Security Basics mailing list archives

Re: Getting to know the pulse of security breaches, within our enterprise!


From: "BECKY MACDONALD" <BMACDONA () healthplus org>
Date: Sun, 4 Oct 2009 21:34:58 -0400

We implemented QRADAR's SEIM. I like the product and it has helped us identify malware, mailbots and DOS attacks.

Becky MacDonald
Mgr, Network Services & Support
HealthPlus of Michigan
810-230-2071

NOTICE: This communication may contain privileged or other confidential information.  If you are not the intended 
recipient, or believe that you have received this communication in error, please do not print, copy, retransmit, 
disseminate, or otherwise use the information.  Also, please indicate to the sender that you have received this 
communication in error, and delete the copy you received.  Thank you.

[Message delivered by NotifyLink]

----------Original Message----------

From: "WALI" <hkhasgiwale () gmail com>
Sent: Fri, October 02, 2009 11:40 AM
To: "Paul Jenkins" <pjenkins () dsci com>, <security-basics () securityfocus com>
Subject: Re: Getting to know the pulse of security breaches, within our enterprise!


Thanks for the only reply that I have recievd to this one Paul. Maybe the 
other thought that by the subject line it's probably some product blitz. :)

nevertheless, the core concept is not about what guys / user community might 
be doing inadvertently. I do agree with you that an online anonymous 
security reporting mechanism will be helpful though.

I was thinking in terms of having some SIEM (Security Information and Event 
Management ) system be put in place but with affordable cost. Has anyone 
done it to get their threat profile?

One most important area of concern is that related to real time monitoring 
of High-risk roles and assets. It's a given that assets with a greater 
impact on network security or company revenue, should receive greater 
protection. Agreed, that certain groundwork is required to assess all 
internal employee roles and responsibilities, then determine which roles 
need closer monitoring for internal security breaches; but once that's done, 
I need to have infrastructure in place that Audits my security to make sure 
users with greater privileges only access the appropriate files and no 
suspicious activity goes on.

That was the motive behind this posting.

Requesting guys around to share their experiences / inputs.

Thanks in advance.



----- Original Message ----- 
From: "Paul Jenkins" <pjenkins () dsci com>
To: "Hrishikesh Khasgiwale" <hkhasgiwale () gmail com>; 
<security-basics () securityfocus com>
Sent: Tuesday, September 29, 2009 3:25 PM
Subject: RE: Getting to know the pulse of security breaches, within our 
enterprise!


Interesting, when I first read this I was thinking questionnaire. I'm
junior in this field however, I would say A LOT of internal security
breeches are the result of ignorance not malice. So going of my first
thought if you want to take a look at the human aspect of your network
internals why not a management approved and mandated questionnaire. Use
a little psychology on the wording of the questions, and some
hypotheticals just to see what people are really doing on the network
and possibly educate the users at the same time. Now if you want true
and honest answers some form of guaranteed non-retribution will need to
be used. If you do it anonymously you can never tell who has or has not
completed it. If you pull groups into a room and use paper "quizzes"
then just us a count to verify all took one that may work.

-Paul

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Hrishikesh Khasgiwale
Sent: Friday, September 25, 2009 2:31 AM
To: security-basics () securityfocus com
Subject: Getting to know the pulse of security breaches, within our
enterprise!

Hi guys..

I was thinking of designing an infrastructure template, that would
allow me to replicate that model across my organisation which would
enable the fellow team members to proactively monitor the 'red flags'
that might arise within our LAN from time to time. By red flags I
mean, something that would mean there is an imminent 'threat' to the
overall security posture within my enterprise and I am not talking
from perimeter Firewall / IPS perspective but I want to look more
inwards.

Things that come to mind are:

1. Someone who tries to log into an AD account from a workstation that
he/she doesn't usually log into, should be displayed on a dashboard.

2. Account lockouts happening from a given workstation abnormally
(abnormal values can be defined)..

3. Abnormal ports being accessed from workstation (like attempts to
make connection to someone else's C$, d$ share or someone else making
connection to his/her C $ / D $ shares). This might even signify a
malware on this PC that has gone undetected by the local antivirus.

...or any other stuff that might bring about a threat to the overall
security of my environment.

Has anyone been there n done that?

I understand that it's part technology and part design but I am
currently concerned about the design aspect and whether I have my
requirements correctly sorted out.

Any / all suggestions welcome!!

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an
SSL certificate.  We look at how SSL works, how it benefits your company
and how your customers can tell if a site is secure. You will find out
how to test, purchase, install and use a thawte Digital Certificate on
your Apache web server. Throughout, best practices for set-up are
highlighted to help you ensure efficient ongoing management of your
encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442
f727d1
------------------------------------------------------------------------


------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: