320 likes | 363 Views
IN5280 Security by Design. Introduction. Who am I?. Lillian Røstad, PhD Adjunct Associate Professor, UiO Head of Cyber Security Advisory , Sopra Steria Previously Adjunct Associate Professor, NTNU (2004-2018), teaching : TDT4237 Software Security TTM4175 Ethical Hacking
E N D
IN5280 Security by Design Introduction
Who am I? • Lillian Røstad, PhD • AdjunctAssociate Professor, UiO • Head of Cyber Security Advisory, Sopra Steria Previously • AdjunctAssociate Professor, NTNU (2004-2018), teaching: • TDT4237 Software Security • TTM4175 Ethical Hacking • Head ofinformationsecurity unit, Difi (2013-2015) • CISO, Lånekassen (2009-2013) • Research scientist, informationsecurity group, SINTEF (2002-2009)
Who areyou? • Name • Yearofstudy • Motivation for taking thecourse • Why? • Expectations for thecourse • What? • Previousexperiencewith cyber security • Courses taken? • Previousexperiencewithsoftwaredevelopment • Courses taken?
Lecture plan • Thursday 10:15-12:00 – Lecture • Friday 10:15-12:00 – Guidanceonhomeexams
Exam • Home exam – 40% • Final exam – 60% • Home exam part 1 • Hand-out Friday February 8th • Deadline Friday March 1st @4pm • Home exam part 2 • Hand-out Friday March 22nd • Deadline Friday April 26th @4pm • Exam June 5th @9am (4 hours), Inspera
Home exam - groups • 2-3 students per group • Submit to lilliaro@uio.no by February 1st • If youdon’tsubmit a group, youwill be assigned to one • Home exam part 1 – a case to be solved • Home exam part 2 – (probably) an essay on an approvedtopic
Researchers found an average global preference for: • sparing humans over animals • more people over less • the younger over the older
"Only the (weak) preference for sparing pedestrians over passengers and the (moderate) preference for sparing the lawful over the unlawful appear to be shared to the same extent in all clusters."
Vulnerability Attack Incident Let'stry to make make less ofthese!
The Trinity of Trouble Connectivity Complexity Extensibility
No more - «Penetrate & Patch» A movetowards: Building Security In Photos: Colourbox
AssetsIdentification – Categorization – Assessment Knowwhatyou have – thatneeds to be protected
Types ofassets • Information assets, examples: • Customer data • Employee data • CRM data • Software assets, examples: • E-mail system • Online ordering system • Commonauthentication (SSO) system • Physicalassets, examples: • Buildings • Servers • Network equipment
Case – Digital exam system • The Universityof Southern Nomansland has decided to procure a Digital Exam System • This new system should support: • Creationofexamsincludingcollaborationonthistask • Safekeepingofexamsuntiltheexact time theexaminationbegins • Examinationincluding hand-in ofcompletedexams • Distribution ofcompletedexams to censors • Communicationofresult to students • Receive and managecomplaints from students • Communicationof final results to students
Task 1 • Identifyassets for the digital exam system • Information • Software • Physical
Task 2 • Canyoucategorizetheidentifiedinformationassets?
Task3 • Assessthecriticalityoftheassetswithrespect to • Confidentiality • Integrity • Availability