140 likes | 250 Views
Enrolling the fifth column. Structure and standards in an MSc Module. Danny Dresner daniel.dresner@ncc.co.uk. History. University of Manchester The Industrial Liaison Panel School of Computing Science CS639 Computer Security Budget Materials, lecturers, marking Planned . . . 84 hours
E N D
Enrolling the fifth column Structure and standards in an MSc Module Danny Dresnerdaniel.dresner@ncc.co.uk
History • University of Manchester • The Industrial Liaison Panel • School of Computing Science • CS639 Computer Security • Budget • Materials, lecturers, marking • Planned . . . 84 hours • Actual (to date) . . . 161 hours • Two months @ 4:45 a.m. • (Definitely an IT project!) • Out of research . . .
Founded in 1966 The UK’s foremost membership organization for IT Users Principia/IITT/Certus/CIO-Connect/Impact Mission to promote the more effective use of IT 1000 member organisations in UK Representing £billions in turnover Private and public sectors Voice of the IT user Focus: identifying, creating, disseminating best practice across all areas of IT Not for profit/limited by guarantee Certificated ISO 9001/TickIT BS 7799 Part 2 Security Special interest group Events and Training NCC Guidelines Method for mitigating IS operational risk Best Practice Guides BS 7799 Implementation method Secure Web Hosting Consumer Assurance Framework for Electronic Commerce Research reports The first breaches survey Actual practice Risk management The National Computing Centre
Manage the risks with standards Computer Security Military Intelligence The laws of thermodynamics* But you can manage the risks . . . Body of knowledge for mitigating risks: standards Theory: Don't teach security, teach risk management * You can’t win . . . you can’t even break even
Security Policy Security Organisation Asset Classification and Control Personnel Security Physical and Environmental Security Communications and Operations Management Access Control System Development and Maintenance Business Continuity Management Compliance BS 7799 Structure: think systems
Focus on operational processes Business focused Recognised best practicefor information security:BS 7799 What students can get out of this . . . • Good understanding of how to define system security requirements • Be able to prioritise requirements, and match requirements to solutions and countermeasures commensurate with associated risks • Good understanding of the correlation of business processes to technology in relation to security requirements • Familiarity with the relevant industry security standards, regulations, and their application
Fear • Systems approach would scare off the computer science ‘techies’ • Dr. Ning Zhang ready with encryption algorithms and firewall theory • But still a soft systems approach overall • Did it put them off?
Take up and make up • 60 students of the Advanced Computing Science MSc • 44 on Computer Security • 2 external • 2 engineering • 1 PhD student just for the lectures • International
Preparation (40 hours) Get to grips with the case studies Real systems (No lab.) Lectures 4 * 9:30 to 17:00 1 * 9:30 to 13:00 Daily question sheet Guest speakers McAfee, NCC Group, IRM, Cisco (Employment prospects; tomorrow’s purchasers) Assignment (40 hours) Information assurance plan (No exam.) Structure of the course
Focus the standard(s) Coursework
What did the teacher learn? • Student participation • Not using 'assignment sessions' • Then many questions up to the deadline • Apparently little preparation was done during the preparation week • Treating the assignment as an exam and not a case study. • What were the goals of the assignment? • How well did the students do? • Seeing security requirements as passwords and firewalls
Conclusions • Security through risk management • More role play to get in tune with the assignment • Successful for getting to grips with inspections • Still need to differentiate tools and techniques from requirements • Emphasis on not trying things at home! • The fifth column is on the march!
Questions? Danny Dresnerdaniel.dresner@ncc.co.uk