It's been a couple days since I attended day two of the IAM training,
but I've been a little busy taking that information and preparing for
our class' assessment of the school.
On day two, we went over modules 3 and 4 (available at the IATRP
website, for those interested) and did
an actual assessment of our example organization's security posture and
delivered a final report. We addressed three areas our customer was
concerned most with, Networking/Connectivity, System Assurance, and
Physical Environment. We made up a couple of concerns that such an
organization would have, like not having backup connectivity at remote
sites or ACLs and firewalls protecting internet facing systems.
Here's a copy of the assessment plan outline
(nts450_day_2.pdf)
and the information we gathered throughout the IAM process.
Posted by Marcin on Friday, September 15, 2006 in
School and
Security.
The IAM training has been going pretty well, even though it was just the
first day. Today, the class went over the intital contact and
pre-assessment phases. We defined the mission of our example
organization (our customer) and identified points of contact within the
company. Impact attributes (confidentiality, integrity, availability)
were defined as well as the impact ratings: high, medium and low. Using
these definitions, our group classed the organizational information
criticality into a matrix using the impact attributes and ratings.
Following, we identified information systems and modeled them after the
information criticality matrix. Finally, we described our customer's
system configuration and how information flows across the organization.
Day 2 should be even better, as we cover the actual on-site assessment
visit and final analysis phases.
Posted by Marcin on Wednesday, September 13, 2006 in
School and
Security.
Woohoo! This free PDF reader finally reached version 2. Best thing about
Foxit Reader is that it's fast, self-executable, and takes up a small
memory footprint.
Grab it here, thank
me later.
Posted by Marcin on Wednesday, September 13, 2006 in
Tech.
This Tuesday and Wednesday I'll be attending a training session (held at
my school) on the NSA's Infosec Assessment
Methodology taught by Russ Rogers and
Greg Miles of Security Horizon. The
IAM is a vunerability assessment of an organization's security posture,
and NOT a risk/threat assessmen. The IEM (Infosec Evaluation
Methodology) and Red Teaming cover the actual penetration testing... the
good stuff. But we'll see how this goes. I've read a couple chapters
from Greg and Russ' book and already learned a lot about the contracting
and pre-assessment phases. Should be interesting, I'll keep you all
posted.
Posted by Marcin on Sunday, September 10, 2006 in
School and
Security.
CAIRNS, Australia - Steve Irwin, the hugely popular Australian
television personality and conservationist known as the "Crocodile
Hunter," was killed Monday by a stingray while filming off the Great
Barrier Reef.
[`news.com.au <http://www.news.com.au/story/0,23599,20349890-1702,00.html>`_
has more coverage]
So unfortunate, such a great guy with a passion for wildlife and the
environment.
Posted by Marcin on Monday, September 4, 2006 in
News.