Uploaded by Boman Avong

Implementation Guidance Presentation LIB

Company Background
Google discovered that Chinese hackers were using a tactic
called “spear phishing,” which presents users with links that
download malicious programs to their computers..
Company Background
Google also found that a database that contained information
on judges' orders regarding permission to monitor e-mails had
also been compromised.
Types of Controls
Security controls can be enforced using
Authentication, Authorization and Access
Authentication involves comparing the credentials
provided by the user to the credential present in the
database file of an authorized user or to the data
present in the authentication server.
Current Authentication
Three Factor Authentication
1. Something you know(Password)
2. Something have(Token)
3. Something you are(Biometrics)
Levels of Authentication
Single Factor Authentication
• One category of credentials
Multi-Factor Authentication
• More than one set of credentials
Authorization is a process by which a server determines if the
client has permission to use a resource or access a file.
Current Authorization
1. Null Authorization
2. Layer 2 Segmentation
3. Layer 3 Filtering(ACLs)
Encryption involves the process of transforming data so that it is
unreadable by anyone who does not have a decryption key.
• The Secure Shell (SSH) and Socket Layer (SSL) protocols are
usually used in encryption processes.
Access Controls
Access control is a security technique that regulates who or what can
view or use resources in a computing environment.
It is a fundamental concept in security that minimizes risk to the
business or organization.
Types of Access Controls
1. Role-Based Access Control
2. Rule-Based Access Controls
Types of Access Controls
1. Mandatory Access Control
2. Discretionary Access Control
1. People-Human error, insider threats and hackers
2. Technology-Buffer overflows, backdoors and injection
3. Policy-Not enough secured policy causing loopholes.
“Spear Phishing”
1. Spear phishing is an email-spoofing attack that targets a
specific organization or individual, seeking unauthorized
access to sensitive information.
“Best Practices”
Avoid providing personal information when answering an email,
unsolicited phone call, text message or instant message. If you’re
unsure about an email’s legitimacy, contact your IT department
or submit the email to Symantec Security Response through this
“Best Practices”
1. Don’t leak intellectual property- even accidentally. Sharing
a picture with a whiteboard or computer screen in the
background online could reveal more than someone
outside of your company should see
“Best Practices”
Read the company’s Acceptable Electronic Use (AEU) policy,
and follow the policies for safe use of your devices. When
backing up to cloud services, be sure to talk to your IT
department first, for a list of acceptable cloud solutions.
“Best Practices”
1. Do not write passwords on sticky notes. Ensure your
password follows the acceptable organization policy
standards for strong passwords.
“Best Practices”
If you need to leave your laptop, phone, or tablet for any length of time
- lock it up so no one else can use it. If you keep sensitive information
on a flash drive or external hard drive, make sure to keep these locked as
well. For desktop computers, shut-down the system when not in use - or
lock your screen.
“Best Practices”
1. Only install an anti-virus program from a known and
trusted source. Keep virus definitions, engines and
software up to date to ensure your anti-virus program
remains effective.
Network and Security
Network users should be trained on best security practices of
email usage.
Effort should be made to teach end users how to treat unknown
sources of email attachments and how to dispose of such emails
without compromising security.
All applications including Operating Systems (OS) should have the
latest service updates.
Network and Security
Introduce a firewall to secure ingress and egress points. A firewall
will subject data leaving in and out of the organization to a
security policy check.
Only authorized data will only be permitted in and out of the
Introduce managed switches to prevent unauthorized devices
from connecting to the network.
Knowledge Check and
To evaluate the effectiveness of the security program, knowledge
checks should be enforced to ensure that users are properly
Observe trainees during the session for your own perception of
their reception.
Get trainee feedback in writing immediately following the session.
Spear Phishing can be best avoided by observing best practices for
email and contents. Periodic user training will reduce the
likelihood of users falling for spear-phishing emails.
Dennis Craven, V. (2018). 6 Tips to Improve Your Building’s Access Control System:
Determine how to integrate the right level of secure access to the people who need
it. Buildings, 112(9), 46. Retrieved from
PEISERT, S. (2017). Security in High-Performance Computing Environments. Communications
of the ACM, 60(9), 72–80. https://doi-org.ezproxy.umuc.edu/10.1145/3096742
Khojasteh, M. J., Khina, A., Franceschetti, M., & Javidi, T. (2018). Authentication of cyberphysical systems under learning-based attacks. Retrieved from