Sorry! The requested paper could not be found.
Featuring 77 Papers as of January 4, 2016
The Power and Implications of Enabling PowerShell Remoting Across the Enterprise
by Robert Adams - December 23, 2015
The marketing department of Company X has been the target of a phishing attack.
Infrastructure Security Architecture for Effective Security Monitoring
by Luciana Obregon - December 11, 2015
The biggest challenges that Information Security departments face is identifying the critical assets that makes an organization unique, locating these assets on the network, and building security defenses around them while maintaining functionality.
Practical Security Considerations for Managed Service Provider On-Premise Equipment
by Mike Yeatman - October 5, 2015
Many organizations are not adequately staffed to perform 24x7 monitoring of network, systems infrastructure, and security activities such as vulnerability scanning and penetration testing. Use of third party managed service provider to fill this gap is on the rise. It is typical for managed service providers to require the implementation of an on premise device or appliance at the customer location(s). But, who watches the watcher? Service providers must be sure to fully harden any onpremise device placed on a customer network, and they must take steps to protect their own infrastructure against the propagation of an attack or compromise of the customer network and systems. Customers must be informed and work closely with service providers to assure proper placement of the on premise device such that it does not become a vector for compromise against the customer network. Collectively, and in accordance with a set of standards and guidelines, all stakeholders involved in the managed services relationship must be sure to set a sustainable benchmark that sufficiently reduces the chances for 3rd party on premise equipment becoming the root, or a contributing cause of a security compromise.
Breaking the Ice: Gaining Initial Access
by Phillip Bosco - August 28, 2015
While companies are spending an increasing amount of resources on security equipment, attackers are still successful at finding ways to breach networks. This is a compounded problem with many moving parts, due to misinformation within the security industry and companies placing focus on areas of security that yield unimpressive results. A company cannot properly defend and protect against what they do not adequately understand, which tends to be a misunderstanding of their own security defense systems and relevant attacks that cyber criminals commonly use today. These misunderstandings result in attackers bypassing even the most seemingly robust security systems using the simplest methods. The author will outline the common misconceptions within the security industry that ultimately lead to insecure networks. Such misconceptions include a companys misallocation of their security budget, while other misconceptions include the controversies regarding which methods are most effective at fending off an attacker. Common attack vectors and misconfigurations that are devastating, but are highly preventable, are also detailed.
Configuration Management with Windows PowerShell Desired State Configuration (DSC)
by Brian E. Quick - August 18, 2015
Keeping information system baselines consistent with a formal configuration management plan can be a very difficult task. Changes to server based systems and networking must be monitored in order to provide some measure of compliance. A new distributed configuration management platform by Microsoft® called Desired State Configuration (DSC) makes this task easier. The objective of this paper is to describe in depth how PowerShell 4.0 can help to solve this common problem. DSC uses a declarative syntax that any skilled administrator can utilize to deploy software, monitor configuration drift and even report conformance. DSC is cross-platform compatible with hundreds of useful resources freely available. DSC leverages PowerShell 4.0 and gives administrators a useful way to automate configuration management.
Leveraging the Federal Public Trust Clearance Model in State Government Personnel Security Programs
by Joseph C. Impinna - July 17, 2015
Security clearances are a requirement when working with classified information at the federal level. In recent years, incidents involving unauthorized disclosures of highly sensitive classified information have brought the security clearance adjudication process under scrutiny. These incidents have reinforced the principle that a personnel security program that properly vets individuals is critical to any organization that wishes to protect its data. Although the effects of an incident at the state level may be narrower in scope than at the federal level, the need to safeguard sensitive information is the same. The national security clearance model is used at many state agencies that work with the Department of Defense and other federal entities. However, an agency that does not access national security data still has a responsibility to uphold public trust. For these organizations, the background check processes can vary greatly from state to state or even between agencies. An effective personnel security program is much more than simply granting access to protected information through a public trust clearance. To achieve the assurance implied with a clearance, other components must be included. While a direct implementation of the federal model may not be feasible, using just a few concepts to design a system tailored to the state level would significantly improve the security posture of the issuing agency.
Securing Single Points of Compromise (SPoC)
by David Belangia - June 30, 2015
Securing the Single Points of Compromise that provide central services to the institutions environment is paramount to success when trying to protect the business. (Fisk, 2014) Time Based Security mandates protection (erecting and ensuring effective controls) that last longer than the time to detect and react to a compromise. When enterprise protections fail, providing additional layered controls for these central services provides more time to detect and react. While guidance is readily available for securing the individual critical asset, protecting these assets as a group is not often discussed. Using best business practices to protect these resources as individual assets while leveraging holistic defenses for the group increases the opportunity to maximize protection time, allowing detection and reaction time for the SPoCs that is commensurate with the inherent risk of these centralized services
eAUDIT: Designing a generic tool to review entitlements
by Francois Begin - June 22, 2015
In a perfect world, identity and access management would be handled in a fully automated way.
Integration of Network Conversation Metadata with Asset and Configuration Management Databases
by William Yeatman - May 26, 2015
As an alternative the loss of access to plaintext IP payloads in an increasingly encrypted and privacy conscious world, network layer security analysis requires a shift of attention to examination and characterization of the packet and network conversation meta- information derived from packet header information. These characteristics can be incorporated into and treated as an integral part of asset and configuration management baselines. Changes detected in the expected endpoints, frequency, duration, and packet sizes can be flagged for review and subsequent response or adjustment to the baseline.
Practical El Jefe
by Charles Vedaa - March 31, 2015
"El Jefe is a free situational awareness tool that can drastically reduce the costs for securing your enterprise by making locating and responding to advanced threats incredibly easy." (Immunity Inc., n.d.).
Correctly Implementing Forward Secrecy
by Chris Schum - March 30, 2015
At the heart of Forward Secrecy is the use of the Diffie-Hellman key exchange.
The Integration of Information Security to FDA and GAMP 5 Validation Processes
by Jason Young - February 5, 2015
In reviewing the failures of information security (InfoSec) through the lifecycle management of information systems within the pharmaceutical industry, analysis starts with the governing validation process for the qualification of information systems.
That's where the Data is! Why Break into the Office of Personnel Management Systems - Because That Is Where the Sensitive Information for Important People Is Maintained!
by David Belangia - November 4, 2014
To obtain the most complete information about American personnel who have security clearance, an adversary would clearly be interested in compromising the information being collected by the Office of Personnel Management (OPM). The aggregation of information about an individual and their life history is collected and maintained by this organization and available in one place.
The Best Defenses Against Zero-day Exploits for Various-sized Organizations
by David Hammarberg - October 27, 2014
Zero-day exploits are vulnerabilities that have yet to be publicly disclosed. These exploits are usually the most difficult to defend against because data is generally only available for analysis after the attack has completed its course. These vulnerabilities are highly sought after by cyber criminals, governments, and software vendors who will pay high prices for access to the exploit (Bilge & Dumitras, 2012).
MalwareD: A study on network and host based defenses that prevent malware from accomplishing its goals.
by Dave Walters - September 17, 2014
Malware is an ever-growing problem on the Internet. Organizations struggle to prevent, detect, and responds to malware threats.
Point of Sale (POS) Systems and Security
by Wesley Whitteker - August 18, 2014
As Dr. Eric Cole (2014) mentioned in a recent SANS SEC401: Security Essentials Bootcamp Style course, "will be the year of the retailer".
Are there novel ways to mitigate credential theft attacks in Windows?
by James Foster - August 13, 2014
Once a single system is compromised by a determined attacker in a Windows environment, the attacker often tries to move laterally through the environment and escalate his privileges, potentially resulting in compromise of additional systems, up to the entire domain or forest.
Implementing an Information Assurance Awareness Program: A case study for the Twenty Critical Security Controls at Consulting Firm X for IT Personnel
by John Dittmer - August 7, 2014
As a consultant within a large, growing, high-profile consulting firm, this challenge is interesting in terms of preventing potential future cyber-attacks.
Simulating Cyber Operations: A Cyber Security Training Framework
by Bryan K. Fite - February 14, 2014
The current shortage (Finkle & Randewich, 2012) of trained and experienced Cyber Operations Specialist coupled with the increasing threat (Sophos, 2013) posed by targeted attacks (Verizon, 2013) suggest more effective training methods must be considered.
Using the Department of Defense Architecture Framework to Develop Security Requirements
by James E. A. Richards - February 10, 2014
Integrated architectures embody the discernable parts of a system and their relationships with each other in a single, normalized data repository.
Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment
by Susanne Young - January 31, 2014
All businesses, no matter what their goals, depend on a network of contacts to survive and grow.
Practical Cyber Security Training Techniques for New IT Support Employees
by Keil Hubert - July 11, 2013
It's ludicrous to expect a brand new, fresh faced employee to be fully productive on his or her first day in the office.
Security Best Practices for IT Project Managers
by Michelle Pruitt - June 21, 2013
For a project manager, a bad week might go something like this:
Corporate vs. Product Security
by Philip Watson - May 22, 2013
When people hear "I deal with security" from any employee, the typical thought is that they are defending the enterprise, the web servers, the corporate email, and corporate secrets.
Information Risks & Risk Management
by John Wurzler - May 1, 2013
In a relatively short period of time, data in the business world has moved from paper files, carbon copies, and filing cabinets to electronic files stored on very powerful computers.
Defense in Depth: Employing a Layered Approach for Protecting Federal Government Information Systems
by Stacy Jordan - November 27, 2012
When the Internet was invented in the late 1960's to conduct research between specific colleges and the US Department of Defense (DOD), no one envisioned that in the future networks would be connected into a singular global one.
Diskless Cluster Computing: Security Benefit of oneSIS and Git
by Aron Warren - April 16, 2012
This paper introduces the joining of two software packages, oneSIS and Git. Each package by itself is meant to tackle only a certain class of problem.
Securing Blackboard Learn on Linux
by David Lyon - December 1, 2011
Blackboard Learn (Bb Learn) is an application suite providing educational technology to facilitate online, web based learning. It is typical to see Bb Learn hosting courses and content. Common add-ons include the Community and Content systems which are licensed separately.
Secure Browsing Environment
by Robert Sorensen - September 21, 2011
Today's computing environment is fraught with much treachery. It used to be that one could surf the web without any thought of infection or loss of private information. Those times have changed! One might argue that the safest connection to the web is no connection at all. However, thiS is not feasible in today's social networked world (Powell, 2011). The target has only increased for hackers.
Using GUPI to Create A Null Box
by Robert Comella - September 15, 2010
When an administrator builds a Linux server, they make many decisions. One of the most difficult is deciding which packages to install. Linux distributions, upon installation, try to pass package selection off as an easy choice. The administrator must simply choose a function from the list and the installation program will automatically install all the necessary software to provide that service. The installation usually works and the resulting machine performs the desired task. Administrators focused only on functionality consider themselves finished and move on to the next task.
A Guide to Virtualization Hardening Guides
by Dave Shackleford - May 20, 2010
- Sponsored By: VMWare, Inc
A guide to the virtualization hardening guides that includes key configuration and system security settings for VMware ESX and vSphere/Virtual Infrastructure with key control areas organizations need to consider.
Writing a Penetration Testing Report
by Mansour Alharbi - April 29, 2010
`A lot of currently available penetration testing resources lack report writing methodology and approach which leads to a very big gap in the penetration testing cycle. Report in its definition is a statement of the results of an investigation or of any matter on which definite information is required (Oxford English Dictionary). A penetration test is useless without something tangible to give to a client or executive officer. A report should detail the outcome of the test and, if you are making recommendations, document the recommendations to secure any high-risk systems (Whitaker & Newman, 2005). Report Writing is a crucial part for any service providers especially in IT service/ advisory providers. In pen-testing the final result is a report that shows the services provided, the methodology adopted, as well as testing results and recommendations. As one of the project managers at major electronics firm Said "We don't actually manufacture anything. Most of the time, the tangible products of this department [engineering] are reports." There is an old saying that in the consulting business: If you do not document it, it did not happen. (Smith, LeBlanc & Lam, 2004)
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
by Tanya Baccam - April 7, 2010
- Sponsored By: Oracle
A look at the basics of encryption with a discussion the pros and cons of leading encryption architectures available today.
Effective Use Case Modeling for Security Information & Event Management
by Daniel Frye - March 10, 2010
With todays technology there exist many methods to subvert an information system which could compromise the confidentiality, integrity, or availability of the resource. Due to the abstract nature of modern computing, the only way to be reliably alerted of a system compromise is by reviewing the systems actions at both the host and network layers and then correlating those two layers to develop a thorough view into the systems actions. In most instances, the computer user often has no indication of the existence of the malicious software and therefore cannot be relied upon to determine if their system is indeed compromised.
Building Servers as Appliances for Improved Security
by Algis Kibirkstis - March 8, 2010
Defense-in-Depth is a term commonly used when describing a layered model for protecting computing environments; by having multiple layers of protection, from the perimeter of the network to each computing system at the core, security-related failures at any single layer should not compromise the confidentiality, integrity or availability of the overall system. In this day and age, simple reliance on firewalls for protecting is generally considered to be imprudent (Brining, 2008), for they offer no network-level protection in case of failure, poor configuration, software misbehavior, or unauthorized access attempts posing as legitimate traffic; nor can they offer any protection if communications circumvent the firewall itself.
Preventing Incidents with a Hardened Web Browser
by Chris Crowley - December 15, 2009
There is substantial industry documentation on web browser security because the web browser is currently a frequently used vector of attack. This paper investigates current literature discussing the threats present in today's environment.
Six Ways to Reduce PCI DSS Audit Scope by Tokenizing Cardholder data
by nuBridges, inc - September 29, 2009
Exploring the use of tokenization as a best practice in improving PCi dss compliance, while at the same time minimizing the cost and complexity of PCi dss compliance by reducing audit scope.
Building a Security Practice within a Mixed Product-R&D and Managed-Service Business
by Evan Scheessele - July 27, 2007
Information-rich technology businesses offer their security staff more challenges today than ever. Where business is driven by active technology development and technology is delivered to customers in the form of a managed-service, security takes on a scope that impacts the businesss fundamentals. This paper addresses the challenges and best practices related to delivering overall security (here referred to as a security practice) within a complex business. The template business examined in this paper hosts both highly complex networked-product R&D and 24/7 outsourced managed services.
Encryption Procurement: Setting a Standard
by Stephen Northcutt, Barbara Filkins - June 6, 2007
- Sponsored By: Utimaco
Information and checklist to help organizations develop an RFP for enterprise encryption.
Sudo for Windows (sudowin)
by Andrew Kutz - February 14, 2007
The original Sudo application was designed by Bob Coggeshall and Cliff Spencer in 1980 within the halls of the Department of Computer Science at SUNY/Buffalo. Sudo encourages the principal of least privilege that is, a user operates with a bare minimum number of privileges on a system until the user requests a higher level of privilege in order to accomplish some task.
Midrange & Mainframe systems for Security Policies compliance control Tool
by Pierre Cailloux - February 12, 2005
The goal of this document, within the scope of the practical exam for the GSEC1 SANS2 option 2, is to present a solution for a Company, in order to be able to manage and apply computing security rules on Mainframe and Midrange systems, as well as Facilities Management systems complying with other security rules, specific to customers.
Network Security and the SMB
by Matthew Hawley - January 28, 2005
Network security is an issue for all businesses. The challenges faced by small-to-medium size businesses (SMBs) are unique and significant.
Internal Security in a Engineering Development Environment
by Art Homs - January 17, 2005
Organizations that design, develop, test, and support IP based products present unique security challenges in a converged services network. In an ideal scenario, engineering labs where these activities take place are insulated from the corporate environment to prevent interactions that can compromise corporate network confidentiality, integrity, and availability.
Host Assessment and Risk Rating
by Radhika Vedaraman - August 28, 2004
Corporate websites get defaced; business activities of organizations get crippled; identity stolen; confidential information made public - all because of not securing information and resources, and not taking precautions necessary to protect against attacks.
Patch Management and the Need for Metrics
by Ken MacLeod - August 28, 2004
The principle objective of `Patch Management and the Need for Metrics' is to demonstrate that organisations cannot meaningfully assess their security posture; with reference to their patch status, without the use of appropriate metrics.
Applied Principles of Defense-in-Depth: A Parents Perspective
by Tom Miles - August 25, 2004
This paper will seek to shift the paradigm of the traditional information security model as it applies to business and employees to a more personal model of home and fami
Using Proactive Depth in Defense to Ease Patch Management Problems
by David Gadue - August 15, 2004
Information Security experts agree that "Depth in Defense" is a crucial concept in securing information assets for every organization.
Beyond Patch Management
by Dan Shauver - July 25, 2004
Systems maintenance, including operating system and software upgrades and patch management, has long been a major factor in security-related incidents. Application upgrades and patches can be equally necessary to system integrity, yet are equally likely to be ignored.
Computer Security And The Law: What You Can Do To Protect Yourself
by Karen Poffenbergen - July 25, 2004
Working as a defense contractor, one knows the importance of security regulations and directives. However, do these regulations really protect our mission critical data?
Printing the Paper and Serving the News after a Localized Disaster
by John Soltys - June 9, 2004
A case study detailing the implementation of a business continuity plan for a regional newspaper. This study covers the requirements-gathering process, testing, and implementation of a series of plans jointly developed by members of the newsroom, IT, online staff, and operations.
The Art of Web Filtering
by Robert Alvey - April 8, 2004
Web Filters are designed to improve the security and productivity of a network, but as with anything else, it must be implemented correctly to work properly. In order to ensure a Web Filter is implemented successfully, several factors need to be considered.
Keys to Implementing a Successful Security Information Management Solution (or Centralized Security Monitoring)
by Michael Martin - January 11, 2004
This paper provides nine keys to implementing a successful SIM solution.
Securing the Network in a K-12 Public School Environment
by Russell Penner - December 21, 2003
This paper addresses the K-12 public education data network environment which presents special needs and requirements, including privacy (confidentiality), data integrity, and content filtering.
Defense-In-Depth Applied to Laptop Security: Ensuring Your Data Remains Your Data
by Chris Grant - December 13, 2003
This paper illustrates how to apply a Defense-In-Depth strategy to protect laptop systems.
8 Simple Rules For Securing Your Internal Network
by Douglas Ford - November 6, 2003
This paper will focus on eight areas that a company can look at to make their internal network just as hard and crunchy on the inside as on the outside.
A Practical Methodology for Implementing a Patch management Process
by Daniel Voldal - September 26, 2003
This paper presents one methodology for identifying, evaluating and applying security patches in a real world environment along with descriptions of some useful tools that can be used to automate the process.
Implementing Least Privilege at your Enterprise
by Jeff Langford - September 4, 2003
This paper provides background on enterprise security, offers some rationale to help develop support for it's acceptance, and identifies ways it can be implemented within your enterprise.
Federal Information Technology Management and Security
by John Hopkins - September 4, 2003
This paper examines the long-standing vision of one senior OMB manager to re-enforce a seven year-old plan he helped draft that uses the Federal IT budget planning process to accomplish these three principal objectives.
Open Source Risk Mitigation Process
by Carlos Casanova - August 22, 2003
The Open Source Risk Mitigation Process described in this paper, is a tool for corporations to use when trying to understand why a simple decision to use the "free" Open Source software should be taken very seriously.
Security in Practice- Reducing the Effort
by Leon Pholi - June 27, 2003
This paper covers the ten most vital steps in attempting to achieve a good base level of security, which can then be built upon.
Endusers - A Critical Link in the Chain of Security
by Dana Brigham - June 3, 2003
Establishing the security of Information System (IS) resources is an important and major undertaking in any organization.
A Guide to Government Security Mandates
by Christian Enloe - May 8, 2003
This document endeavors to provide the reader with a solid understanding of the certification process, the order in which the steps should be completed, and some lessens learned from actual experience.
Using a Capability Maturity Model to Derive Security Requirements
by Mike Phillips - May 8, 2003
This paper will discuss the use of these base practices in the formation of security requirements.
The Internal Threat to Security Or Users Can Really Mess Things Up
by Charles Rhodes - March 30, 2003
This paper describes some of the security measures you can implement which will help insure the availability of your network despite the users actions.
Securing an Application: A Paper on Plastic
by Joe Rhode - February 28, 2003
This paper discusses the process of integrating a credit card application to the front end of already existing accounting and payments processing applications, the information risk analysis process needed and the action plan to implement the mitigated controls.
Designing a Secure Local Area Network
by Daniel Oxenhandler - January 30, 2003
This paper examines of some of the issues in designing a secure Local Area Network (LAN) and some of the best practices suggested by security experts.
OpenVMS 7.2 Security Essentials
by Jeff Leving - December 23, 2002
This paper attempts to build on the foundational article submitted by Steven Bourdon in March 2002 (Bourdon), by providing a security-focused overview of the basic tasks performed when installing a standalone OpenVMS server.
Securing Your RILOE Cards
by Rick McCarter - November 27, 2002
This paper outlines the components of the RILOE, detailed features and functionality of the card, pre installation tips, physical installation instructions, physical setup instructions, and initial setup configuration parameters.
Secure Computing - An Elementary Issue
by Susan Briere - October 28, 2002
This paper was developed as a resource for elementary school technical support personnel responsible for maintaining a safe and secure computing environment.
Securing Our Critical Infrastructures
by Chris Brooks - October 11, 2002
In the event of a successful attack, limiting the amount of damage and quickly redistributing the assets to maintain a minimum essential infrastructure is critical in keeping the defense and national economy functioning.
Implementing an Effective IT Security Program
by Kurt Garbars - August 28, 2002
The purpose of this paper is to take the wide variety of federal government laws, regulations, and guidance combined with industry best practices and define the essential elements of an effective IT security program
A Survival Guide for Security Professionals
by Conrad Morgan - March 20, 2002
This survival guide aims to assist security professionals to balance the responsibilities and requirements of their role to avoid stress and burnout.
Who Wants To Be A Weakest Link?
by Russell Hany - March 7, 2002
This paper emphasizes the need to convey good security practices throughout an organization, because the "weakest link" can be located anywhere along a company's "chain.
Centralized Network Security Management: Combining Defense In Depth with Manageable Security
by Scott Rasmussen - January 29, 2002
With a few careful considerations for data redundancy and archival, centralized network security management can take advantage of the full power and potential for defense in-depth and a hardened security posture.
Vulnerability Identification and Remediation Through Best Security Practices
by BJ Bellamy - December 7, 2001
This paper looks at Vulnerability Identification Studies which focus on identifying the enticements, common vulnerabilities, and information leakage, the things that account for most of the risk to IT (Information Technology) that we face today.
System Administrator - Security Best Practices
by Harish Setty - August 16, 2001
This paper discusses some of the best practices, without getting into specifics of any particular operating system or version.
Pre-Development Security Planning
by Keith Marohn - August 13, 2001
This document will outline the basic steps that should be completed before code development begins to ensure delivery of a successful project.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.