Home
        The report can be accessed and downloaded here.
         Contents
1.    Email    Email is another very common vector for malware  Blocking links in email  or at the  very least  masked links   scanning attachments  or banning certain high risk  extensions  such as  exe from being sent as attachments  reduce the risk of email  significantly  Banning attachments altogether and using a secure drop box might  also be an option     Content filtering  or filtering out suspect email origins might help weed out spam or  email based attacks before they arrive  Employees should also be trained to  recognize deceptive email techniques  Adopting the use of digital signatures in  emails may help make telling real messages from fake ones easier     Despite all these countermeasures  however  it s still possible that malware may find  its way into a network  Luckily  there s another line of defense  To begin with   simply having anti malware programs installed on all company devices is an  excellent countermeasure  Locking down end users is also helpful   malware has to  install itself  and if the user does not have the permission to install things on the  computer they are on  the malware cannot install  Keeping track of all programs  and changes on company computers  and reviewing this information can also show  infections     whitelisting     or only giving permission for certain programs to run can  go hand in hand with this measure  Finally  deep packet inspection using a device  such as an intrusion detection system  or IDS  can identify malware signat
2.    Hashing refers to  changing a piece of information to a long  scrambled  and unique pieces of data     Hashing makes a password impossible for an attacker to read  but if two users  happen to have the same password  the hashing algorithm will generate identical  strings of gibberish for each of them  So  if a hacker has access to a large number of  passwords  it s easy to look for patterns like this and decode all of them at once    Salting  prevents this  Salting refers to the practice of adding a small  random piece    of data to the password before it is hashed  so that identical passwords will appear  completely differently when stored     Authorization    Once the person has been identified as a valid user  the next step is to determine  what they should have access to  It might be tempting to simply give all users the  ability to do anything   and this might work in a very small environment   but the  key to keeping information safe is the principle of least privilege  This principle  simply states that any user of a system should have access to exactly what they need  to perform their job  but nothing more  By maintaining the principle of least  privilege  we re able to minimize the damage that can be done by an angry  employee  or by an attacker who has stolen someone s authentication credentials to  get access to the system     Actually determining who should have access to what information can become quite  complex  Although entire books have been written on the 
3.   Are they using a sufficiently strong and safe standard  Who  controls the keys  If they do  how can you be sure that your data is safe and the  keys properly stored  If you control the keys  what happens if a key islost  Can the  encrypted data be recovered     Lastly  as we covered earlier with ports and services  having the minimum number  of programs and tools needed for the job   referred to as the principle of least  function   is often vital for maintaining security  If the cloud provider makes  services available that the client doesn t need  is it possible to turn them off or  restrict their use     Accidents  Disasters  Recovery  and Continuity    Sooner or later  accidents or disasters are bound to occur  and can potentially cause  far more damage than any hacker  The impact of these mishaps should be  minimized  recovery planned in advance  and measures put in place to maximize  capacity during and after the event     Types of Accidents    Disasters can be anything as simple as a power outage to as cataclysmic as a major  earthquake  Anything that causes a power loss or cuts a connection can impact a  customer s ability to connect to a cloud provider  Accidents can happen on either  side of the connection as well  and can less predictable and even more damaging  than a disaster  This can include something like inadvertently reformatting the  wrong hard drive to spilling a drink on a server rack  Lastly  simple wear and tear  will eventually cause equipment to sta
4.   Dirking  B  Kodali  K   2008  June   Strategies for preparing for E discovery  The Information  Management Journal  Retrieved from  http   www  oracle com us products middleware content management 059431  pdf   DNS cahce poisoning  The next generation   2007  August 13   Dell SecureWorks  Retrieved  from http   www  secureworks com resources articles other articles dns cache poisoning    Dou  W   Chen  Qi   Chen  J   2013  September   A confidence based filtering method for DDoS  attack defense in cloud environment  Future Generation Computer Systems  29  7    Retrieved from http   www sciencedirect com science article pii S0167739X 12002312   Ducklin  P   2013  August 16   Anatomy of a brute force attack   how important is password  complexity  Sophos  Naked Security  Retrieved from  http   nakedsecurity  sophos com 2013 08 16 anatomy of a brute force attack how   important is password complexity    Eisner  D   2014  April 14   Overcoming cloud storage security concerns  Seven key steps   CircleID  Retrieved from  http   www  circleid com posts 20140425 overcoming cloud storage security concerns  7 key steps    Emigh  J   2013  September 27  How to secure your laptop PC  Notebookreview com Retrieved  from http   www  notebookreview com howto how to secure your laptop pc    Gabriel  C   2013  January 21   No BYOD policy  Time to grasp the nettle  CXO Unplugged   Retrieved from http   cxounplugged com 2013 01 byod policy    GadAllah  S   2003  December 30   The importance of
5.   June 13   Malvertising  The use of malicious ads to install malware  Infosec  Island  http   www infosecisland com blogview 14371  Malvertising The Use of   Malicious Ads to Install Malware html          
6.  Lee  R   2001  October   Remote Denial of Service Attacks and Countermeasures   Princeton University Department of Electrical Engineering Technical Report  Retrieved  from  http   www  princeton edu  rblee ELES572Papers karig01DoS  pdf q tilde rblee ELE572P  apers karig01DoS  pdf   Laptop computer security policy  n d    Internal revenue service manual  Retrieved from  http   www irs gov irm part10 irm 10 008 026 htmlZd0e245   Lemos  R   2013  November 18   Enterprises should practice for cloud security breaches   Darkreading com  http   www darkreading com risk enterprises should practice for   cloud security breaches d d id 1140912    Los  R   Shackleford  D    amp  Sullivan  B   2013  February   The Notorious nine  cloud computing  top threats in 2013  Retrieved from  https   downloads cloudsecurityalliance org initiatives top threats The Notorious Nine  Cloud Computing Top Threats in 2013 pdf   Mell  P   Bergeron  T   Henning  D   2005  November   Creating a patch and vulnerability  management program  National Institute of Standards and Technology  Retrieved from  http   csrc nist gov publications nistpubs 800 40  V er2 S P800 40v2 pdf   Mell  P   Grance  T    2011  September   The NIST definition of cloud computing  National  Institute of Standards and Technology  Retrieved from  http   csrc nist gov publications nistpubs 800 145 SP800 145 pdf                                                                            Mogull  R   2011  March   Incident response process 
7.  These  brand new attacks  called  zero day exploits  are vulnerabilities no one has ever  seen before  No one  that is  but the attacker using them  Against this kind of attack  there s little defense  but once the attack is analyzed and countered  computer  security firms and the producers of the affected software or hardware will issue a  patch to fix it  However  these patches work only if they are installed     For this reason  all network devices  servers  and computers  as well as all the  programs on them  must be kept up to date and secure  Often times  this requires  restarting the device in question  If the device is a personal computer  the user may  keep putting it off  If the device is a server  turning it off may need to be done at a  special time or a special way to avoid disrupting your business  Any safety savvy  company should have a plant to make sure these patches are installed soon after  they are issued  and that the network and its devices are always up to date     Ports and Services    Every open port or running service on your network is a potential vulnerability   especially if that port  faces   or is accessible from  the Internet  However  we can t  simply close all network ports  because then there s no point in having a network or  Internet connection at all  The key is to close all ports and services that are not in    use and block them with a firewall  For some ports this is especially vital  as they  are inherently unsecure  For instance  th
8.  centric threat  No security solution is complete without addressing this  menace     Malware often comes into a system via browsing the Internet or via email   Browsing is particularly germane to a cloud user  considering the same program  they re using to access their cloud service could simultaneously be downloading a  key logger onto their computer     Browsing    Disabling browser plug ins and client side scripts and languages such as ActiveX and  JavaScript go a long way towards making browsing a safer experience  However   this may not always be practical  At the very least  these programs should have to  ask permission before running     A good browsing policy   one that restricts traffic from going to high risk sites from  work computers   might also help lower risk  Other measures to consider are  having one browser for work and one for play  or restricting leisure browsing to a  virtual machine   a simulated computer inside a computer that is largely separate  from the environment that hosts it     Sometimes malware may arrive even through relatively safe sites via malicious  advertizing  This attack vector remains a problem because pinning down who  exactly is responsible for tackling it has proven tricky  Keeping browsers and Adobe  Flash patched and up to date and blocking pop ups may help  Blocking ads from the    ad firms most notorious for providing malicious ads has been shown to dramatically  cut down on the number of  malvertisements  companies encounter  
9.  logging and traffic monitoring for  information security  SANS Institute InfoSec Reading Room  Retrieved from  http   www sans org reading room whitepapers logging importance logging traffic   monitoring information security  1379   Grobauer B   Walloschek T    amp  Stocker E   2011  August 15   Understanding cloud computing  vulnerabilities  Retrieved from www infoq com articles ieee cloud computing   vulnerabilities   Halley  B   2008  October 20   How DNS cache poisoning works  NetworkWorld com  Retrieved  from http   www networkworld com article 22773 16 tech primers how dns cache   poisoning works html   Harbert  T   2012  April 23   E discovery in the cloud  Not so easy  Computerworld  Retrieved  from                                                                      http   www  computerworld com s article 9226375 E  discovery in the Cloud taxonomy  Id 19 amp pageNumber 1   Honorof  M   2013  July 29  How to secure your cloud storage  Tom   s Guide  Retrieved from  http   www  tomsguide com us how to secure cloud storage review 1799 html   How to secure your TCP IP ports   2009  September 9   PC Plus  Retrieved from  http   www techradar com us news networking how to secure your tcp ip ports   633089 3 22 20  20 22articleContent   Hubbard  D    amp  Sutton  M   2010  March  Top threats to cloud computing  Retrieved from  https   cloudsecurityalliance org topthreats csathreats v 1  O pdf   Hurst  D   2009  October 29   Cloud security and it s  sic  effect on applicati
10.  needs  this is potentially a vulnerability that many cloud clients will simply  have to accept     Metering    The cloud introduces other problems with trust as well  These are often related to  how the cloud provider handles your information  For instance  a two way risk in  this regard is the possibility of metering manipulation  Both sides must work to  make sure that no attacker or malicious insider is tinkering with the amount owed  to the cloud service provider  In addition  procedures should be in place to deal  with a scenario in which the cloud client s account is hijacked by an attacker who  runs up an enormous bill on the client s account     Ancillary Data    It s also important for a cloud client to know exactly how the ancillary data they  provide to a cloud service is being stored  used and protected  This includes things  like payment information  but can also include less obviously sensitive but still  revealing information derived from usage habits  or even data mined from the files  you have uploaded to their system  Many cloud companies may keep this  information private  but asking about how this kind of data is used is still part of a  client s due diligence     Insider Threat    Unavoidably  there s the potential of an insider threat  These can be either  malicious  or simply accidental  Using good authorization practices within your own  network can help reduce the damage done by an insider  but in the cloud it may not  be apparent who a potential ins
11.  network at any  given time     Ideally  logs should be recorded in a centralized database or file system  Some  devices may send out only summaries  or use a proprietary logging format  so be  sure your logging method can account for these potential problems     Logs must contain certain key pieces of information  including who  what  where   and when  The  when  is particularly sensitive  and relies on properly implemented  Network Time Protocol  or NTP  Without precisely accurate and synchronized time   it may prove impossible definitively identify prosecute attackers  The log should  also contain information on the severity of the event  which is score from 0  highest   to 7  lowest   Each event should use the lowest appropriate severity     Which events should be logged vary from company to company  but keep in mind  that they are your main record of any potential problem or attack  Certain high risk  events  such as failed logins  or the granting of new user privileges should almost  always be logged  Information that points to possible attacks or malfeasance should  also be logged     There are also things logs should not contain  Sensitive information  such as  passwords or encryption keys should never be logged  nor should any private    information  It may be possible to log semi sensitive information in some  circumstances  provided that it is scrubbed out when the log is displayed     Log information must be protected both in storage an in transit  as it is an imp
12.  of devices that    connect the network to the internet  such as routers and firewalls  set up to take the  full load should one fail  For a cloud provider  this might involve contracts with  multiple power companies for their data centers  and massive redundancy in power   Internet and cooling connections    Backups    Backups are a must for any company with electronic data  There are three different  kinds of backups   cold  warm  and hot  Cold backups involve writing old data onto  formats like tapes  which are secure  but take a long time to recover from  Hot  backups often involve mirroring   that is  copying an entire database or production  environment  and automatic failover  so that should one database fail  the other will  immediately pick up with little or no downtime  A warm backup is somewhere  between the two extremes     Likewise  backup locations come in similar flavors  A cold backup may simply be a  reserved space with little or nothing in the way of hardware or backup data on  hand  whereas a hot backup is a complete reproduction of the original facility  with a  warm backup  again  being somewhere in between     Another thing to consider is where the backup is physically located  If the backup is  in the same geographic area  or worse  in the same building  it will likely be affected  by a disaster in the same way the original data or location would be     In addition to planning for these contingencies themselves  a cloud adopter must  also learn what pla
13.  set amount of time  the completion of a project should trigger the review  of the documents it generated  The easiest way to do this is with a centralized  system that can support these policies     When a lawsuit is pending  the client must quickly inform all of their IT staff   including their cloud provider  who must be able to protect data from further  alteration and deletion  Actually retrieving the data involves the ability to provide  an audit trail for all documents  provide data in its original format  and preserve file  metadata  It may even involve forensic analysis of the memory medium     Can your cloud service provide this  You should hope so  Failure to comply with   eDiscovery can result in your entire database being opened to the opposing party   huge fines  or even the reversal of the burden of proof  Since any company can be  sued  everyone should take this very seriously     Conclusion    Although cloud adoption is not simple  nor is it for everyone  it s important to keep  in mind  that  done right  it can save your company money  allow an increased focus  on your core product or service  and increase security all that the same time  The  important thing is to plan ahead  keep security in mind  ask the important questions   and get everything in writing  Despite the fact that shared responsibilities can make  things a bit complicated  overcoming this obstacle is both possible  and often times a  profitable undertaking    References    A guide to network
14.  vulnerability management   2012  August 9   Dark Reading  Retrieved from  http   www  darkreading com attacks breaches a guide to network vulnerability   management d d id 1138344    Ashford  W   2013  August 2   Cloud service providers often not set up for incident response   Computer Weekly  Retrieved from  http   www computerweekly com news 2240203007 Cloud service providers often not   set up for incident response   AT amp T Distributed Denial of Service  DDoS  Defense   2014   AT amp T Product Brief  Retrieved  from http   www business att com content productbrochures ddos prodbrief pdf   Authorization and permissions in SQL servers   n d    Microsoft developer network  Retrieved  from http   msdn microsoft com en us library bb669084 vzvs 110  aspx   Badger  L   Bohn  R  Chu  S   Hogan  M   Liu  F   et al   2011  November 1  Useful information  for cloud adopters  US Government Cloud Computing Technology Roadmap  Volume II   Release 1 0  Draft   National Institute of Standards and Technology  Retrieved from  http   www  nist gov itl cloud upload SP 500 293 volumell pdf   Balding  C   n d    Cloud storage  Cloudsecurity org  Retrieved from  http   cloudsecurity  org cloud storage html   Basic security practices for web application   n c     Microsoft  Retrieved from  http   msdn microsoft com en us library vstudio zdh19h94 vzvs 100  aspx   Barker  E   Barker  W   Burr  W   Polk  W   and Smid  M   2012  July   Recommendation for key  management     Part 1  Retrieved from 
15.  without any of the controls     Authentication is one of the main issues   typing in a strong password on a small  smartphone screen is a real problem  and if repeated login attempts lock down or  wipe the phone  it s likely to happen a lot  It s possible to take measures like  installing security software  or trying to protect the phone from malicious apps by  using a  blacklist  that bans known troublemakers  but the former tends to  aggravate users  and the latter is hard to keep up to date  In addition  users have a    great deal of power to bypass security protocols on phones they own  and catching  them can be difficult     To counter this  it s often easier to try and secure the data instead of trying to secure  the phone platform  Encrypt any data sent to the phone  Use role based  authorization to limit what a user can access or store  or consider allowing access  only to pre approved information and content  Try  sandboxing  work applications  on the phone   that is  running them in their own separate environment apart from  the rest of the phone s operating system  This has the added advantage of requiring  tough authentication only when trying to access valuable data  Also  if the phone is  lost and a remote wipe becomes necessary  it may be possible to remove only  proprietary work information instead of deleting all of the users personal data     Using a centralized management system has advantages as well  Keeping track of  what data has been sent where and ac
16. 14    Spring       Cloud Transparency Initiative       Jordan Atwood  Doug Wynkoop     Type the abstract of the document here  The abstract is typically a short summary of the  contents of the document      Information School  University of Washington  2014 Capstone    Table of Contents       Setting the SEMEL ob ESIERPE HORIS PAPOHUPS TX pPAPOp OPI REEF EREPEPPRU Dei PR VU n lun rei aa cu aE MGR PA E da a e E Od 4  bird Ro ciwppp eme T                      5  Authentication and Accountability                                   ecce eee eere ee eese eene nana enne e e nana aae nnen 5  Authentication    ea t ha Pere std a fate eee Ie dic pues extenta e o c Hope ue ue re cea deno na 6  JAWILAN ToN AEREE                                                                    8  Network SECUN asap ier PERSE QUEM FE IE D DEREN EPI T eunis inate sees 9  Terminology   Supply Chain   Physical Security  2nd gueieieietebtcmek pe ER ie Pol ER deo che MIENNE E eM 10  Removable Media    cessssessessstessssssesssessecssessseessessesestesneeeseecnsesseeeneesueesseesueessecaneesteeasesseeeseesueeeaeesaseeaeesneeseenseesaeeasees 11  Ludum                        11  Ports and Service S  iiniiisissrisunnnaninaiaaniinaniakieranianvi tanier aniani iniia taninan aiaiai aaiae ie iait ainan da niai 11  Network DMZ isina aaa e a a ae a Meade       12  Defense in Depth and Segregation              sssssusssiusinrunrnsnnrnrnnnttrnettrttrerttrnrrtrerrennrrerereerertererrersstsrsntsnssrsnssnssnsn nsns 12  Wire
17. How old are they  How competitive are they in their space  Are other customers  pleased with the service they re getting  Are they making money  or are they in the  red  And finally  what will happen should the company fail or be bought out     Have they oversold their service  This is a common practice among cloud  companies   they may not have enough backup capacity in case they experience  some kind of failure  or be in the habit of compressing client s files  Should a file be  corrupted and clients begin to panic  this can lead to a  run on the cloud  if  something goes wrong  Network connection speed could also just normally be very  low  sometimes for reasons the cloud provider themselves control  Be sure the  connection is fast enough to actually move your data back and forth as needed     Cloud Organization    Proper security requires that certain organizational conventions be met  Most  importantly  there must be a segregation of duties  especially between the people  who design a company s security architecture and those who implement it   Comingling these responsibilities can lead to conflicts of interest  too little oversight   or too much power in the hands of too few  In addition  it s good to know the size  and experience of the company s security staff  How many problems can they  handle and once  What s their record on dealing with security problems     Cloud Risk Management    How a company deals with risk is also extremely important  The priorities of a  cl
18. To try and find admin pages  attackers may make use of a simple kind of attack  called a forced browsing attack  Some website or web service administrators  believe that simply not linking to a page and giving it an obscure name means no   one will be able to get to it  This is not actually the case  especially since  administrator pages have predictable names  and hacking tools allow very thorough  explorations of website structure  This becomes an extremely serious problem in    sites with multiple levels of functionality   like customer  employee  manager   admin  etc  In order to keep these attacks from working  each page must be tied to  an authentication authorization level  not simply hidden from view     Cloud APIs    Many cloud services provide an API  or application programming interface  This  allows cloud clients to write programs that can interact directly with the service   APIs are great tools and allow for powerful customization  but they can also be  potential weak points in the security of the cloud system  A cloud provider should  be able to certify that this interface is free from vulnerabilities  and that using  responsibly it will not weaken the security of your cloud deployment     Malware    Malicious software  or malware  is possibly the greatest security threat to any IT  infrastructure today  It can be used to delete  steal  alter  or even hold data ransom   Traditional network security tools  such as firewalls  are of little help against this  data
19. ally in mind  such as ZigBee  are more secure  but also more costly     More and more companies are adopting RFID tags  These are small tags that can be  attached to just about anything and used to store information  This can be  extremely helpful in inventory management  shipping  maintenance logging  and  more  Passive tags can only be read from about three feet away  but active tags   which have a small battery  can be read from much further away from that     As convenient as these little devices may be  most to not support authentication   encryption  or activity logging  As a result  anyone can read or change the  information on these tags  if the tags are writable  without leaving any evidence  that they have done so  Although solutions for this problem are up and coming   RFID tags should be considered largely insecure for the time being     Work Laptops    Another way data can bypass a network s security is via laptops and other mobile  devices  If the company owns the laptop  then it can use all of the same security  controls that it would ordinarily use on a given company machine to keep it safe    enforcing updates  for instance  or disabling boot from USB or CD  a measure that s  very important to take with these devices  However  there are two new major  vulnerabilities introduced by a laptop that can be removed from the building   loss   and use over unsecured networks     Loss can be addressed in a number of different ways  For starters  there are various  dif
20. an target everything from  hardware to applications with the intent of consuming bandwidth  processing  power  or service space until something breaks  Attacks can be recognized via  signature similar to malware  or by unusual activity     DDoS and ISPs    DDoS attacks  which are among the most famous and common of these attacks   simply try to overwhelm an internet site or service with meaningless web traffic  from an army of malware infected computers until the site crashes  The goal of the  entity being attacked is to sort out the good traffic from the bad  This can be done  by shutting down while the attack is happening  shifting to a new IP address to try  and buy some time  or by trying to filter out the bad traffic from the good on the fly   Some cloud providers and ISPs offer this last option as a premium service     Properly secured ISPs and DNS servers make this kind of attack much harder to  accomplish  Your cloud provider should definitely have a plan to deal with this kind  of attack  which may involve a special arrangement with their ISP     From the client side  simply having two ISPs in case one fails is a relatively good way  of mitigating this threat     Data Deletion  Preservation  and Storage    One of the biggest problems with storing data in the cloud is that it s not always  clear where the data is being stored  If the cloud company is contracting with  another cloud company for this service  it s possible they might not even know  themselves  However  
21. ccess any system they are authorized to use  This can greatly simplify the  problem of generating and remembering dozens of passwords  However  it may be  necessary to exclude administrator accounts from this system  Administrators often  have broad abilities to issue permissions  add or remove programs  and other high   value  high risk tools that are attractive targets for hacking attacks  Making access  to these tools easier could be counter productive to security     Extra care should be taken if you plan to use biometric information in your  authentication plan  While you can change a password  everyone comes with only  one set of fingerprints  Once stolen  a retina scan or thumbprint is current forever   If it s possible to avoid storing actual copies of this data  itis highly advisable to do  so     Storing authentication credentials is also important  In order for a system to  determine if a user has given it the right authentication information  it must store a  copy of this information somewhere  That means that copies of passwords   biometric data  or security certificates will be kept somewhere on the network   Because it has to be able to be accessible even to people who are not authorized  users of the system  this information may be at risk     It s wise to assume that a determined attacker can eventually access stores of user  names and passwords  Although it may be acceptable to store user names without  protecting them  passwords should be  hashed and salted
22. cessed by who boosts security and  accountability  Finally  educating employees on responsibilities and mobile phone  risks complements these other methods and addresses what is often the weakest  point in any IT system   the end user     Application Security    Any application that runs on your network also should be vetted  Whether  malicious or not  a bad application can destabilize your machines  cause crashes or  data losses  or even compromise your security  To ensure that the programs you  run are safe  it s possible to get them scanned for vulnerabilities  This is not an  inexpensive process  and is not one that can be done in house  so working with the  vendor and a third party scanner may be the best way to go  Scanning applications  you have developed in house may also be advisable     These scans can be done if you have either the source code of the program  or just  the executable file  They can reveal a number of weaknesses  including  dead  or  redundant code  as well as branches  a term that refers to possible security  problems built into the code  which may be accidental or maliciously installed  back  doors  that can allow an attacker unauthorized access     Finally  although this may go without saying  it is absolutely vital to change all  vendor default user names and passwords on all computers  servers  and network  devices  You may laugh  but this is a shockingly common vulnerability around the  world     At this point you may be wondering what all of t
23. cks   users to not have to be physically connected to the network to access it   and once a user is on a wireless network  it can be difficult to tell who they are and  where they are located     Keeping users off of a network involves using strong authentication paired with a  good wireless encryption system  Today  the best kind of wireless encryption is the  WPA2 protocol  Without both of these in place  it may be possible for a nearby  attacker to read traffic being sent over your wireless network  WEP  an older  protocol  is now out of date and no longer provides adequate security     For larger companies  centralized administration of wireless access points can not  only allow for advanced functions such as wireless roaming   that is moving  seamlessly from one wireless access point to another as you move around the  building or campus   but can also allow administrators to use new  advanced tools  that can physically locate and identify devices on the wireless network  For smaller  companies  or companies with lower security requirements  these tools may be  overkill     Bluetooth is another commonly used wireless technology  However ubiquitous it  may be  Bluetooth was not designed with security in mind  Many devices have  Bluetooth discovery left on by default  which may allow an attacker access to the  device  Further  Bluetooth encryption and authentication are viewed as lacking by  some security professionals  Alternative protocols designed with security  specific
24. curity incident     Access to the Cloud    Even if your cloud deployment is as secure as can be  that doesn t do you any good if  you can t access it  A cloud provider should easily be able to tell you information on  their  up time   or how reliably they re online  but there are other factors consider  as well     DNS    One potential area of attack for either your website or the cloud provider s portal is  an attack on your domain name server  or DNS  called cache poising  DNS s take in  text Internet addresses   like    www google com     and turn them into numeric IP  addresses computers can understand  A cache poisoning attack will cause a DNS  server to route traffic to the wrong site  which can be loaded with malware or  attempt to steal a user s authentication credentials or other information     There are a number of technical countermeasures a DNS can take  but most small  companies do not run their own DNS servers  which means these measures may be  out of your hands  Running the most recent version of the Berkeley Internet Name  Domain  BIND  system  as well as using tools like DNSSec  can help a DNS resist this  kind of attack  Clients can check a websites security certificate or use a VPN  connection to ensure they re really at the right place     DNS servers  individual websites  and even entire Internet service providers are  vulnerable to Denial of Service and Distributed Denial of Service attacks  These  attacks are designed to force a service offline  and c
25. e ELI MI 22  Dir os  UT                                      22  Injection Attacks   seo e eode Beenie vache ieee ve exerted acte ue 22  opel qaum                          23    AAMI iucre 23    Forced BrowsSing      23    Glo  d APIS  etenim dM UM IM TI 24  UE ra a  UT            E      m 24   BOWS O E                     lune 24   lnulpm                                              25   Social Engineering  c d te M Uo be ah oce et t be i ii 25  Shared Environment and TFrUSE irr enero sea PEE P Py FRE ER EX R E FREE RE Ya P3 EE Eo snes REP E erise OVV PR VER so EE Ve EUER 26  Co TENGO E 26   Wa a E 1 vases E E A E E E E E A E E 26   ROSE i e Lu EAE MEN cect A A ON 26   Processing nosa a A OMM a aE vans aegecesuriuascayadaenrascesarscnipedtscansels 26  lusu cC                                     27  Ancillary  Data  ient tla Dis ferta iet ipo eect a a octaua occas 27  maider Thre  t     itecto ido de ite E OE ed si n M Pet cd Ped 27  Incident Response    dece aute inte Ded bec ctc cete a aco Qe e te LA rude 27  Access to the CIGUO saisir riri s rei SEE PERSE PIA FIR EIS EET Ve Reve EIE E VEa RO ERE 28  D M                       MM                             28  DDoS andISPsxscessosetesesssepeLnedueRemiM dE ML IIT 29  Data Deletion  Preservation  and Storage                             11e eee eene eee eene e e eene nnn nnn nnne n nn 29   ofer iuto  ru c                                                    E 29  Data REMANENCE         ccsesscsssescssssssssssssseessescecsssssass
26. e Telnet service allows a computer to  remotely execute commands on a machine that has Telnet running  while remote  administration allows a foreign computer to entirely take over a machine with the  service enabled  Unless there is a pressing need for one of these high risk services  to be running  turn them off     Network DMZ    Once a network is connected to the Internet  it s faced with a problem  Allowing just  anyone to try to connect to internal company infrastructure is deeply risky  but  there are some systems that must face the Internet to work  such as email servers   To solve this problem  most network admins create a demilitarized zone  or DVZ   between the company and the internet     There are a number of ways to set this up  but among the safest ways is to have one  layer of firewalls between the DMZ and the internet  and another  more restrictive  layer of firewalls separating the DMZ from the company s networks  This has the  dual benefit of allowing services in the DMZ to run with the most security they can   while providing multiple layers of security between sensitive company information  and potential attackers     A number of services and security devices can  and often should  be located in the  DMZ  Some of these include services that absolutely must face the Internet  such as  email servers  authentication servers  and VPN servers  Security systems that might  be present in the DMZ include intrusion detection systems  which inspect incoming  and out
27. en if someone is  listening in  or the data goes to the wrong place  the only thing that will spill out of a  secured area is almost pure gibberish to anyone without the encryption key     Rest    Similarly  data at rest also has the potential to leak over or even to be accessed by  other people in the cloud environment  This is especially true with deleted data   which will be covered in more detail later  In addition  it s impossible to know who  exactly at the cloud company might be looking at your information without your  knowledge or permission  The solution  again  is encryption     For these data encryptions to work  you must manage the encryption yourself  or  select a so called  zero visibility  cloud service  that encrypts your data for you  but  hands over all of the keys  However  potential flaws have been found even in these  services when moving data around in the cloud     Processing    The last place data is at risk in the shared cloud environment is in processing  This  is perhaps the most difficult place for an attacker to compromise or for a mistake to  be made  which is fortunate because of the dearth of good countermeasures  currently on the market  Most operating systems and processors were not designed  to keep data separate in processing  those used in most cloud systems are no  exception  Some companies  such as Green Hills have designed chips and operating  systems specifically for this task  but they have not been widely adopted  Depending  on your
28. es something unique about a user  like a thumbprint or retina pattern     Generally speaking  the more things a system checks   often referred to as   authentication factors    the more certain and secure the authentication is   However  this also has to be balanced against ease of use     The password is the most common kind of authentication currently in use today   Although passwords can be tricky to remember and awkward to use  alternatives  may not be available  Because ofthis  it s necessary to take a moment to talk about a  few vulnerabilities of passwords and how to counter them     The simplest attack on passwords is for an attacker to simply keep guessing things  until they get it right  This may sound like it would take forever  but if passwords  are done incorrectly it may become viable     Most of  brute force  attacks are done using an automated program that will do the  guessing for an attacker  Using passwords comprised of dictionary words  birth  dates  names  or  keyboard walks  like    12345qwert    are very easy for a password   cracking program to guess  If the program is allowed to make guesses as quickly as  the authentication server will respond to it  an attacker may be able to try  thousands  if not millions of attacks in a very short amount of time     One way to counter this is by requiring strong passwords that require the use of  numbers  lower and upper case letters  and special characters that are at least eight  characters in length  Some expe
29. ferent kinds of anti loss and anti theft software and hardware available  This  includes GPS tracking software and a variety of locks  safes  and security devices  that can be physically attached to the laptop     Encryption can make the device useless even if it is completely lost or stolen  There  are two ways this can be done  One way is to encrypt the entire hard drive  This  makes the laptop nothing more than an expensive paperweight to a prospective  thief  but once the laptop is powered on and unlocked it is relatively unprotected     The other method is to use file level encryption  where sensitive files are locked  down individually  This means that even if the computer is stolen while powered on  and unlocked  a thief would still not be able to access sensitive data  On the other  hand  they would have access to anything else on the device  Choosing how to  encrypt work laptops is largely down to how they are to be used and the needs of  each individual company     BYOD    Bringing your own device to work  or BYOD  is becoming increasingly popular   especially when work can benefit from the use of a smart phone  However  adoption  does open a can of worms  Questions arise about who is responsible for the device   how they should be supported  who repairs them if they break  how they should be  integrated into the company   and all of this has to be made easy to really see the  benefit of this kind of program  Worse  these devices have all the risks of a work  laptop
30. going traffic for suspicious activity  and proxy servers  which can enforce a  company s browsing policy and can hide the architecture of your network from  anyone observing your outgoing traffic     Defense in Depth and Segregation    Putting up multiple barriers between an attacker and vital infrastructure  like the  multiple firewalls in a DMZ  is a strategy known as  defense in depth   Since  compromise of at least one layer of security is likely  using multiple layers can help  give security professionals time to identify the attack and stop it before it reaches  vital data and processes     To further help a defense in depth goal  certain portions of the company s internal  network may be segregated from each other depending on the sensitivity of the data  each part contains  This can be done through the use of virtual networks  which  allows for the multiple networks to all share the same hardware  internal firewalls   or even complete physical segregation     Wireless Technologies    DMZ architecture is good for separating the physical infrastructure of a network  from the potential harm   but what about the infrastructure that isn t physical   There are a number of wireless technologies that can greatly benefit companies to  use  but all of them come with their own risks as well as their rewards     Wireless networks are among the most common kinds of wireless technology  and  see a lot of use in both home and business contexts  However  they have two serious  drawba
31. his network security has to do with  a safe cloud deployment  For one  a cloud deployment is only as secure as your own  network  Even if your provider had the best security in the entire world  if your end  of the equation is unsafe it s all for naught     The other reason is that cloud providers have their own corporate networks  and  cloud solutions use network technology to run  This means that the cloud company  should be addressing the potential vulnerabilities and using some or all of the  controls mentioned here to keep themselves   and their clients   safe     Since this kind of information is often proprietary or secret  however  it may be that  the company is reluctant to give you details on the effectiveness and  comprehensiveness of their network countermeasures  As I will reiterate over the  course of the paper  it will be up to you as a customer to demand that they provide  enough information that you can make an informed risk decision     Logging  Auditing  and Monitoring    Logs    Logs are simply records of what your network has been doing  Every device on your  network will generate some sort oflog  Although often dry and tiring to read  logs  are absolutely vital security tools  Logs are used to determine what normal  behavior in a system looks like so that anomalies can be detected  and are one of the  only ways to catch intruders and fix gaps in security measures  Without logs  there  is little an administrator can actually know about the status of their
32. http   csrc nist gov publications nistpubs 800   ST sp800 57 part  rev3 general pdf   Beckham  J   2011  May 3   The top 5 security risks of cloud computing  Retrieved from  http   blogs cisco com smallbusiness the top 5 security risks of cloud computing    Bird  J    amp  Manico  J   2014  April 7   Attack surface analysis cheat sheet  OWASP  Retrieved  from https   www owasp org index php Attack Surface Analysis Cheat Sheet   Bresnick  J   2013  July 25   Does cloud computing threaten patient privacy  data security  Health  IT Security  Retrieved from http   healthitsecurity com 2013 07 25 does cloud   computing threaten patient privacy data security    Brute force attacks   n d    Wordpress org Retrieved from  http   codex wordpress org Brute Force Attacks   Butler  B   2014  April 21  Even the most secure cloud storage may not be so secure  study finds   Network World  Retrieved from http   www networkworld com article 2176237 cloud   computing even the most secure cloud storage may not be so secure  study finds   html   BYOD Bring your own device   n d    Dell com  Retrieved from  http   www  dell com learn us en 555 mobility byod   Cloud top ten security risks   2014  January 23   OWASP  Retrieved from  https   www owasp org index php category owasp cloud  e2 80 90_10 project   Chaturvedi  P   Gupta  K   2013  April   Detection and prevention of various types of jamming  attacks in wireless networks  international journal of computer networks and wireless  communication
33. ide attack is  what powers they might have  or what  damage they could wreak     Encrypting data sent to and stored in the cloud will largely mitigate the theft of data  by a malicious insider  but can a cloud employee accidentally delete your files  In  order to understand this threat  it s important to know exactly who will have access  to your data and what they can do     Incident Response    The biggest of all shared responsibilities and trust issues  however  is the matter of  incident response  This matter is complex as it is sensitive  as it may well involve  multiple incident handling  IH  teams  legal departments  criminal investigations   media entanglements  and legal obligations that span multiple jurisdictions  Besides  which  the attack could have any number of different profiles  and be against just the  client  the provider  or both at once  further muddying who is responsible for what     A plan must be put into place before hand  contact channels clearly established   documentation and obligations to share information and inform the other of  developing situations clearly delineated  Ideally  both the provider and the client  should practice incident response to keep both teams sharp     The only way these requirements can be defined in a binding way is formally within  the Service Level Agreement  or SLA  This document is key for a variety of cloud  contractual obligations  but perhaps none more vital than delineating duties before   during  and after a se
34. in a cloud environment  TechTarget  SearchCloudSecurity  Retrieved from  http   searchcloudsecurity techtarget com tip Incident response process in a cloud   environment   Morrisdale  P  A   2005  September 1   The six dumbest ideas in computer security  Retrieved  from http   www  ranum com security computer security editorials dumb    Moyle  E   2011  March   Meeting the PCI requirement for Web security in the cloud   TechTarget  SearchCloudSecurity  Retrived from  http   searchcloudsecurity techtarget com tip Meeting the PCI requirement for  Web   security in the cloud                Multi factor authentication introduction   n d   SafeNet  Inc  Retrieved from http   www  safenet   inc com multi factor authentication    Munsch  D   Lerchey  J   2010  April 27   Electronic discovery  Litigation holds  data  preservation and production  Retrieved from  http   www  cmu edu iso aware presentation legal hold pdf   Network and Information Security Standards Report   2007  May 11   European Committee for  Standardization  CEN   Retrieved from  https   web archive org web 20130803074337 http   www  cen eu cen Sectors Sectors ISS  S Activity Pages NISSG 20Report 20Table  200f 20Content aspx   Olzack  T   2012  January 30   Building the foundation  Architecture design  chapter 3Enterprise  security  A practitioner   s guide  InfoSec Institute  Retrieved from  http   resources  infosecinstitute com architecture design chapter 3    Olzack  T   2012  February 17   Attack surface reduct
35. ion   Architecture design  chapter 4   Enterprise security  A practitioner   s guide  InfoSec Institute  Retrieved from  http   resources  infosecinstitute com attack surface reduction    Overview of cyber vulnerabilities   n d    ICS CERT  Retrieved June 12  2014  from http   ics   cert us cert gov content overview cyber vulnerabilities   Parkinson  A   n d    Federal information laws  does your business cloud storage comply  Top  Ten Reviews  Retrieved from http   business cloud storage   services  toptenreviews com federal information laws does your business cloud storage   comply  html   Patch Management   2008  February   The government of the Hong Kong Special Administrative  Region  Retrieved from http   www  infosec gov hk english technical files patch pdf   Phifer  L   2013  Jan 28  BYOD security strategies  Balancing BYOD risks and rewards  Search  Security  Retrieved from http   searchsecurity techtarget com feature B Y OD security   strategies Balancing B Y OD risks and rewards   Phneah  E   2013  February 4   Five security risks of moving data in BYOD era  CBS Interactive   Retrieved from http   www  zdnet com five security risks of moving data in byod era   7000010665    Pinzon  Scott   2002  Foundations  What is a port   and why should I block it   WatchGuard  Technologies  Inc  Retrieved from  https   www  watchguard com infocenter editorial 135090 asp   PCI PSS Quick Reference Guide   2010  October   PCI Security Standards Council  Retrieved  from  https   ww
36. ions  and ones using ancient legacy systems developed in the nineties   We talked to companies who were doing their numbers by hand  and companies  who simply sent all of their receipts to an accountant  We also talked to a company  who had outsourced their IT  but to a local company who provided an in house  product instead of a cloud based one     Of the companies we interview in depth  none of them were entirely happy with  their IT solutions  and all would be willing and able to pay more for something that  worked better  But none of them had moved into the cloud in any kind of  meaningful way     Although we did encounter a variety of reasons for this  such as cost effectiveness or  concern about special business requirements  one item that was a deal breaker for a  all of them was the security of the cloud itself     Small businesses  then  are stuck  They want better network and computing  solutions  but are being blocked by their problems accurately assessing security  To  try and counter that  we ve done research to help explain some of the biggest  problems with cloud and network security and how to fix them  After reading this  paper or reviewing the other resources on our site  git io cti  we hope small  business owners and IT professionals will have a better idea about what kind of  risks are involved in cloud adoption  and how to mitigate those risks to levels  acceptable to your business     What is the Cloud     Before we really get started  let s take a momen
37. less Technologies    et iaasa etc ie td esp Miaa teadet dan sinh etna diea ated eda 13  odd                  tidings 14  jJ VOD e                    14  Application Security    iati kcu dre nnde a b  ate dpa 15  Logging  Auditing  and Monitoring siiccscsisssssienicoscsscasastssiasiavndsdssnassosssninsansenstiseasaasscunes 16  CER 16  Scanning and  Testing  eae diserte dei equi eter A a a E Hi aE a A aAa a a 17  Governance  Organization  amp  Risk Management         essssssssesssssssssossessssooossssessossesseeseee 18  Cloud GOVETMANCE qu    eessessseseseecseesntesseesstecsesestesssceseeeaeeeseeesessecenessuecesesaecanesseesaeeeaeeaneesaneaneseansanesaeeeaeesanseaeeeaenseesass 18  Cloud Organization  ette rtc i a aaea ad d a Glande 18  Cloud  Risk Management    eicere cte Hue AA a Du Repo A 18  Local Governance un  seessescsecsseesseesseesseesseseseesncestesneesseeenesseseeesaneceeesaesseeeaeesseeeaeeseeeeeeseeeeeaesseesaeesaeesaeeaneeeaneaneesaees 19  Local Organization    esee ttnnn nnn tnnnn tnnt tentent tette tte i 19  Focal Risk Mansagerrie llt ivo pov e ERE ES EAPRMT UE TIU TN TUM I ENE 20  Network Control                                               20  Accidents  Disasters  Recovery  and Continuity           sssssesssssessescoseseosescsseesossesosseseessse 21  Types of Accidents    aede deeds dte iia usb eee in adu Dolto at SL D 21  Recovery and Continuity    essent tenn teen tent tente tte tttm tttnn ttn ttent tente tte ntanna aa 21  Backups s a ssa ASI Ld PLI erie a
38. naneseseetscessseasanaeenesenescesssstasaeeneseneacessssntstansaeneneacscenseustatsaeseneacoeeses 29  CDS COV OLY vis iitivscesiesiesstucawtevssetiecarsieieewesivlweavee NE 30    Conclusio cc cacecisicsactondactuntentosrontoutantesssutessanionstepaersesaesbesaoseusousansausn san als Fe Pel Has ATERS 30    Setting the Stage    It seems a week doesn t go by without another headline news story about a data  breech or computer security snafu  Usually we think of large companies like  financial institutions or national chains being the targets of cyber attack  but a  recent Verizon study revealed that wasn t always the case  Small food and retail  companies are also often the victims of cyber breaches as well     Smaller companies may not have an IT department or a security specialist on hand  to counter this threat  They re also among the companies that may to have the most  to gain from switching to a cloud solution in other ways  too  For larger companies  who have spent a lot of money building up their IT infrastructure and human  resources  dropping all of that to move to a cloud service might not make sense  For  a small company with almost no investment in computer and network technology   allowing another company to take care of their IT needs might well be a much  cheaper and more secure option     So  we wondered  were local companies doing this  The answer  we found  was no     During out interview process  we encountered companies who had successful in   house IT solut
39. ns the service provider has made in order to accurately assess  the risks of using the service and preparing to work with them should a mishap or  disaster occur     Attacks    Wherever a service exists  there is an attack that can exploit it  Many of these  attacks can be extremely subtle  and there even a small mistake can leave a web  service or web site vulnerable  This is especially important for cloud services  as  many of them run as  thin clients    that is  the heavy lifting is done remotely  and  the controls and navigation simply displayed in a web browser window     Injection Attacks    Injection attacks  cross site scripting  and buffer overflows are attacks on websites  that all exploit a single type of weakness   user input  Sometimes this input can  come through comment boxes or text fields  or even through radio buttons and drop    down menu  which some consider relatively safe  Even the site s own URL can be  used against it  especially if PHP  a popular server side scripting language  is  running on the site s host server     These attacks can be prevented  however  if extreme care is taken to validate   sanitize  and convert output based on user content into a harmless format  This can  be done in a number of ways  First  it s important to check that any input from a  web field meets business rules   i e   that someone has not entered a birth year of  2791  or  Potato   Then the content must be sanitized for malicious content  This  generally involves step
40. ntracting a third party to try and overcome your  defenses and tell you of any potential weak spots they encounter on the way  In  addition to simply being a good idea to perform periodically  penetration testing is  actually required by certain compliance regimes     Logging  testing  and auditing are vital to ensure that your network is behaving as it  should  In absence of these measures  the only way to detect a breach is when  something goes horribly wrong  Lack of these tools is a serious potential stumbling  block in any cloud adoption  Because of the nature multi tenant   that is  many  users on the same service   nature of cloud services  vulnerability scans and  penetration testing may not be allowed  In absence of these abilities  you must  determine what kind of assurances the cloud provider can give that their  infrastructure and yours are free from the kind of security weaknesses best  detected with these auditing tools     Some services also may not offer logging support  provide insufficient logging  or  logs that do not integrate properly with your log storage system  It may be that they  offer other kinds of visibility data that would make up for this  but adopting a cloud  service that offers no logs is probably unwise     Governance  Organization  amp  Risk Management    Cloud Governance    To be able to really trust a cloud provider  it s important that you know as much  about how they do business as possible  To begin with  how is their business doing   
41. o be   improved a 5773 op 1   Rothstein  B   Hedges  R   Wiggins  E   2007   Managing discovery of electronic information  A  pocket guide for judges  Federal Judicial Center  Retrieved from  http   www  fjc gov public pdf  nsf lookup eldscpkt pdf  file eldscpkt pdf   Rouse  M   2005  September   Cache poisoning  domain name system poisoning or dns cache  poisoning   Search Security  Retrieved from  http   searchsecurity techtarget com definition cache poisoning   Rubens  P   2012  April 9  Four steps to securing Mobile devices and apps in the workplace     eSecurity Planet  Retrieved from http   www esecurityplanet com mobile security 4   steps to securing mobile devices and apps in the workplace mdm byod html   Rubens  P   2013  March 25   Six emerging security threats  and how to fight them  eSecurity  Planet  Retrieved from http   www esecurityplanet com network security 6 emerging   security threats and how to fight them html   Rubens  P   2013  May 2   Ten steps you can take to secure a laptop  Techradar com Retrieved  from http   www techradar com us news mobile computing laptops 10 ways to secure a   laptop 1148348 1   Ryder  J   2001  July 30   Laptop security  part one  Symantec  Retrieved from  http   www symantec com connect articles laptop security part one preventing laptop   theft   Sambasivam  S   2008  June  On the road to E discovery compliance  International Auditor   Retrieved from http   www theiia org intAuditor itaudit archives 2008 june on the road   t
42. o e discovery compliance    Savage  M   2011  March 27   PCI DSS compliant cloud providers  no PCI panacea   TechTarget  SearchCloudSecurity  Retreived from  http   searchcloudsecurity techtarget com news 2240033583 PCI DSS compliant cloud   providers No PCI panacea   Salted password hashing   doing it right   2014  February 24   CrackStation net  Retrieved from  https   crackstation net hashing security htm   Savitz  E   2012  January 19   Storing data in the cloud raises compliance challenges  Forbes com   Retrieved from http   www  forbes com sites ciocentral 2012 01 19 storing data in the   cloud raises compliance challenges    Securing your network with firewalls and ports   2008   Microsoft developer network  Retrieved  from http   msdn microsoft com en us library ms864793 aspx                                                                                     Security incident management   2014   Cloud cio gov  Retrieved from  http   cloud cio gov topics security incident management   Shapland  R   2012  March 1   Forced browsing  Understanding and halting simple browser  attacks  Computerweekly com  Retrieved from  http   www  computerweekly com answer Forced browsing  Understanding and halting   simple browser attacks   Souppaya  M   Scarfone  K   2013  July   Guide to enterprise patch management technologies   National Institute of Standards and Technology  Retrieved from  http   nvlpubs nist gov nistpubs SpecialPublications NIST SP 800 40r3  pdf   Souppaya  M   Sca
43. on security  OWASP   Retrieved from  https   www owasp org images a a6 understanding the implications of cloud computin  g on application security dennis hurst pdf   Information Supplement  PCI DSS Cloud computing guidelines   2014  February   PCI Security  Standards Council  Retrieved from  https   www pcisecuritystandards org pdfs PCI DSS v2 Cloud Guidelines pdf   Information supplement  PCI DSS Virtualization guidelines   2011  June 1   PCI Security  Standards Council  Retrieved from  https   www  pcisecuritystandards org documents Virtualization InfoSupp v2 pdf   Jansen  W   Grance  T   2011  December   Guidelines on security and privacy in public cloud  computing  National Institute of Standards and Technology  Retrieved from  http   csrc nist gov publications nistpubs 800 144 SP800 144 pdf   Kent  K   Souppaya  M   2006  September   Guide to computer security log management   National Institute of Standards and Technology  Retrieved from  http   csrc nist gov publications nistpubs 800 92 S P800 92 pdf   Kesan  J   Hayes  C   Bashir   2013   Information privacy and data control in cloud computing   consumers  privacy preferences  and market efficiency  Washington and Lee Law Review  70  1   http   scholarlycommons law wlu edu wlulr vol70 iss1 6    Kontzer  T   2013  December 13   Tips for preventing data center outages   Networkcomputing com  Retrieved from http   www  networkcomputing com data   centers tips for preventing data center outages d d id 1234588    Krig  D  
44. or certain kinds of incoming  network traffic  For instance  Internet traffic has its own port  certain kinds of email  have their own ports  etc  A service is simply a grouping of ports  There are literally  thousands of ports  most of which are rarely used     Router   Routers a device found positioned between networks  and help network  traffic find its way from one network to another  Switches and hubs perform similar  functions  but in different contexts     Firewall   A firewall is a software or hardware device that is designed to block  malicious or unauthorized network traffic  It does this by keeping requests from  reaching certain ports  or by filtering out incoming traffic based on its IP address     IP Address  Every device hooked up to the Internet has a unique Internet Protocol  Address  This allows traffic to go exactly where it needs to go without getting mixed    up  Computers on a single network may share an IP address  IP addresses can also  be faked     Virtual Private Network  VPN    VPNs allow a computer to remotely connect to a network as if it was  physically on that network  It does this by creating a very secure encrypted  connection across the Internet that would be extremely difficult to break into  VPNs  can either go from an individual computer to a network  or connect two networks  together     Encryption   This involves scrambling data  either while it s traveling from one place to  another  or is in storage  The trick to encryption is that it 
45. ortant  target for a hacker looking to cover up his footprints  Access and changes to logs  should be recorded  and logs should be transferred to read only systems quickly   Logs in transit should be encrypted and their origin verified to be sure they re not  being spoofed or tampered with  Requests for log information from third parties  should also be carefully vetted     In order for logs to be useful  they must be available to the right people and systems   stored for the proper length of time  and reviewed regularly in order to be useful  In  order to make sure your log system is meeting all of your needs  it should be  periodically audited and reviewed     Scanning and Testing    Other vital tools for understanding how your network is running and how safe it is  are vulnerability scans and penetration testing  Vulnerability scans check your  network against a long list of known potential intrusion points  including recorded  exploits  open ports  and unsecured services     Although patching  antivirus  and careful firewall maintenance measures may  prevent much of this  changes over time in your network may result in the  accidental introduction of a problem that this kind of scan can detect  Checking each  one of these potential problems by hand is far too laborious for any one person or  team  making these scans an extremely helpful auditing tool     Penetration testing is also a valuable way to assess your actually level of security   This kind of testing involves co
46. oud provider and a cloud customer may not always align  How to they vet new  security employees  onboard new applications  or pick out hardware     Documentation on these processes can tell you a lot about a company and how it  handles risk  This is important  because once you use their product  their risks  become yours as well     Moreover  cloud adoption imposes additional problems for a client company in  terms of governance  organization  and risk management as well  In order to deal  with these changes  a prospective client must do their due diligence     Local Governance    To begin with  how easy or difficult would it be to switch services  If the cloud is  using an open source storage standard  moving back from the cloud or to another  provider should be relatively smooth   if not  it might be difficult or even impossible  to get all your data back out     How do you get billed for the cloud service  Are their terms clear and easy to  understand  Do they provide you with real time billing information  or simply hand  you the tab at the end of the month  How easy is the bill to understand when you do  get it  It may be necessary to have help to fully break down the statement  some  large customers of Amazon Web Services have such detailed and lengthy bills they  can t be contained in an Excel spreadsheet without crashing it     Before moving any data into the cloud  consider what compliance issues you may  have to deal with  While the easiest way to determine if a clo
47. potential to be cheap  efficient  and effective  However  it also introduces security  concerns     At the core of these concerns is the fact that adopting a cloud service splits  responsibility for keeping a company s IT infrastructure safe between two different  parties  To complicate things even further  the cloud service s interests and the  client s interests may not always be aligned  That isn t to say it s not possible to  manage the risks of a cloud deployment  but it does mean that you have to go in with  your eyes open     Authentication and Accountability    One question is at the very heart of cyber security   how can we keep people we  don t want away from private information while allowing access to those who need  it  In order to begin to answer this question  you have to determine first who the    person is  which is generally referred to as authentication  and what they should  have access to  which is known as authorization  Without taking time to define who  should have access to what  no other security measures will be effective     Authentication    There are three factors we can use in order to identify someone attempting to  access a computer system   1  Something they know  The most common examples of this include  passwords and PINs   2  Something they have  This can either by a physical item  like a common  access card  or a  virtual  item  like a digital certificate   3  Something they are  Often referred to as biometric authentication  this  measur
48. rfone  K   2013  July   Guide to malware incident prevention and handling for  desktops and laptops  National Institute of Standards and Technology  Retrieved from  http   nvlpubs nist gov nistpubs SpecialPublications NIST SP 800 83r1  pdf   Strom  D   2007  November 18   Ten tips to secure your laptop  Informationweek com  Retrieved  from http   www informationweek com 10 tips to secure your laptop d d id 1061655    Strong Authentication Best Practices   n d   SafeNet  Inc  Retrieved from http   www safenet   inc com multi factor authentication strong authentication best practices    Stults  G   2004  May 9   An overview of Sarbanes Oxley for the information security  professional  SANS Institute InfoSec Reading Room  Retrieved from  https   www sans org reading room whitepapers legal overview sarbanes oxley   information security professional 1426   Sullivan  D   2006   Malware  The ever evolving threat  The shortcut guide to protecting business  internet usage  Retrieved from http   searchsecurity techtarget com feature Malware The   ever evolving threat   Tellis  P   2011  January 11  Keeping web users safe by sanitizing input data  Smashing  Magazine  Retrieved from http   www smashingmagazine com 2011 01 11 keeping web   users safe by sanitizing input data    Threat analysis of cloud services  initial thoughts for discussion    n d    Collaborate nist gov   Retrieved from http   collaborate nist gov twiki cloud   computing pub CloudComputing CloudSecurity Threat Analysi
49. rt failing     Equipment failure is perhaps the easiest of the three to address  and can be  addressed the same way for both cloud providers and cloud clients   have a good  equipment replacement plan  It may be painful to replace working equipment  but  nowhere near as painful as losing an entire hard drive full of data  or losing a  connection to the Internet  and your cloud service  for half the day     Some accidents are simply unavoidable and unpredictable  but any company can  adopt some best practices to minimize them  Keep food and drink outside of  sensitive areas  and restrict access to only those who need to be there  Properly  train all of your employees  and restrict permissions to functions that can do real  damage to only those who need them most     Recovery and Continuity    Disasters can strike rapidly and endanger both life and property  The first priority  of any disaster response should be to preserve life and limb  The rest is just stuff   However  once the disaster has passed  or if the disaster is ongoing  like a  snowstorm  a company should have a plan for who will be in charge of making  repairs and recovering  and how they will go about it  as well as a team dedicated to  keeping things running as best they can in the mean time     In any event  redundant systems and hardware may be extremely helpful for  avoiding outages on both sides  For a client  this might involve a backup generator  and uninterruptable power sources  as well as multiple copies
50. rts suggest having a minimum length even greater  than this  Pass phrases  which are strings of random words  may be easier to  remember and also meet complexity requirements  Changing passwords on a  recurring basis is also recommended     Another method that can be used to make these attacks less practical is to only  accept authentication requests that come straight from the login page  and to pause  briefly before checking to see if the user name and password are correct  Even a one    second delay can slow brute force attacks down significantly  Simply locking the  account after a certain number of failed tries may also be a way to attack the  problem  although a mechanism for unlocking the account again should be in place   Also  messages in response to a failed login attempt should not specify if it was the  username or password that was incorrect  This will keep attackers from trying to  determine what valid user names are in the system by guessing     If your business has a large number of services that require different user names  and passwords  it may be tempting for your employees to start re using passwords   writing passwords down  or making weak passwords to manage the increasing  complexity  This can be a problem if your company adopts a variety of cloud  services  each with their own authentication systems  A way around this problem is  federated identity     In this system  a user will log in only once  and be given a token that will allow them  to freely a
51. s  IJCNWC   ISSN  2250 3501 Vol 3  No2  Retrieved from  http   www ijcnwc org papers vol3no22013 3vol3no2 pdf   Cohen  R   2009  March 1   Navigating the fog    billing  metering  amp  measuring the cloud   Ruv net  Retreived from http   www elasticvapor com 2009 03 navigating fog billing     metering html                                                                   Collins  H   2010  September 20   Top 10 network security threats  Top 10 Network Threats   Retrieved June 12  2014  from http   www govtech com security Top 10 Network   Security Threats html   Coty  S   2014  February 8   Computer forensics and incident response in the cloud  RSA  Conference 2014  Retrieved from  http   www  rsaconference com writable presentations file upload anf t07a computer   forensics and incident response in the cloud pdf   CPU tech secure processor solutions built with INTEGRITY   2010  March 3   Green Hills  Software  Retrieved from http   www ghs com news 20100303 CPU tech html   Curtis  W   Mew C   2008  February 28   Preparing for E discovery  NACUA Notes  6  2    Retrieved from  http   www  ncsu edu general counsel legal topics documents PreparingforE   Discovery pdf   Data Validation   2013  December   OWASP Retrieved from  https   www owasp org index php Data ValidationZBest Method   Di Bello  A   N D   How cloud computing changes incident response  Guidance Software   Retrieved from http   endpoint intelligence blogspot com 2012 07 how cloud computing   changes incident html 
52. s like removing all punctuation  Then any output to the site  is checked to make sure no harm can be done by sending back the requested  information  It may also be possible to set up the programs running on the back  end  such as databases  to handle user input in very strictly proscribed ways  so as to  further prevent this style of attack     Web Applications    Web based applications  in addition to having the potential problems discussed  earlier in the paper  can have other vulnerabilities  That s because these  applications don t exist on their own  floating in a void  the rest on top of several  other programs that run below it  unseen to most outsiders  but attackable by a  clever hacker  This means all the programs must work by themselves as well as  working together as a whole  A strong patching program and rigorous testing can  establish the safety of this kind of application  Like web pages  all applications must  also be able to resist malicious or invalid input     Admin Pages    Many cloud services have an administrator control web page  Access to this page  comes with a wide variety of powers that can do a great deal of damage in the wrong  hands  In addition to strong authorization  this page and its login screen must be  completely protected against any of the attacks listed above  Further restricting  access to the admin page by IP address or physical location may also be desirable  if  the cloud provider offers that kind of service     Forced Browsing    
53. s of Cloud Services pdf   Threat sources by cloud architecture component   n d    Collaborate nist gov  Retrieved from  http   collaborate nist gov twiki cloud   computing pub CloudComputing CloudSecurity Cloud Threats by Sources pdf   Top 20 security controls   n d    Collaborate nist gov  Retrieved from  http   collaborate nist gov twiki cloud   computing pub CloudComputing CloudSecurity Top 20 Security Controls excerpt pdf   The three methods an ISP uses to defend against DoS and DDoS   2013  July 17    DDoSAttacks biz  Retrieved from http   www  ddosattacks biz protection the three   methods an isp uses to defend against dos and ddos    Wang  C   2010  October 29   Q amp A  Demystifying Cloud Security  Retrieved from  http   resources  idgenterprise com original AST    0036145 G2A demystifying cloud security pdf   Wang  W   2013  January 10   Five checks you must run to ensure your netweork is secure  The  Hacker News  Retrieved from http   thehackernews com 2013 01 5 checks you must   run to ensure your html   Watson  C   Keary  E   Fitzgerald  A   2014  April 7   Logging cheat sheet  OWASP  Retrieved  from https   www  owasp org index php Logging Cheat Sheet   Weiss  A   2012  October 28   Prevent web attacks using input sanitation  eSecurity Planet   Retrieved from http   www esecurityplanet com browser security prevent web attacks   using input sanitization html                                                                                           Zeltser  L   2011
54. s relatively easy to open if  you have an encryption key  but very difficult to decode if you do not  This allows  people who have keys to communicate safely     Supply Chain    Good network security starts at the most basic level   computer and network  hardware  Picking hardware isn t just about getting a good price or choosing a  reliable brand  however  Many computers and network devices have components  built from many places around the world  It s possible that one of these sources  may introduce a security flaw into one of these devices to allow an attack at a later  date     It s advisable to have as good an idea as you can of how and where your devices  were assembled  but often this simply can t be done  Modern supply chains are just  too complex  The safest alternative is to be vigilant in monitoring your network for  possible rogue behavior by one of your network components  At the very least   hardware and supply chain vulnerabilities should not be taken for granted     Another good way to help reduce the chance of leaving accidental vulnerabilities in  your network architecture is to try and use the same kinds of device when possible   instead of mixing and matching  Although a network that has many different kinds  of hardware on it may be less vulnerable to falling prey to a single attack  this kind  of setup makes the network much harder to administer  If  for instance  all of your  routers are exactly the same  keeping them safe  up to date  and running smoo
55. stand how a  cloud provider is set up or does business  Some cloud providers may provide  excellent evidence for the effectiveness and readiness of their security measures   others may provide little to none  How much your company needs is something it  must determine for itself  Before it does  though  it must find out the answer to one  last question  does the cloud provider subcontract with other cloud companies or  third party firms  If so  the evaluation process may need to start all over again     Network Control    Sacrificing control over part of your IT infrastructure is a necessary  even desirable  part of adopting a cloud service  However  it can pay dividends to be sure of exactly  what you re giving up and what you re getting back in return  Any function that you  turn over requires some assurance that they re handle it properly  but some  particularly vital ones are highlighted here     Authentication and authorization mention a special mention again here  If the  provider is handling authentication  how are they storing the authentication  credentials  And how do they handle password recovery     Does the provider have a good authorization plan that allows you to maintain least  privilege  And how to do you know that authentication and authorization is being  granted only to your employees     Encryption and encryption key management are also extremely important  As we  will cover later  encryption is absolutely vital in the cloud  How are they  implementing it
56. subject  unless your  company handles classified or extremely sensitive information  there are some  straightforward ways of managing this problem  The most commonly used one is  called role based authorization     In role based authorization  a company determines tools and information someone  in a particular role needs to do their job  As a result  instead of having to grant  permissions to each person individually  an administrator can simply add a person  to a  role   and they ll automatically get all the permissions they need to accomplish  their tasks     Any system is only as strong as its weakest part  and all to often management of  authentication and authorization systems is where things go wrong  For starters   don t use any system that someone s just invented for authorization   there are  often industry standards for this kind of thing  which are well tested and secure     In addition  issuing  revoking  and reviewing the status of authentication credentials  and authorization permissions is extremely important  Just like landlords often  retrieve the keys or change the locks after a tenant leaves  IT managers should make  sure that once someone is no longer in a specific job or employed by the company  that their ability to access programs and information is changed accordingly     In order to facilitate management  centralizing and automating portions of these  tasks might be helpful     When it comes to security when using a cloud product  authorization and  a
57. t to determine exactly what people  are talking about when they refer to  the cloud   According to the definition given  by the National Institute of Standards and Technology  a cloud service has five  essential key factors that when taken all together make it  cloud      1  The service should be on demand   a customer should simply be able to ask  for cloud functionality and receive it without having to interact with another  person to receive it    2  The service should be accessible over the internet and from many different  platforms   everything from cell phones to laptops to desktop computers    3  The cloud provider makes the service available by pooling multiple resources  together  For instance  a cloud storage provider might store data in several  different data centers  but to the customer it all looks exactly the same    4  Thefourth characteristic of a cloud service is the ability to adapt to changing  demand   the more of a cloud service a customer uses  the more is made  available  If they start using less  then the service is automatically scaled  down along with the diminished demand    5  Asaresult ofthe elasticity of the service  cloud services are billed according  to how much the client actually uses     In the end  the idea is to have a service that is simple and easy to buy  access  and  use  Because the provider can pool many resources together to realize economies of  scale  and because the client pays for only what they use  cloud services have the  
58. this is a vital piece of risk management and policy  information     Location    All cloud adopters should ask if   1  The cloud company will allow them to chose where data is stored  2  Ifnot  will they inform the client where the data ends up     If they will not give you either of these pieces of information  be wary     The reason you should be cautious is because privacy protections and other data  laws may vary widely from jurisdiction to jurisdiction  If you do not know where  your data is  it may be impossible to tell what your obligations are  or what your  provider is legally allowed to do with your data  For instance it s illegal to send  certain kinds personal data over international borders in the EU  Once the data ends  up there  removing it again may be impossible     Data Remanence    Deletion and preservation of data is very important for two main reasons  The first  is pure security  Data remanence  when saved data is not entirely erased from  memory  is a huge risk the shared environment of a cloud provider  How can they  guarantee that they have truly destroyed the information you entrusted to them     eDiscovery    The other is legal  eDiscovery is the obligation of a company to turn over electric  documents during legal action  To reduce the burden of this activity  which can  involve huge amounts of data  a company should have a robust data retention and  deletion policy that reacts to business needs  For instance  instead of deleting all  files after a
59. thly  will be much easier     Physical Security    A simple way to boost security is to simply restrict physical access to key network  components  No one but administrators should be allowed to physically access your  company s servers  and contractors should be vetted and accompanied while    making repairs  Putting key devices behind locked doors  and encasing cables in  metal ducting is a good way to ensure the key parts of your infrastructure remain  safely tamper free  More advanced set ups might require card based access and  other  more rigorous controls     Removable Media    Another way a network can be compromised at a hardware level is through the use  of removable media  like CDs and USB drives  Using these devices is a big security  risk for a number of reasons  One risk is that it   s very easy to steal information with  removable media  They can fit large amounts of files into a device that can hang  from a keychain  which makes data breaches of enormous size a real possibility  as  shown in the recent Snowden NSA leak     Removable media also allows data to enter your network without passing through  any of the security devices that separate your systems from the Internet  An unwary  user could easily infect one of your computers by mistake  Disabling removable  media where possible or restricting its use can go a long way to prevent breaches  and to keep your network safe     Patching    There are certain threats that are almost impossible to defend against 
60. ud service allows for  compliance with a given regime  it s vital to remember that just because they are  compliant does not mean that you automatically inherit their rating  Nor does the  fact that one of their clients has managed to become compliant mean that you will  be able to replicate the achievement     Oftentimes what a cloud provider being  compliant  means is that the specific  security benchmarks that are their responsibility have been met  This leaves it to  you to take care of everything else  It is also the client s responsibility to get  definitive documentation and proof of what parts of the provider exactly have been  certified  and when  Compliance is an ongoing process  and their status may have  lapsed     Local Organization    Contracting with a cloud company can decrease your IT overhead  but this should be  approached with care  Besides the moral impact of potentially firing IT staff   outsourcing responsibilities to the cloud could lead to a decrease in their overall  level of skill  Most companies of sufficient size need in house IT skills  so it s  important to be aware of this potential organizational risk  This can be worsened by  the fact that the more cloud services are adopted  the more security regimes the    client s IT staff mustlearn  There may come a point when their ability to coordinate  between multiple services and environments breaks down     Local Risk Management    Lastly  risk management becomes difficult when you don t fully under
61. ures and  alert web admins that an infection has occurred     Social Engineering    The last kind of attack is social engineering  a novel and difficult attack vector  Using  this method  an attacker learns about a person or organization  then poses as a  friend or colleague to try and extract information  This can be as simple as using an  employee s Facebook page to find the answers to their password recovery question   or to physically show up on the premises  pose as a contractor or bigwig  and start  asking for access to restricted systems  This can only really be countered by  everyone at a company being aware and cautious at all times     Cloud providers have to deal with many of these same problems and should be  willing to inform you of how they deal with them and how they will work with you  to resolve them should they occur     Shared Environment and Trust    Co Tenancy    The shared  or co tenant environment of the cloud is one of its largest security risks   It s difficult to be sure that data sent to the cloud is accessible to you and only to you   There are three possible points of exposure for this data  in transit  at rest  and in  use     Transit    Data in transit has the potential to be intercepted on the way to and from a cloud  service  and the potential to be misdirected after it arrives  The solution in both  cases is encryption  either through the  https  SSL connection  or  preferably   through a stronger VPN connection  This encryption means that ev
62. uthentication become extra important  This is because there s no way to physically  block someone from accessing a cloud system  and older  network based security  tools designed to keep out harmful traffic may not work either  This means    authentication may be one of the only things keeping attackers out  and  authorization one of the only things limiting their access once they re in     For this reason  it s important to determine what kind of system a cloud provider is  using before you choose to adopt them  How many factors are they using for their  authentication  How are authentication credentials stored  and where  Do they  have a role based authorization system  and if so  does it give you enough control   Finally  it s important to determine if these systems will work with the  authentication and authorization systems in place on your own systems     Network Security    In order to understand network security  we should take a moment to define a few  key terms that a non technical person may not be aware of  These definitions are a  simplified  and designed to help someone with little network background  knowledge     Terminology    Servers and clients   A server is simply a computer that stays on line and provides a  service  to  any computer that contacts it  The computer requesting the service is a client  The  service servers provide can be anything from running printers to video games     Ports and Services    A port is a piece of software designed to listen f
63. w pcisecuritystandards org documents PCI 20SSC  20Quick  20Reference   20Guide pdf   Presti  K   2012  June 28   Seven security threats circling your network  CRN  Retrieved from  http   www crn com slide shows security 240002785 7 security threats circling your   network htm                                                    Rains  T   2014  February 4   Threats in the cloud  part 1  DNS attacks  Microsoft Security Blogs   Retrieved from http   blogs technet com b security archive 2014 02 04 threats in the   cloud part 1 dns attacks aspx   Rains  T   2014  February 6   Threats in the cloud  part 2  Distributed denial of service attacks   Microsoft Security Blog  Retrieved from  http   blogs technet com b security archive 2014 02 06 threats in the cloud part 2   distributed denial of service attacks aspx   Reed  J   2010  September 10   Following Incidents into the Cloud SANS Institute InfoSec  Reading Room  Retrieved from http   www  sans org reading   room whitepapers incident incidents cloud 336 19V   Richmond  R   2010  May 19   Five ways to keep online criminals at bay  The New York Times   Retrieved from  http   www  nytimes com 2010 05 20 technology personaltech 20basics html  r 4 amp     Risks   2011  November 4  Cloudcontrols org  Retrieved from  http   www  cloudcontrols org cloudcontrols risks    Roman  J   2013  May 21   Safeguarding ISPs from DDos attacks  Information Security Media  Group  Corp  Retrieved from http   www bankinfosecurity com isp security needs t
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
  2015 Nissan  especificacion tecnica de producto linea madera    Manuel Utilisateur  Artisan Technology Group is your source for quality new and  仕様書 件 名 平成22年度国立劇場大小劇場舞台進行設備整備 調達の  Honda H5013 User's Manual  Arkon IPM111 holder  HQ W7-60355N    Copyright © All rights reserved. 
   Failed to retrieve file