Summary
Inside the Security Mind: Making the Tough Decisions, by security expert Kevin Day, teaches information officers how to think like a top security guru. Using real-world examples, Day explains how to reduce any security problem to a set of essential principles, making it easy to arrive at optimal solutions. Includes practical material on enterprise security issues and measures.
Author Biography
KEVIN DAY is a CISSP and has worked as the lead security engineer and security practice manager fora major East Coast consulting firm. In these positions, Day worked on a series of high-profileprojects for Fortune 500 companies and government organizations. He is the founder of theRelational Security Corporation and currently heads up a joint venture developing new tools andmethodologies security risk assessment and auditing.
Table of Contents
| Prologue | |
| Acknowledgments | |
| Introduction | |
| The Security Mind | |
| Where Do We Start? Where Does It End? | |
| A New Look at Information Security | |
| Security as an Art Form | |
| What We Know About Security | |
| Understanding the Fear Factor | |
| How to Successfully Implement and Manage Security | |
| The Four Virtues of Security | |
| Introduction to the Virtues | |
| The Virtue of Daily Consideration | |
| The Virtue of Community Effort | |
| The Virtue of Higher Focus | |
| The Virtue of Education | |
| Using These Virtues | |
| The Eight Rules of Security (Components of All Security Decisions) | |
| Introduction to the Rules | |
| Rule of Least Privilege | |
| Rule of Change | |
| Rule of Trust | |
| Rule of the Weakest Link | |
| Rule of Separation | |
| Rule of the Three-Fold Process | |
| Rule of Preventative Action (Proactive Security) | |
| Rule of Immediate and Proper Response | |
| Incorporating the Rules | |
| Developing a Higher Security Mind | |
| The Art of Higher Security | |
| Thinking in Zones | |
| Creating Chokepoints | |
| Layering Security | |
| Working in Stillness | |
| Understanding Relational Security | |
| Understanding Secretless Security | |
| Dividing Responsibilities | |
| Failing Securely | |
| Making Security Decisions | |
| Using the Rules to Make a Decision | |
| The Decision-Making Process | |
| Example Decision | |
| Know Thy Enemy and Know Thyself | |
| Understanding the Modern Hacker | |
| Where Modern Vulnerabilities Exist | |
| Modern Targets | |
| Modern Exploits | |
| Neglecting the Rules: A Hacker's Tale | |
| Creating Your Own Security Profile | |
| Becoming Invisible to Your Enemies | |
| Practical Security Assessments | |
| The Importance of a Security Audit | |
| Understanding Risks and Threats | |
| The Traditional Security Assessment Model | |
| The Relational Security Assessment Model | |
| Relational Security Assessment Model: Risks | |
| Relational Security Assessment Model: Controls | |
| Relational Security Assessment Model: Tactical Audit Process | |
| Analytical Audit Measures | |
| Additional Audit Considerations | |
| The Security Staff | |
| Building a Successful Security Team | |
| Bringing in Security Consultants | |
| Outsourcing Security Maintenance | |
| Modern Considerations | |
| Using Standard Defenses | |
| Open Source vs | |
| Closed Source Security | |
| Wireless Networks | |
| Encryption | |
| Virtual Private Networking | |
| The Rules in Practice | |
| Practicing the Rules | |
| Perimeter Defenses | |
| Internal Defenses | |
| Physical Defenses | |
| Direct Object Defenses | |
| Outbound Internet Access | |
| Logging and Monitoring | |
| Handling Authentication | |
| Going Forward | |
| The Future of Information Security | |
| Tips on Keeping Up-to-Date | |
| Ideas for Training | |
| Additional Recommended Audit Practices | |
| Recommended Reading | |
| The Hidden Statistics of Information Security | |
| Index | |
| Table of Contents provided by Publisher. All Rights Reserved. |
Excerpts
Prologue In the Beginning... It has been nine years since I first took up the sword to ward off a malicious two-headed hacker that was invading my lands. Over the past nine years I have witnessed a great deal of carnage and gore in the information security world. Securing everything from governments, Fortune 500 companies, health-care giants, medical research institutes, and even the good, old mom-and-pop shops has led me though a long maze of questioning and discovering. I have lived a cycle of life starting from the intrigued beginner, to the sworn hands-on technologist, to the enthused architect, to the senior advisor, and finally, the simple philosopher. Like many philosophers, I cannot claim the ideas and practices in my book to be my own. They have simply been the inspiration of security related events and studies that have passed before me over the years. Eventually, the mind begins to notice things, patterns to what otherwise seems like simple madness. I began to realize what an incredible tool the recognition of these patterns presented; weapons of defense that can be wielded by everyone, not just by the security experts and the technically elite. Here, I invite you to use these same weapons to protect your own homeland. The practices contained in this book have been proven time and again in direct combat with the enemy. The companies that have unfixed their eye from the size of their cannons and focused instead on the principles presented here have achieved security without a great deal of effort. For you see, the determining factors in a successful battle are not simply the technologies used, but the planning, strategizing, and decision making that take place before, during, and after the battle is complete. Today, too many battles have been lost while following the commonly adopted guns and swords of information security. Too much blood has been spilled and too many retreats have been sounded in the chambers of our corporate lords. The first line of this book states, "The time has come for a different way of thinking about information security." What we are about to look into is not really "new" at all, but time honored practices of the ages, simply presented in a new and effective way. Who Should Read this Book? Inside the Security Mindwas written in such a manner that anyone with the most basic IT knowledge will be able to read it. This was done with great care as I truly believe that everyone associated with technology within an organization should read this book. The chapters build upon constant and universally applicable rules of security that everyone should know and practice. Rather than having to spend years in study or practicing in the industry, however, the reader has only to grasp the concepts presented here. That is the goal of this book, to provide the reader with tools to think like a security expert and to correct the many flaws that currently plague the information security world. As such, I highly encourage the following people to read this book: IT Managers.This book is designed to help the reader make good, effective, and consistent security decisions without a great deal of study. Today, security should be a concern for all IT-related managers and directors, and for many who are not directly related to IT. Even if you are not responsible for any specific security practice, it is important to protect your department, facility, or corporation from the many security and availability threats in the world. The majority of successful security attacks over the past few years could have been prevented if the local staff only had been aware of security. When the concepts contained herein are understood and practiced, you will become "security aware" without having to take a class or learn how to install a firewall. I highly encourage those in charge of any aspect of IT to read this book and recommend it to your IT employees. Technical Gurus.As has become obvious over the years, every piece of information technology is in need of security focus. It is impossible to implement a server, router, application, VPN, or wireless extension without affecting the security of the rest of the organization. As such, anyone dealing with technology should have security awareness while performing their daily duties. This book is designed to create a high degree of such awareness and provide tools and techniques that can be applied to every type of technology, whether designing, developing, or implementing it. In the final sections, we will explore several technologies that require the most security care, and we will discuss how to safely implement them. Going far beyond this, however, the guidelines given throughout the book can and should be applied to all technologies. After reading this book, the next time you hook up a router, install a server, or bring up a new WAN link, you will know where to look for the security implications and how they should be addressed, regardless of the specific technology. Up-and-Coming Security Practitioners.The concepts presented in this book represent the heart and soul of information security. Anyone desiring to be a security professional should become thoroughly familiar with them. So put down that firewall manual, take a break from configuring the IDS sensor, and venture to read what security is all about. This book is probably the quickest way to advance to the next level in your security abilities. Seasoned Professional Security Practitioners.This will be a great book for building on concepts you probably already have in your head. I have found it of great use to have the concepts that are normally flitting about in the back of the mind, laid out in plain sight. Beyond this, Inside the Security Mindprovides a great structure for you to build security practices, and is quite helpful in conveying security concepts to your managers, directors, employees, and clients. How to Read this Book As you have no doubt concluded, this is probably not going to be your everyday IT reading experience. The style of this book was not adopted just to be cute and friendly, but rather to set the proper mood. In a moment, you will turn to Chapter 1, and you will not find a formal textbook on information security, but a true-to-life guide on surviving in the IT industry. This book requires only that the reader proceed with an open mind and an expectation of something pleasantly different. I would not be surprised if there are sections within this book that contradict the practices you have read or seen in the past, and perhaps, at the conclusion of the book, we will all agree on why. The book flows linearly with each concept building upon the concepts presented before it. In the beginning, we will cover The Virtues of Security, basic understandings of how security should be embraced within an organization. We will then build upon those virtues to derive The Eight Rules of Security, practical concepts that can be easily applied in just about every situation. Next, you will find higher concepts that build upon the rules, and then, finally, a plethora of practical applications where all of this information is synthesized into real-world uses. As you can probably guess, this is not a book with which one should skip back and forth through the pages searching for a specific topic. In order to fully understand the recommendations on protecting your VPNs, for example, you must first understand the virtues, rules, and concepts that the recommendation has been built upon. As such, I would highly recommend reading Inside the Security Mindin its entirety, even the sections that may not seem to directly apply to your environment. Sections within this book that deal with specific technologies actually apply universally and will often yield information to help