160 likes | 324 Views
Bruce Schneier. Secrets & Lies Digital Security in a Networked World. Lanette Dowell November 25, 2009. Introduction. “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics” – Bruce Schneier in Applied Cryptography 1996 Security is a chain
E N D
Bruce Schneier Secrets & LiesDigital Security in a Networked World Lanette Dowell November 25, 2009
Introduction • “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics” – Bruce Schneier in Applied Cryptography 1996 • Security is a chain • It's only as secure as the weakest link. • Security is a process, not a product.
Part 1: The Landscape • Who are the attackers? • What do they want? • What do we need to deal with threats?
Part 1: The Landscape • Real life vs Digital World • Criminal Attacks • “How can I acquire the maximum financial return by attacking the system?” • Privacy Violations • Publicity Attacks • Legal Attacks
Part 1: The Landscape • Who are the bad guys? • Hackers • Criminals / Organized Crime • Insiders • Industrial Espionage • Press • Terrorists • National Intelligent Organizations • Infowarriors
Part 1: The Landscape • What do we need? • Privacy • Multilevel security • Anonymity • Authentication • Integrity
Part 2: Technologies • Examples of security technologies and their limitations • Cryptography
Part 2: Technologies • Identification and Authentication • Passwords • Biometrics • Access Tokens
Part 2: Technologies • Networked-Computer Security • Malicious Software • Viruses • Worms • Trojan Horses • Websites • URL hacking • Cookies • Etc…
Part 2: Technologies • Network Defences • Firewalls • DMZ (Demilitarized Zones) • VPN (Virtual Private Networks) • Honey Pots and Burglar Zones • Vulnerability Scanners • Email Security
Part 2: Technologies • Software Reliability • Faulty code • Buffer overflows • “Computers are stupid” • Secure Hardware • Putting a $100K lock on a cardboard house
Part 2: Technologies • Human Factor • Social engineering • Risks • Insiders
Part 3: Strategies • Given the requirements of landscape, and the limitations of the technology, what do we do now?
Part 3: Strategies • Threat Modeling and Risk Assessment • Attack Trees • Product testing • Verification • More software complexity = more security risks (next slide, Windows…)
Part 3: Strategies • Lines of code in Windows: • Windows 3.1: 3 million • Windows NT: 4 million • Windows 95: 15 million • Windows NT 4.0: 16.5 million • Windows 98: 18 million • Windows 2000: 35-60 million
Conclusion • Computer bugs, vulnerabilities. • Should they be published publically? • Work towards stronger software and hardware