Source of Changes:
President’s Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Office of Management and Budget Memorandum M-17-25 – next-generation Risk Management Framework (RMF) for systems and organizations
NIST SP 800-53 Revision 5 Coordination
Tier 1: Organization level
Tier 2: Mission/Business Process level
Tier 3: Information System level
Tier 1: Organization Level risk management
Tier one addresses security from the organizations perspective. The activities include the implementation of the first component of risk management, risk framing. Risk framing provides context of all the risk activities within an organization, which affects the risk activities of tier 1 & 2. The output of risk framing is Risk Management Strategy. In tier 1 the organization establishes and implements governance structure that are in compliance with laws, regulations and policies. Tier 1 activities include establishment of the Risk Executive Function, establishment of the risk management strategy and determination of the risk tolerance.
Tier 2: Mission/Business Process Level risk management
Tier 2 risk management activities include: 1) defining the mission/business processes to support the organization. 2) Prioritize the mission/business process with respect to the long term goals of the organization. 3) Define the type of information needed to successfully execute the mission/business processes, criticality/sensitivity of the information and the information flows both internal and external of the information.
Having a risk-aware process is an important part of tier 2. To be risk-aware senior leaders/executives need to know: 1) types of threat sources and threat events that could have an adverse affect the ability of the organizations 2) the potential adverse impacts on the organizational operations and assets, individuals, the Nation if confidentiality, integrity, availability is compromised 3) the organization�s resilience to such an attack that can be achieved with a given mission/business process
Tier 3: Information System risk management
From the information system perspective, tier 3 addresses the following tasks:
1) Categorization of the information system
2) Allocating the organizational security control
3) Selection, implementation, assessment, authorization, and ongoing
Chapter 3 focuses on the step to have a comprehensive risk management program. The tasks discussed include:
DIACAP has “Risk Management Framework Transformation Initiative” underway that provides information on use of NIST SP 800-53, NIST SP 800-37, CNSS Instruction 1253.
The site introduces changes being made to DoDD 8500.01, DoDI 8500.2, DoDI 8510.01 and other documents that will be aligned with NIST 800 and FISMA 2013. They will feature an attempt to keep up with new arising cyberthreats, vulnerabilites and security incidence using real-time, “continuous monitoring” technologies such as HP ArcSight, McAfee ESM, ePO, NSP, Retina, Nessuss and other near real-time active monitoring systems.
road to diarmf
Why DIACAP to DIARMF?
Federal government has gotten more serious about security. They realize that enterprise level security and process is a continuous and expensive business. The old certification & accreditation process is not only long and expensive but so slow that it cannot keep up with the constant changes of information technology.
Risk based/cost effective security means creating security systems and policies that focus on “adequate security”. The Executive Branch Office of Management and Budget (OMB) defines as adequate security, or security commensurate with risk, to include the magnitude of harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information. The feds are also attempting to make the process of implementing and evaluating security controls by creating as much paper-less automation as possible.
note IMHO: Since technology is changing at a rate of what Ray Kurzweil calls “accelerating returns” I think for governments and organizations stuck in “static policy” based systems there is no way they can ever keep up with information technology without revolutionary shift in thinking. Google is probably the closest to understanding what is actually happening. The best any of us can do is observe.
Source documents for all U.S. Federal information security:
OMB A-130 – Management of Federal Information Resources
FISMA – Federal Information Security Management Act of 2002
Required for all government agencies to develop, document, and implement an agency-wide information security program to provide information security for the information and systems that support the operations and assets of the agency Applies to contractors and other sources.
The federal government has created various acts/laws to implement to changes to the C&A process to a more risk management approach and emphasize a risk-based policy for cost-effective security. These acts include (but are not limited to):
Federal Information Security Management Act of 2002 (amended as of 2013 April)
The Paperwork Reduction Act of 1995
The Information Technology Management Reform Act of 1996 (Clinger-Cohen Act) supported by Office of Management and Budget (OMB) through Circular A-130, Appendix III, Security of Federal Automated Information Resources
DISCLAIMER: I have no first hand knowledge of the NSA PRISM program. This is just my personal opinion of Edward Swowden’s release of classified information and the impacts.
What is PRISM:
PRISM is the code name for the data collection program which was born out of the Protect America Act.
Recently Mr. Edward Snowden released classified information to the international media and fled the U.S. He was working on the PRISM program and felt that the right thing to do was to tell U.S. citizens about their loss of privacy.
SHH!! Don’t tell anybody this.. but privacy has BEEN gone if you are on Facebook, Google or any other social network. These organization are storing our private data. But what do these organizations do with that data?
Do they try to protect your data?
Do they sometime release it to third parties?
Can certain data you store on their system be used against you in a court of law?
All of the Above 🙂
Encrypt your data. That is the only real way to have privacy to a trusted party. Don’t use FB or Google for stuff you want hidden.
The Need for Some Sort of PRISM:
Spies get a very very bad rap lately. Analysts are unsung heros. It that world nothing is what it seems. The media presents one side of everything. You have to dig and cross reference to get facts. Intelligence provides a proactive answer to security. I am speaking from the perspective of someone who has done security defensively. There is a need for gathering data within the U.S. infrastructure. Once data is gathered, it can be correlated to detect patterns of potential threats.
So I think we MUST have something like PRISM (especially in the US) due to the exposure of our assets and the subsequent likelihood of attack. We have a high risk. And the greatest risk is from INSIDERS (ironically enough PRISM cannot protect itself).
There are three main issues with the programs current setup:
1. Lack of Oversight & Transparency: There seems to be very little transparency and oversight that represents US citizens regarding privacy and controlling how far the government can go. US Senators are led away from what is really going on.
2. Total Information Awareness: This system may be too DAMN powerful as far as what it is capable of. In fact, it seems to be like using GOD Mode 24/7 to gather information. Snowden mentioned that it can track ANY email.. is this on a whim? does there need to be some sort of probable cause or “reason to believe” or is this left to the discretion of the guy with his finger on the button.. this leads to the next issue..
3. The Patriot Act II + Protect America Act = Its too DAMN politically powerful. This program has the legal backing to do anything with NO checks and balances.
Is SNOWDEN A HERO?
Would I call Snowden/Manning heros/martyrs? I would not group Snowden with Manning. The information that Snowden released (so far) is showing a the capability of NSA spying (something that was done by whistle blower William Binney in 2002). PVT First Class Bradley Manning leaked a lot of war material that risked a lot of people’s lives:
The problem with this is that it actually endangered the lives of informants, and some people that were on the ground in Afghan/Iraq. Manning fucked up big time. Snowden is a hacktivist who will have to spend sometime in prison or in Iceland evading the US government unless the American public rallies to sway the politicians.
My hope is that there is due care taken on this issue. Because there is a real concern regarding the Constitution, Privacy and uncheck powers of the government. If not, perhaps the next administration will take up the call of the people. Sarbanes–Oxley Act of 2002 has a Whistleblower Protection Act that would be helpful if such a law could apply to Snowden. I am not so sure about that.
Transparency & Accountability
I know their needs to be transparency and accountability. But I think its naive to think that we should release all information on all classified data to the world as the Wikileaks crowd believes.
Organizations & States have an obligation to maintain Confidentiality of critical data.
That means databases with witness protection programs must be kept Confidential, bank transactions must be protected..
Nations have some serious enemies (ESPECIALLY the US). The US governments duty is to protect its people from those enemies (foreign or domestic).
Consider this: Certain information on the physical/logical locations of weapons systems, pattens on lethal biochemicals, information on the capabilities of a nation are very effective tools in the hands of really bad people.
Its naive to think that opening up all classified data is going to set the world free. I wish humanity was in a kinder, gentler situation.. but the reality is some crazy people want to kill as many people as possible.
Yes! I agree that governments with unrestricted power can be MUCH more dangerous. Some transparency with check and balances are necessary.
WAR OF INFORMATION
The post modern war conflict is a fight over ideology. Its less about my nation versus your nation and more and more about belief systems.
RIGHT NOW there is someone with the intent to kill as many people as possible. With the capability and opportunity they would strike. There IS an enemy and they are anywhere and everywhere. You can no longer point at a map and say “All these people are my enemy.”
Now there is an enemy willing to kill you over what you believe, what you represent and what they think you are. And more than likely, THEY are living in your city. Who are “THEY”?
Figuring out who THEY are.. is where data mining and correlation comes in.
The threat-source can be from ANY country, race, creed, or religious faction. They are more and more likely to have a citizenship in your country for the sake of having free reign to make the most damage on the most people that represent what they seek to destroy.
Its sounds crazy until a bomb goes off in the middle of a Boston Marathon with the attackers on their way to Time Square. Luckily, there was surveillance to help deter further killings.
How do we fight against these threats?
Threats can be detected via patterns within information.
Solution: The government should allow the program manager of the system to explain why its necessary, provide proof of its usefulness. Limit the use and extent of PRISMs power.
I hope the president will listen to the Internet community on this. I hope that some political party will hear the cries of thousands of potential constituents then take an intelligent look at the public’s concerns. Realistically, the American public voted on the reps that backed the laws that created this system. They accepted it by proxy. But the shock is from the alleged reach of this program. Its too bad it took Snowden is risking years away from home and possibly prison for the US to wake up and start talking about something that was leaked years ago.
The AVG secure search toolbar seems to appear out of nowhere and its annoying. Its annoying because you probably did not want it. AVG is a legitimate anti-virus software, but its search/homepage hijack is a bit pushy. I prefer a search engine without AVG on my Chrome browser.
Luckily, AVG allows you to get rid of it in a few clicks.
Select “Restore default new tab” in the far right-hand corner.
Uninstall avg search
Upon selecting “Restore default new tab” you will be led to “AVG security toolbar settings”. Deselect “Show AVG Secure Search Box on new tabs in the browser” then select “OK”.
After that, you will need to close the application and reopen it.
Systems, applications, Products (SAP) is a security auditing program that checks a computer systems data integrity and overall security. This application is accompanied by a user interface that is highly flexible. SAP security audit programs were introduced in the 1980s and provides the best audit resources for major companies and industry leaders.
In SAP, audit security is the foremost requirement enabling access control and separation of duties. These two areas are very important for the integration of control mechanisms. A company must plan prior to implementing SAP to obtain better access and a clear understanding of the system. This includes proper design of profile and removal of surplus IDs. Security audit programs includes many audit procedures that are designed to efficiently access a variety of transactions.
The main administrative function of SAP security Audit Programs includes automatic scheduling of jobs according to different user IDs, monitoring errors, administering backdrop session and access to proper management functionality. As far as security settings are concerned, SAP system audit program helps to execute online programs using different procedures and maintenance of different tables. This allows access to maintain different profile parameters including password and security of default user IDs. SAP system audit programs also allow locking of sensitive codes of transactions and execution of OS commands externally.
The SAP system audit program contains different audit procedures showing steps to extract useful information from a system. Some system audit program resources are highly beneficial and include audit programs for financial accounting, audit programs for basic security, audit programs for Fixed Asset, audit programs for expenditures, audit programs for treasury, audit programs for inventory management, audit programs for HR & payroll and audit programs for revenue. Companies using SAP applications can create different software packages to meet their key objectives. This application is assembled in such a way that allows each department of an organization to get integrated.
I was given the honor of reviewing GFI LANguard network and security scanner. Right off the bat I notice that the interface is very intuitive & easy to use, which is important to a busy security professional that have better things to do with their time than fight with a messy
The network scanning tool I normally use is called Retina.
When lining the two up, I have to say Retina is much more powerful, with many more options built in. It can drill way down and do intrusive scans where GFI LANguard v.9 is pretty vanilla. It gives you what you need and that is it.
The simplicity could be an advantage to a system admin doing a security job, because it really is straight to the point. The cost is definitely and advantage. GFI LANguard is about ½ the cost of the Retina Scan tool.
Retina Professional Edition 16 IP Pack – $995.00
GFI LAN Guard goes for about 300+ for 10 licences.
Nessus is considered one of the best network scan tools but its more expensive then both.
What I really like about Retina is that it allows you to scan in accordance with Department of Defense standards, SAN, and others. Languard does look at the SANS Top 20 report vulnerabilities.
If your looking for basic, down to Earth network & security scanner for your small to medium business needs, than GFI Languard is definitely the way to go because you will not beat the cost for the quality and support you get. Its going to give you a thorough assessment of the your systems and even tell you how to fix them. Buy this product!
The United States’ top commanding officer for the space and cyber domains told reporters last week that a cyber attack could merit a more conventional military response.
During a press briefing on Thursday, U.S. Air Force General Kevin Chilton, who heads the U.S. Strategic Command, told reporters that top Pentagon advisors would not rule out a physical attack on any force that attacks the United States through the Internet. Currently, the military’s networks are probed thousands of times a day, but the goal of attackers seems to be espionage, not to take down critical networks, he told reporters –
I don’t believe that military force is the equivalent action for a cyber attack. Arrest and/or apprehension is the physical response necessary for criminal hackers attacking from other countries. Cyber counter-attacks are the correct response for government funded & coordinated attacks.
I think if the U.S. reciprocates a cyber attack x10 when other countries are playing little games, we’d get our message across effectively. We should do so in a well funded and covert way in which the enemy has NO DOUBT that the face slap came from a U.S, hand, but no proof at all allowing plausible deniability. It should be black Ops hacks, very well coordinated, very well funded and full time.
I don’t think the US can be complacent or wrecklessly meek in matters of cyber warfare. Instead, it must be fair, quiet and heavy handed when it comes to one of its most valuable asset, information.
So apparently, part of the U.S. critical infrastructure has already been exploited. It doesn’t surprise me. Its all fun and games with developers, engineers and scientists until their ass is getting hacked. They resist. They say “who the hell would hack this system” “HOW the hell would they hack it”. They cut corners and make excuses. Then, when the system is hacked, they blame it on the rain. The good news is that they know its been infiltrated.
I wonder why they didn’t design it as a closed network. Make all critical functions completely inaccessible to the outside world. It’s got me wondering if they even used an Information Assurance standard.
This was news I could not ignore because I really, really like Gmail. These hacks are ridiculous. I hope that google is getting a handle on this. It looks like the accounts are getting hacked with some sort of script that runs from a site or email while gmail is opened:
According to David Airey & gnucitizen.org:
The victim visits a page while being logged into GMail. Upon execution, the page performs a multipart/form-data POST to one of the GMail interfaces and injects a filter into the victim’s filter list. In the example above, the attacker writes a filter, which simply looks for emails with attachments and forward them to an email of their choice. This filter will automatically transfer all emails matching the rule. Keep in mind that future emails will be forwarded as well. The attack will remain present for as long as the victim has the filter within their filter list, even if the initial vulnerability, which was the cause of the injection, is fixed by Google.
As many of you already know on November 2nd, MakeUseOf.com’s domain was stolen from us. It took us about 36 hours to get the domain back. As we have pointed out earlier the hacker somehow managed to get access to my Gmail account and from there to our GoDaddy account, unlock the domain and move it to another registrar.
I wasn’t planning to publish anything about the incident or cracker (person who steals domains) and how he managed to pull it off unless I was completely sure about it myself. I had a good feeling it was a Gmail security flaw but wanted to confirm it before posting anything about it on MakeUseOf. We love Gmail and giving them bad publicity is not something we would ever want to do.
Now the thing is the domain name domainsgames.org is protected by Moniker and they hide all the contact info for it.
Created On:22-Oct-2008 07:35:56 UTC
Last Updated On:08-Nov-2008 12:11:53 UTC
Expiration Date:22-Oct-2009 07:35:56 UTC
Sponsoring Registrar:Moniker Online Services Inc. (R145-LROR)
Status:CLIENT DELETE PROHIBITED
Status:CLIENT TRANSFER PROHIBITED
Status:CLIENT UPDATE PROHIBITED