230 likes | 356 Views
Information Security: Addressing Surety for Various Communities. Georgia Tech Information Security Center Fall 2004 Distinguished Lecture Series November 4, 2004 Roger Callahan Bank of America. 1. Today *. Discuss the need for information security “surety”. What does that mean?
E N D
Information Security:Addressing Surety for Various Communities Georgia Tech Information Security Center Fall 2004 Distinguished Lecture Series November 4, 2004 Roger Callahan Bank of America 1
Today* • Discuss the need for information security “surety”. • What does that mean? • Emerging indications. • “Surety” framework. *Note: These views represent solely those of the author and not necessarily those of Bank of America.
Source: Bureau of Economic Analysis Data published March 25, 2004
Number of transistors on a microprocessor Source: http://www.intel.com/research/silicon/mooreslaw.htm
Source: “Exploiting Software: How to Break Code”, Gary McGraw and Greg Hoglund, Addison-Wesley 2004
Number of transistors on microprocessor** Today’s amazing information technology environment *Source: Bureau of Economic Analysis Data published March 25, 2004 **Source: http://www.intel.com/research/silicon/mooreslaw.htm *** Source: Internet Software Consortium (www.isc.org) ****Source: “Exploiting Software: How to Break Code”, Gary McGraw and Greg Hoglund, Addison-Wesley 2004
A Perspective • Communications Security (COMSEC) BC • Computer Security (COMPUSEC) 1970 • Information Security (INFOSEC) 1980 • Information Assurance (IA) mid-1990s • Defensive Information Warfare • Critical Infrastructure Protection late-1990s • Critical Infrastructure Assurance • Homeland Security 2001-2003
For Discussion • This complex information technology environment and continuing rapid change in technology challenges everyone. • All businesses, but especially small businesses and personal users, have significant computing and communication power at their disposal and are using it. • Knowledge and diligence are essential to achieving secure use of information systems. • Significant variance in the application of adequate information security practices exists. • Can a new “surety” approach improve the situation?
Value in Centralized Management ApproachesPerimeter Security Experience Each Operational Organizational Unit Manages Their Firewalls
Value in Centralized Management ApproachesPerimeter Security Experience An Information Security Organization Manages a Firewall Utility
People Technology Process Prevent Detect Respond/ Recover Comprehensive Protection Framework Defense in Depth
An Interesting Measure Source: Internet Storm Center – SANS Organization (http://isc.sans.org/survivabilityhistory.php
Proactive Protection Measures • Firewall • Anti-Viral Software • Configurations & Practices that Reduce Risks • Monitoring • Keep Knowledge Current • Apply Software Updates (patches)
Surety Definition: 3) A pledge or formal promise made to secure against loss, damage, or default: a guarantee or security.1 Familiar legal arrangement: Surety Bonds – three-party agreements in which the issuer of the bond (the surety) joins with a second party (the principal) in guaranteeing to a third party (the obligee) the fulfillment of an obligation on the part of the principal. • An obligee is the party (person, corporation or government agency) to whom a bond is given. • The obligee is also the party protected by the bond against loss.2 1The American Heritage Dictionary 2
Other Applications of the Word ‘Surety’ Sandia National Laboratories: • Weapons surety Engineering design concepts related originally to nuclear weapons engineering. • Surety of an information system Defined as ensuring the “correct” operation of an information system through the incorporation of appropriate levels of safety, functionality, confidentiality, availability and integrity1. Through a integrated risk assessment modeling methodology to identify proper design decisions. 1 “Toward a Risk-Based Approach to the Assessment of the Surety of Information Systems” – U.S. DOE Contract DE-AC04-94AL8500
An Information Security Surety Framework • A ‘Managed Service’ that provides a guarantee (“surety”) of a particular level of security that includes recovery, if the guarantee is not met. • Requires: • Business case: • Applicability • Defined levels of security. • Use of risk management (e.g. insurance industry collaboration) • Appropriate public policy and legal construct. • A ‘safe harbor’ for qualified service providers. • Rapid mediation/dispute resolution mechanism • Required technological implementation mechanisms. • Proactive defense in depth approach, remote configuration and management and configuration control, monitoring capability and ability to log and quantify causes of a failure.
Emerging Indications • Automated virus updates • ISP spam and content filtering • Protection from DDOS • QOS options
A Parallel Enterprise Small Business Consumer
Surety For Various Communities Consumers Surety Opportunity Small Businesses Large Enterprises
How could the concept be further developed? An Integrated Effort: • Business Case • Risk Management Options • Public Policy Benefit • Legal Solution • Technological Construct • Dispute Resolution Mechanism • Pilot Implementation
Surety may be in your future… Roger Callahan Phone: 704-388-8455 Email: roger_callahan@bellsouth.net