
lundi 16 janvier 2017
Security policy

Security
policy is a definition of what it means to be secure for a system, organization
or other entity. For an organization, it addresses the constraints on behavior
of its members as well as constraints imposed on adversaries by mechanisms such
as doors, locks, keys and walls. For systems, the security policy addresses
constraints on functions and flow among them, constraints on access by external
systems and adversaries including programs and access to data by people.
Significance
If it is
important to be secure, then it is important to be sure all of the security
policy is enforced by mechanisms that are strong enough. There are many
organized methodologies and risk assessment strategies to assure completeness
of security policies and assure that they are completely enforced. In complex
systems, such as information systems, policies can be decomposed into
sub-policies to facilitate the allocation of security mechanisms to enforce
sub-policies. However, this practice has pitfalls. It is too easy to simply go
directly to...
Network security policy

A network
security policy, or NSP,
is a generic document that outlines rules for computer network access, determines how policies are
enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is
usually several pages long and written by a committee. A security policy goes
far beyond the simple idea of "keep the bad guys out". It's a very
complex document, meant to govern data access, web-browsing habits,
use of passwords and encryption, email attachments
and more. It specifies these rules for individuals or groups of individuals
throughout the company.
Security policy should
keep the malicious users out and also exert control over potential risky users
within your organization. The first step in creating a policy is to understand
what information and services are available (and to which users), what the
potential is for damage and whether any protection is already in place to
prevent misuse.
In...
Network security

Network
security consists
of the policies and practices adopted to prevent and monitor unauthorized
access, misuse, modification, or denial of a computer network and
network-accessible resources. Network security involves the authorization of
access to data in a network, which is controlled by the network administrator.[citation
needed] Users choose or are assigned an ID and password or other
authenticating information that allows them access to information and programs
within their authority. Network security covers a variety of computer networks,
both public and private, that are used in everyday jobs; conducting
transactions and communications among businesses, government agencies and
individuals. Networks can be private, such as within a company, and others
which might be open to public access. Network security is involved in
organizations, enterprises, and other types of institutions. It does as its
title explains: It secures the network, as well as protecting and overseeing
operations being done. The most common and simple way...
Job market

Cybersecurity is a
fast-growing field of IT concerned with reducing organizations' risk of hack or
data breach. According to research from the Enterprise Strategy Group, 46% of
organizations say that they have a "problematic shortage" of
cybersecurity skills in 2016, up from 28% in 2015. Commercial, government and
non-governmental organizations all employ cybersecurity professionals. The
fastest increases in demand for cybersecurity workers are in industries
managing increasing volumes of consumer data such as finance, health care, and
retail. However, the use of the term "cybersecurity" is more
prevalent in government job descriptions.
Typical cybersecurity job
titles and descriptions include:
Security
analyst
Analyzes and assesses vulnerabilities in the
infrastructure (software, hardware, networks), investigates using available
tools and countermeasures to remedy the detected vulnerabilities, and
recommends solutions and best practices. Analyzes and assesses damage to the
data/infrastructure as a result of security incidents, examines...
Modern warfare

Cybersecurity is becoming
increasingly important as more information and technology is being made
available on cyberspace. There is growing concern among governments that
cyberspace will become the next theatre of warfare. As Mark Clayton from the Christian
Science Monitor described in an article titled "The New Cyber Arms
Race":
In the future, wars will
not just be fought by soldiers with guns or with planes that drop bombs. They
will also be fought with the click of a mouse a half a world away that unleashes
carefully weaponized computer programs that disrupt or destroy critical
industries like utilities, transportation, communications, and energy. Such
attacks could also disable military networks that control the movement of
troops, the path of jet fighters, the command and control of warships.
This has led to new terms
such as cyberwarfare and cyberterrorism. More and more critical
infrastructure is being controlled via computer programs that, while increasing
efficiency, exposes new vulnerabilities. The test will be to see...
National teams

Here are the main computer
emergency response teams around the world. Most countries have their own team
to protect network security.
Canada
On October 3, 2010, Public
Safety Canada unveiled Canada's Cyber Security Strategy, following a Speech
from the Throne commitment to boost the security of Canadian cyberspace. The
aim of the strategy is to strengthen Canada's "cyber systems and critical
infrastructure sectors, support economic growth and protect Canadians as they
connect to each other and to the world." Three main pillars define the
strategy: securing government systems, partnering to secure vital cyber systems
outside the federal government, and helping Canadians to be secure online. The
strategy involves multiple departments and agencies across the Government of
Canada. The Cyber Incident Management Framework for Canada outlines these
responsibilities, and provides a plan for coordinated response between
government and other partners in the event of a cyber incident. The Action Plan
2010–2015 for Canada's Cyber Security Strategy...
International actions

Many different teams and
organisations exist, including:
The Forum of Incident Response
and Security Teams (FIRST) is the global association of CSIRTs. The US-CERT,
AT&T, Apple, Cisco, McAfee, Microsoft are all members of this
international team.
The Council of Europe helps
protect societies worldwide from the threat of cybercrime through the
Convention on Cybercrime.
The purpose of the Messaging
Anti-Abuse Working Group (MAAWG) is to bring the messaging industry
together to work collaboratively and to successfully address the various
forms of messaging abuse, such as spam, viruses, denial-of-service attacks
and other messaging exploitations. France Telecom, Facebook, AT&T, Apple,
Cisco, Sprint are some of the members of the MAAWG.
ENISA : The European
Network and Information Security Agency (ENISA) is an agency of the
European Union with the objective to improve network and information
security in the European Union.
Europe
CSIRTs in Europe
collaborate...