background preloader

SEC Standards

Facebook Twitter

» Jak okrada się karty kredytowe? Czyli o tym jak modyfikacja ustawień przeglądarki pomaga złodziejom we fraudach -- Niebezpiecznik.pl -- Brian Krebs w najnowszym wpisie przybliża narzędzia służące do zmiany fingerprintu przeglądarki. Po co przestępcy chcą zmieniać swój figerprint i jak wyglądają narzędzia ułatwiające kradzież pieniędzy w internecie? O tym poniżej… FraudFox – jedno z narzędzi wykorzystywane w internetowych fraudach przez oszustów Fingerprint — co to jest i do czego służy? Fingerprint to hash, jaki wyliczają skrypty na danej stronie w oparciu o szereg informacji, które uda się im pozyskać od przeglądarki. Pod uwagę brane są np. Za pomocą fingerprintu można całkiem nieźle rozpoznać danego internautę (nawet jeśli zmieni on adres IP). Należy tu podkreślić, że serwis aukcyjny dalej nie zna tożsamości internauty — ale jeśli promocyjna oferta (dobrana na podstawie wcześniejszych zainteresowań internauty) przekona go do zakupu, to z fingerprintem powiązane zostaną dodatkowe dane (pochodzące z konta internauty w serwisie aukcyjnym).

Przypomina wam to mechanizm ciasteczek? Wiele fingerprintów na wyciągnięcie ręki. Security Tools, Templates, Policies. CSOonline's Security Tools, Templates & Policies page provides sample documents contributed by the security community. Feel free to use or adapt them for your own organization.* Want to provide a policy or checklist? *Though not for re-publication or for-profit use. Sample Policies - Computers and Internet Computer and E-Mail Acceptable Use Policy Manufacturing company, <50 employees Internet Acceptable Use Policy Password Protection Policy Large financial services company, more than 5,000 employees Sample Social Media and Blogging Policies From Other Sites Links to examples of the social media, internet posting and blogging policies of several large companies Also see How to Write an Information Security Policy Sample Policies - Physical Security and Emergency Management A 10-Question Guide for Pandemic Planning Clean Desk Policy Service company, 2000 employees Cell Phone Use While Driving Policy Company has many employees who travel frequently Workplace Violence Prevention Policy Book excerpt.

12 terrific tech and security-related TED talks. Webinars. Webinars. Says More than 75 Percent of Mobile Applications will Fail Basic Security Tests Through 2015. Dubai, September 14, 2014 View All Press Releases Analysts to Discuss Latest Mobile Security Threats and Trends at the Gartner Security and Risk Management Summit, 15-16 September 2014 in Dubai, UAE Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner, Inc.

Enterprise employees download from app stores and use mobile applications that can access enterprise assets or perform business functions, and these applications have little or no security assurances. These applications are exposed to attacks and violations of enterprise security policies. “Enterprises that embrace mobile computing and bring your own device (BYOD) strategies are vulnerable to security breaches unless they adopt methods and technologies for mobile application security testing and risk assurance,” said Dionisio Zumerle, principal research analyst at Gartner. Mr. About the Gartner Security and Risk Management Summit Contacts About Gartner Gartner, Inc. Penetration Testing Tool, Metasploit, Free Download. A collaboration of the open source community and Rapid7, Metasploit Pro increases penetration tester's productivity by 45%, prioritizes and demonstrates risk through closed-loop vulnerability validation, and measures security awareness through simulated phishing emails.

Metasploit Pro is the best way to assess risk through a controlled simulation of a real attack. Metasploit Pro Fully Functional 14-Day Trial Get the fully featured trial of the commercial edition for penetration testers and other security professionals. With Metasploit Pro you can: For Penetration Testing Complete engagements 45% faster through higher productivity Leverage the Metasploit open source project and its leading exploit library Manage data in large assessments Evade leading defensive solutions Control compromised machines and take over the network Automatically generate reports containing key findings For Vulnerability Validation For Phishing Awareness Management Metasploit Community Limited Features - No Expiration.

All pages. Incident response. Definitions Edit Incident response is Overview The concept of incident response existed long before industrial control systems (ICS) or computers. The idea is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. The cause of an incident may be unintentional, as in the case of a storm or flood, or intentional, as in the case of an intruder or vandal that breaks into a facility and steals or damages equipment or supplies. Regardless of the cause, it always has been a good practice to prepare for and appropriately respond to negative events affecting the organization.

Computer security incident response has become an important component of information technology (IT) programs. To that end, NIST Special Publication 800-61 provides guidelines for development and initiation of an incident handling program, particularly for analyzing incident-related data and determining the appropriate response to each incident. References See also. Lawmore. Computer use policy - Templates. Information Security Resources | Information Security Policy Templates.

Welcome to the SANS Security Policy Resource page, a consensus research project of the SANS community. The ultimate goal of the project is to offer everything you need for rapid development and implementation of information security policies. You'll find a great set of resources posted here already, including policy templates for twenty-seven important security requirements. Find the Policy Template You Need!

There is no cost for using these resources. Over the years a frequent request of SANS attendees has been for consensus policies, or at least security policy templates, that they can use to get their security programs updated to reflect 21st century requirements. This page will continue to be a work in-progress and the policy templates will be living documents. We'll make improvements and add new resources and sample policies as we discover them. Is it a Policy, a Standard or a Guideline? What's in a name? MonsterMind - Snowden reveals the US proactive defense system.

In his last interview Edward Snowden explained the risks related to use of automated attacks in response to the offensive against the US. Many experts identify with the term proactive defense the possibility to respond instantaneously and in an automated manner a cyber attack, Snowden explained that the US Government is developing a system, codenamed as MonsterMind, that is able to automatically reply to the cyber attacks against the US, but that they can fail in the identification of the source of attacks. A wrong attribution could cause serious problems for intermediate nations, those countries that host compromised systems used in the offensive or that host computers whose IP have been spoofed by bad actors.

“The NSA whistleblower says the agency is developing a cyber defense system that would instantly and autonomously neutralize foreign cyberattacks against the US, and could be used to launch retaliatory strikes as well. Pierluigi Paganini (Security Affairs – NSA, MonsterMind) 0nl1n35h4d0w. Temp for infosec workshop. Ezi007. Part2 - browsersec - Browser Security Handbook, part 2 - Browser Security Handbook. Written and maintained by Michal Zalewski <lcamtuf@google.com>. Copyright 2008, 2009 Google Inc, rights reserved. Released under terms and conditions of the CC-3.0-BY license. ← Back to basic concepts behind web browsers → Forward to experimental and legacy mechanisms This section provides a detailed discussion of explicit security mechanisms and restrictions implemented within browser.

Long-standing design deficiencies are discussed, but no specific consideration is given to short-lived vulnerabilities. Same-origin policy Perhaps the most important security concept within modern browsers is the idea of the same-origin policy. In practice, there is no single same-origin policy, but rather, a set of mechanisms with some superficial resemblance, but quite a few important differences. Same-origin policy for DOM access If protocol, host name, and - for browsers other than Microsoft Internet Explorer - port number for two interacting pages match, access is granted with no further checks. Information Security Forum : The Standard of Good Practice for Information Security. Updated annually, the Standard of Good Practice for Information Security (the Standard) is the most comprehensive information security standard in the world, providing more coverage of topics than ISO.

It covers the complete spectrum of information security arrangements that need to be made to keep the business risks associated with information systems within acceptable limits, and presents good practice in practical, clear statements. The Standard is used by organisations to: improve resilience against the ever changing threat landscape enable compliance with major information security related standards validate information security arrangements in external suppliers provide a foundation for your information risk assessment form a basis for policies, standards and procedures raise information security awareness form the basis of a detailed or high-level information security assessment develop or improve information security in response to changing threats. Information Security Forum : The Standard of Good Practice for Information Security. BYOD Challenges, Recommendations & Best Practices from Box.

Missy Krasner (Box), Daniel Bishop (Qualaris), Mayank Thanawala (HealthLoop), Matt Williamson (Accesa Labs) Come hear how Box is partnering with disruptive companies to streamline workflow in patient safety, care coordination and the delivery of patient lab results. Hear from three different Box customers/partners who have innovative use cases around storing protected health information (PHI) and other patient-related data in the cloud.

Featured Speakers: Missy Krasner, Managing Director, Healthcare & Life Sciences, Box - Moderator Box currently supports over 200 thousand businesses and is a leading provider of HIPAA-compliant cloud storage and content collaboration. Box serves hospitals, integrated delivery networks (IDNs), health insurance plans, and pharmaceutical and medical device companies. Mayank Thanawala, VP of Engineering, HealthLoop HealthLoop, a cloud-based patient engagement platform, offers automated follow up care for patients between doctor visits. Www.isaca.waw.pl.

TRENDS

The security laws, regulations and guidelines directory. This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Each entry includes a link to the full text of the law or reg as well as information about what and who is covered. The list is intentionally US-centric, but includes selected laws of other nations that have an impact on US-based global companies. The security regulations and guidelines directory will be updated and expanded over time on CSOonline.com. Please email editor Derek Slater (dslater@cxo.com) with suggestions or updates. Click on a link to skip to a subsection of the directory: Broadly applicable laws and regulations Industry-specific guidelines and requirements Key state laws International laws Sarbanes-Oxley Act (aka Sarbox, SOX) What Sarbanes-Oxley covers: Enacted in 2002, the Sarbanes-Oxley Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures.

More about Sarbanes-Oxley Link to the law: Www.infosec.gov.hk/english/technical/files/overview.pdf. Security Standards. With the increasing interest in security, ISO 17799 certification, provided by various accredited bodies, has been established as a goal for many corporations, government agencies, and other organizations around the world. ISO 17799 offers a convenient framework to help security policy writers structure their policies in accordance with an international standard. Much of the content of ISO 17799 deals with security controls, which are defined as practices, procedures, or mechanisms that may protect against a threat, reduce a vulnerability, limit the effect of an unwanted incident, detect unwanted incidents, and facilitate recovery. Some controls deal with security management, focusing on management actions to institute and maintain security policies.

Other controls are operational; they address the correct implementation and use of security policies and standards, ensuring consistency in security operations and correcting identified operational deficiencies. Common Criteria. The 2013 Standard of Good Practice for Information Security : Information Security Forum. Other ISMS standards. As well as the ISO27k standards, there are many other ISO/IEC and non-ISO/IEC standards and methods relating to information security, risk management and similar fields. Here is a selection of some of the most widely known and relevant standards and method. If you know of other relevant standards, or if we have incorrectly described any here, please let us know. Quick links Security-related ISO standards ISO 9000 and related SDLC/QA standards The ISO 9000 family of quality management standards define quality as the features of a product or service which are required by the customer.

Quality management is what an organization does to ensure that its products or services satisfy the customers’ quality requirements and comply with applicable regulations. The following standards cover the application of quality management principles specifically to the Software Development Life Cycle: ISO 90003 is being revised and is expected to be released as a Technical Report in 2013.

ISO 15408 Common Criteria.

DO

SEC VENDORS. Meraki. Networks. IT Management. A Gartner Perspective on Evaluating EFSS Solutions_WatchDox. SEC Threats. ISO 27000.