security

Anonymous
Overview
Anonymous
The basic staffing requirement of an incident response function is that there be some individual or individuals able to receive and respond to reports during the function's operating hours. The speed of response should be set as part of the function's agreed operating policy, however the working arrangements should allow for emergency situations where action to resolve a problem needs to take priority over all other normal work.
Anonymous
From the preceding discussion it is clear that any organisation connected to Janet must have at least a basic response capability to deal with security incidents as required by its Janet contract. There are also good reasons why the organisation should not be content with this minimum but should provide additional functions for the benefit of its own users and its operation. This extended capability is likely to involve people and groups beyond the basic security incident response group, some of whom may be located in a different part of the management structure.
Anonymous
There are a number of different reasons why a Janet customer site should improve its response to computer security incidents. Depending on the circumstances, different reasons will carry different weight in each organisation: however an effective incident response function should bring benefits in all these areas.
Anonymous
GD/NOTE/009 (03/09)
Anonymous
Section 2: Methods of Countering the Threats UCISA: Information Security Toolkit UCISA: Model Regulations SANS: Critical Security Controls
Anonymous
6.1 Janet Policies Any organisation connecting to Janet is required to abide by three policies established to support the role of the network in enabling education and research. These are as follows:
Anonymous
5.1 Policy Filtering in the Backbone Routers
Anonymous
4.1 Use of Filters Within Routers for Network Access Control
Anonymous
Connecting an insecure computer to a network places that computer, its users and any information it contains at risk. Insecure computers also represent a threat to other computers, users and information on the network, since intruders frequently use one compromised machine to attack others either simply by using it to generate network traffic in a distributed denial of service attack, or more subtly by using the access that the compromised computer or its users have to compromise others.
Subscribe to security