730 likes | 1.07k Views
Securing an Information Resource Management System. Overview. Security issues of an information resource management system Secure physical network Standards and protocols used in information security Management tools used to implement that system. Information Security in Society.
E N D
Overview • Security issues of an information resource management system • Secure physical network • Standards and protocols used in information security • Management tools used to implement that system
Information Security in Society • Homeland Defense • Homeland Defense as an information security system • Need to communicate sensitive information efficiently in a crisis
Information Security in Society • HD Secretary Tom Ridge and Strategic Communications Resources (SECURE) Initiative • Five new HD officers per state • Secure telephones and video conferencing for the Governors office
Information Security in Society • Information based industry • Potential loss • New information technology = New vulnerabilities
Secure Information Network Physical Architectures • Homeland example • Telephony equipment • Emergency Operations Center
FIPS 140-2 • FIPS 140-2(Federal Information Processing Standard) • Crypto-modules • tests hardware, software, firmware • crypto algorithms • key-generation
Secure Environments • Secure Environments: • authorized personnel • placing servers locally • disconnected information networks
Smart Cards • Used in combination with other id-securing methods • Portable • Secure • Difficult to replicate, useless to steal • Appearance; gold-contacts • Microprocessor • Also can be used to facilitate secure communications
Smart Cards • Little interoperability between software and hardware of different vendors • Difficult implementation and maintenance • NIST (National Institute of Standards and Technology) • NIST is working on guidlines/specifications (as we’ll see in the next section)
Firewalls • Located on routers or servers • Blocks specific communications and allows specific communication
FIREWALL Telnet SSH Web Browsing FTP SFTP
Firewalls • Located on routers or servers • Blocks specific communications and allows specific communication • useful in preventing viruses
Connected Networks • Can be physically isolated to provide security • Controlled communication access points
VLANS • By remote login, a server can make it appear as though the user is on a network • Secure tunneling
WIFI • Wi-Fi (short for "wireless fidelity") • Ever-growing WiFI networks
WIFI • Wi-Fi (short for "wireless fidelity") • Ever-growing WiFI networks • Unsecured
WIFI • Current business trends Demand Robust Security Networks (RSNs) on WiFi: • RSN • Dependable • Secure • Versatile
WIFI • WIFI products need to • Provide security • Multi-vendor interoperability • Long security lifecycle to lengthen usability • Support hotspots connectivity
WIFI and FIPS 140-2 • 802.11b IEE standard • Minimal security • FIPS 140-2 and 802.11 and Bluetooth standard (for WiFi) • IEEE, IETF, NIST working to create effective standards • Theory: higher level crypto protocols, like IPSec (next section)
WIFI • Interim methods to minimizing WIFI losses: • Detailed wireless topology • Inventory of devices • Frequent back-ups • Random security audits of WiFi infrastructure • Monitor WIFI technology changes
Universals Standards/Protocols • Different technology vendors and universals standards/protocols
Standards and Protocols • Information security standards/protocols are also policy
Standards and Protocols • Congress and the Gramm Leach-Bliley Act • Bank security policies • Information security standards • Protect customer info • Protect other nonpublic info • Safe, secure, and reliable transactions
Standards and Protocols • ISO 17799, ISF, NIST: • Guidelines that have standards for information security • Security communication protocols • Cryptographic standards • What are common cryptographic standards?
Cryptographic Standards • Common cryptographic standards • Integrity • Authenticity • Authorization/access control model • Non-repudation
Cryptographic Standards • Definition: block cipher • Definition: cipher text • Definition: stream cipher • Definition: symmetric block cipher • algorithm to encrypt and decrypt block text
Cryptographic Standards • Digital Signature Standard (DSS) • Authentication and Integrity • Digital Signature Algorithm (DSA): public-private keys schemes (discussed later)
DSA • Hashing • Definition: message digest • Digest encrypted with DSA
DSA • FIPS 180-1 (FIPS Hashing standard) • SHA-1, SHA-256 blocks <2^64 bits • SHA-384, SHA-512 blocks <2^128 bits • changes to a message results in a different digest (high probability) • also used with stored data
Keys • Secret keys
Secret Key Original Key Copy Key
Keys • Public-Private Keys
Public Key Secret Key Private Key
Public Key Private Key Message Encrypted Message Decrypted Message
Keys • Key certificates • Key lifecycle
Keys • Key-substitution vulnerability
Keys • Key-destruction vulnerability
Keys • Controlling the key lifecycle • Crypto-periods
PKI • Public Key Infrastructure (PKI) • Certificate Authorities • Electronic transport • Manual key transport • Trust
IPSEC • IPSEC uses keys • Works on the Transport Layer