310 likes | 505 Views
CS 456 Security I. Work Station Lock Down Cryptography Information Assurance Information Security Systems Engineering Trust Models, Threat Models and AD Secure Systems Test & Eval Systems Security Testing. CS 456 Security I. Requirements: No Whining 1 Workstation Lab 1 Crypto Project
E N D
CS 456Security I • Work Station Lock Down • Cryptography • Information Assurance • Information Security Systems Engineering • Trust Models, Threat Models and AD • Secure Systems Test & Eval • Systems Security Testing
CS 456Security I Requirements: • No Whining • 1 Workstation Lab • 1 Crypto Project • 1 Midterm • 1 Final
CSIA Track WARNING The material that you will learn in the CSIA track is dual use. The ethical and legal implications of your use of information and techniques presented should always be part of your decisions.
Information Systems Security Information assurance • Electronic information • Ubiquity • Importance • Corruptibility • Information systems • Characteristics • Types • Pervasive
Information Assurance Security Keep information in a known and trusted state that can be used appropriately.
Trust “Generally an entity can be said to 'trust' a second entity when the first entity makes an assumption that the second entity will behave exactly as the first entity expects” ITU-T X.509, § 3.3.54
Threats Threat profiles identify specific threats that are most likely to put your environment at risk. • Unauthorized probing of system or data • Unauthorized access • Introduction of malicious code • Unauthorized modification or disclosure of data • Denial of service attacks
Vulnerabilities Vulnerabilities are characteristics of an information system's architecture, implementation, use or maintenance that has or could compromise the information.
Electronic Information • Digital data • Communications • Executables • System states • Analog information
Information Security Model Information States Transmission Storage Processing Security Measures Training Critical Information Characteristics Confidentiality Policies Technology Integrity Availability
Information States • Transmission • Storage • Processing
Information Transmission • Space • Radio waves • Copper • Analog • Digital • Glass • Snell's Law
Space RF Transmission • Types • Radio and TV • Cell phones • Unintentional • Radio waves • Modulation techniques • Many types of encoding • Easily detected and intercepted • All conductors are antennas • Transmission over wires radiate RF signals
Signals over a Conductor • Analog • Voice - Telephony • TV – Not for long • Digital • Modems • Ethernet • Backplanes • Motherboards
Signals over a Conductor • Conductors are antennas • Ethernet • Telephone wires • Backplanes
Optical Fiber Transmission • Difficult to intercept • To date (2011) • Not difficult now • Many encoding techniques
Information Storage • All of the obvious • However • Caches • HW Buffers • Store and forward technologies • Copy machines (20 GB storage) • Cell phones (Rupert Murdock)`
Information Storage • Laws have changed • Exploits have advanced • Attitudes have changed
Information Processing • Altered executables • Introduced executables • Scripts
Information Security Model Information States Transmission Storage Processing Security Measures Training Critical Information Characteristics Confidentiality Policies Technology Integrity Availability
Critical Information Characteristics • Confidentiality • Integrity • Availability
Confidentiality • Keeping information secret • Encryption • Authentication • Authorization • Non-repudiation
Integrity • Making sure the information is as it should be. • Message authentication code • Message digests
Availability • Making the information is available when it is requested. • System design • Appropriate confidentiality and integrity techniques • No DdoS – bad, bad, bad
Information Security Model Information States Transmission Storage Processing Security Measures Training Critical Information Characteristics Confidentiality Policies Technology Integrity Availability
Security Measures • Technology • Policies & Procedures • Training & Awareness
Technology Measures • Programs • Software • Architecture • Design • Etc.
Policy and Procedures • What to do • How to do it • What is permissible • What is not
Policies • Sample Policies • www.sans.org/resources/policies • Many of these policies are part of the Employee Handbook • These are the laws of the Corp
Procedures • Step by step description on how do something • Update anti-virus program • Configure a firewall • Etc.
Training • Training is dumb • Training is everything • Training, Education & Awareness • The most important security measure • Understanding: • Reasons for security • Reasons for info protection • Results of not doing it