1 / 22

Teaching Complex Concepts: “Garden Tool” Techniques

Litchko & Associates, Inc. Secure Business-based Solutions tm. Teaching Complex Concepts: “Garden Tool” Techniques. Jim Litchko Litchko & Associates, Inc. 301-493-0001 jim@litchko.com. Characteristics. simple as possible

laticia
Download Presentation

Teaching Complex Concepts: “Garden Tool” Techniques

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Litchko & Associates, Inc. Secure Business-based Solutionstm Teaching Complex Concepts: “Garden Tool” Techniques Jim Litchko Litchko & Associates, Inc. 301-493-0001 jim@litchko.com

  2. Characteristics • simple as possible • provide visual clues to stimulate audience questions and understanding • have some conceptual relationship to what is being taught • presented with audience interaction with the substitute • should be light, playful and/or entertaining, and • must be portable and inexpensive.

  3. Admiral Grace Hopper 1000’ of wire for a microsecond <1’ for a nanosecond She was trying to impress upon students the importance of not wasting any measure of a second.

  4. ALGORITHM ABC R3U GC9 Clear Text Crypto Key Encrypted Text ABC R3U GC9 ALGORITHM Clear Text Encrypted Text Crypto Key Components and Process • ENCRYPT • DECRYPT

  5. Secret Crypto Keys Currency Vendor Buttons Vendor samples Integrity Confidentiality Authentication Non-Repudiation Integrity Confidentiality Authentication Non-Repudiation

  6. ALGORITHM ALGORITHM ABC R3U GC9 ABC Clear Text Encrypted Text Secret Key Secret Key Clear Text Secret-Key Encryption ENCRYPT DECRYPT Confidentiality? Authentication? Integrity? Non-repudiation?

  7. Litchko & Associates, Inc. Secure Business-based Solutionstm James Litchko President/CEO jim@litchko.com (301) 493-0001phone (503) 961-8391fax 4604 Saul Road, Kensington, Maryland 20895 Public Crypto Keys Public Key Private Key Integrity Confidentiality Authentication Non-Repudiation Integrity Confidentiality Authentication Non-Repudiation

  8. ALGORITHM ALGORITHM R3U GC9 ABC ABC Clear Text Public Key Encrypted Text Private Key Clear Text Public-Key Encryption ENCRYPT DECRYPT Confidentiality? Authentication? Integrity? Non-repudiation?

  9. ALGORITHM ALGORITHM R3U GC9 ABC ABC Clear Text Clear Text Public Key Encrypted Text Private Key Public-Key Encryption ENCRYPT DECRYPT Confidentiality? Authentication? Integrity? Non-repudiation?

  10. Issues/Considerations • Costs • Not just the cost of the Encryption product. • Additional cost include: • ?

  11. “Blocks and Hoses” Corporate Center Cleveland Bay Area Office New York Office Competition Chicago

  12. Blocks and Hoses

  13. Cost ofCryptographicSolutions Chicago Cleveland San Fransisco New York

  14. Issues/Considerations • Costs • Not just the cost of the Encryption product. • Additional cost include: • ?

  15. Ethernet Card Ethernet Card O/S Untrusted Network Ethernet Card Internet Firewall Application Level Gateway Trusted Network Router

  16. Ethernet Card O/S Untrusted Network Ethernet Card Internet Firewall “hardening the operating system” Trusted Network Router

  17. Trusted Network Ethernet Card Untrusted Network Proxy Ethernet Card Internet Firewall proxy or application Router

  18. Use the audience: inclusion means participation Corporate Internet

  19. Client Real-world Comparisons I. A. Teller

  20. User’s requests forwarded User’s requests Application output Application output forwarded Proxies . . . . for the Application Gateway. SERVER CLIENT M. A. Proxy

  21. Litchko & Associates, Inc. Jim Litchko’s Bio: Mr. Litchko is a senior information systems security specialist with over twenty-five years experience assessing and developing information system security (INFOSEC) solutions for computer and network systems. He has held senior executive positions for special projects and business development at the two largest commercial INFOSEC companies, Secure Computing Corporation and Trusted Information Systems and the enterprise integrator, Telos, all internationally known for advance INFOSEC research and development, consulting, and network security products. During his twenty-year career as a Navy cryptologist, Mr. Litchko spent his first six years supporting operations on naval combatants and air reconnaissance platforms in the Atlantic, Pacific, and European theaters. Mr. Litchko’s last five years in the Navy were in staff and technical positions in the National Security Agencies (NSA) INFOSEC Directorate and the National Computer Security center (NCSC). His last position was Staff Chief for the Director of the NCSC. Since 1988, he has been an instructor for systems and network security for Johns Hopkins University, MIS Training Institute and the National Cryptologic School. He has also given INFOSEC presentations to Congressional staffs, Gartner Group, Conference Board, Price Waterhouse, Exxon, Freddie Mac, National Industrial Security Association, Computer Security Institute (CSI), National Computer Security Association (NCSA), Defense Intelligence University, and Armed Forces Communications and Electronic Association (AFCEA). Mr. Litchko has chaired panels and provided INFOSEC presentations at national, international, and executive conferences. He holds a Masters degree in Information Systems from John Hopkins University and a Bachelors degree in Industrial Technology from Ohio University. He is currently an independent systems and network security consultant. Secure Business-based Solutionstm jim@litchko.com (301) 493-0001phone (503) 961-8391fax 4604 Saul Road, Kensington, Maryland 20895

  22. Issues/Considerations • Costs • Not just the cost of the Encryption product. • Additional cost include: • Cost of crypto Interface • Key distro Key Generation • Maintenance Key management • Backup Recovery • Coordination Through Put • Alt site Testing • Training Storage

More Related