolved an almost continuous

stream of security-related attacks and incidents including handling thousands of security

vulnerabilities affecting nearly all of the millions of computer systems and networks throughout

the world connected by the ever growing Internet. FIRST brings together a wide variety of
Security, Personnel, and IS Maintenance 5

security and incident response teams including especially product security teams from the

government, commercial, and academic sectors.

3. This chapter lists five tools that can be used by security administrators, network

administrators, and attackers alike. Search the World Wide Web for three to five other tools that

fit this same description. Who do the sites promoting these tools claim to support? Metrics are

tools designed to improve performance and accountability through the collection, analysis, and

reporting of relevant performance-related data. Information security metrics monitor the

accomplishment of goals and objectives by quantifying the implementation level of security

controls and the efficiency and effectiveness of the controls, by analyzing the adequacy of

security activities, and by identifying possible improvement actions. Am I implementing the

tasks for which I am responsible?, How efficiently or effectively am I accomplishing those

tasks?, and What impact are those tasks having on the mission?

Automated tools known as log analyzers can consolidate systems logs, perform

comparative analysis, and detect common occurrences or behavior that is of interest. A risk

assessments identification of the systemic or latent vulnerabilities that introduce risk to the

organization can provide the opportunity to create a proposal for an information security project.

When used as part of a complete risk management maintenance process, the RA can be a

powerful and flexible tool that helps identify and document risk and remediate the underlying

vulnerabilities that expose the organization to risks of loss. The platform security validation

(PSV) process is designed to find and document the vulnerabilities that may be present because

there are misconfigured systems in use within the organization. The wireless vulnerability

assessment process is designed to find and document the vulnerabilities that may be present in

the wireless local area networks of the organization. The modem vulnerability assessment
Security, Personnel, and IS Maintenance 6

process is designed to find and document any vulnerability that is present on dial-up modems

connected to the organizations networks.

In digital forensics, all investigations follow the same basic methodology: 1. Identify

relevant items of evidentiary value (EM), 2. Acquire (seize) the evidence without alteration or

damage, 3. Take steps to assure that the evidence is at every step verifiably authentic and is

unchanged from the time it was seized, 4. Analyze the data without risking modification or

unauthorized access, 5. Report the findings to the proper authority.

4. Using the names of the tools you found in Exercise 3 and a browser on the World Wide

Web, find a site that claims to be dedicated to supporting hackers. Do you find any references to

any other hacker tools? If you do, create a list of the tools with their names and a short

description of what they do and how they work. CyberXtreme is an impressive forum with a

significant hacking section, but also entire sections on technology, graphics and even a tech

support area. Here youll find cracks, secret codes, free download packages (some containing

cracked software which may be illegal to download in your area, so be careful). The forum is

very protective of its content, so youll have to register with a valid email address before you can

even get a glimpse of the content thats on the forums. While I certainly dont want to offer a nod

to any blogs that may be considered competition, you really have to give credit where credit is

due when it comes to a particular niche like hacking and Hack a Day definitely offers an

amazing library of information for anyone looking for specific categories like cellphones, GPS or

digital cameras. Youll find all hacks organized by category in the right column. More than any

other site, this particular hacking site is very much hardware based, and they redefine the

meaning of the word hacking by literally hacking up electronic devices like a Gameboy or a
Security, Personnel, and IS Maintenance 7

digital camera and completely modifying it. Of course youll still find the occasional software

hack, such as how to remove the Blackberry download limit.

On all of the websites that I went to it wanted me to get an account or sign up. In the job I

have I cannot go to the sites and sign up. Security will have a day with me. From looking around

on their sites it really does not show what they use but you can sign up for the class.

5. Using the risk assessment documentation components presented in the chapter, draft a

tentative risk assessment of one area (a lab, department, or office) of your university. Outline the

critical risks you found and discuss these with your class. I am going to put a link in of what we

use for the Navy.

http://doni.daps.dla.mil/Directives/03000%20Naval%20Operations%20and

%20Readiness/03-500%20Training%20and%20Readiness%20Services/3500.39C.pdf
Security, Personnel, and IS Maintenance 8

References

http://www.etechsecurity.com/expertise/certifications/

http://www.first.org/

http://www.makeuseof.com/tag/top-5-websites-to-learn-how-to-hack-like-a-pro/

You might also like