DOC PREVIEW
MSU CSE 870 - Introduction to Information Security

This preview shows page 1-2-3-20-21-22-41-42-43 out of 43 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Introduction to Information SecurityPowerPoint PresentationOutlineTerminologyWhat is secure?Why Worry?Three Common FailuresThe ChallengeHow do we get there?Understanding SecurityPsychological AcceptabilityPatchesSlide 13Quality as a Market ProblemWhat can we do?Security PlanningPlanning Your Security NeedsCritical Concerns for Various Industries?Risk AssessmentRisk Assessment Step 1: Identify AssetsRisk Assessment Step 2: Identify ThreatsRisk Assessment Step 3: Quantify ThreatsCost Benefit AnalysisCreating PolicyThe Role of PolicyPolicy ExampleStandardsExample: Standard for BackupsGuidelinesKeys to Developing PolicyGoals for Security PoliciesHow to Attain the Goals?Security Policy ContentResponse PolicyFour Easy Steps to a More Secure ComputerThreat CategoriesAttack MethodsSecurity Services - 1Security Services - 2Slide 40User Anxiety & PerceptionsInternet Privacy PoliciesTRUSTeIntroduction to Information SecurityAnnie I. AntónCollege of Engineering{[email protected]}NC STATE UNIVERSITYOutlineTerminologyBrief IntroductionSecurity PlanningCreating a SecurityPolicyThreats, Attacks &ServicesInternet Privacy PoliciesTerminology“A computer is secure if you can depend on it and its software to behave as you expect.”‘Trust describes our level of confidence that a computer system will behave as expected.’[Garfinkel & Spafford]What is secure?Does not disclose informationDoes not allow unauthorized accessDoes not allow unauthorized changeMaintains QoS despite input and loadPreserves audit, authenticity, controlNo surprises![Spafford]Why Worry?Information has value–when combined–when altered–when disclosedResource use has value–unauthorized use–denial of serviceDamage to reputation–damage to your personal reputation–damage to your group–damage to your companyYour system is not alone–other machines on the network–shared resources and files–indirect liability[Spafford]Three Common FailuresOrganization has no formal policy. Thus, personnel cannot consistently make necessary decisions.Organization has no reasonable response plans for violations, incidents, and disasters.Plans don’t work when needed because they haven’t been regularly tested, updated, and rehearsed. (E.g., failure of operational security)[Spafford]The ChallengeWithout assurance that our systems will stay secure, we endanger our economies, our privacy, our personal safety and privacy, and our social institutions.[Spafford]How do we get there?Understand the needs of the users–Narrow focus better than broadUnderstand basic tenets of security–Paucity of programs and expertsCapture requirements for design and validationDesign with care using good tools and methodsValidate & Verify[Spafford]Understanding SecurityGood security means–Limiting what happens–Limiting who can make it happen–Limiting how it happens–Limiting who can change the systemUsers don’t tolerate limits unless there is a paradigm shift–E.g., Palm computers[Spafford]Psychological AcceptabilityEasy to use–Should be as easy to use as to not useFalse alarms should be avoidedFrequent changes and updates are badShould not require great expertise to get correct…Doesn’t match user population[Spafford]PatchesFixes for flaws that require an expert to install are not a good fix.Fixes that break something else are not a good fix.Frequent fixes may be ignored.Goal should be design, not patch[Spafford]Source:Securityfocus.comAbout 30% are buffer overflows or unchecked dataOver 90% are coding/design flaws.[Spafford]Quality as a Market ProblemGood software engineers and security designers are scarceProductivity of coders varies:–Top 10% are at least 10x more productive than average coder. –Organizations should invest inraising skill level.That takes time and money, so there is a disincentive to improving quality[Spafford]What can we do?Understand that there is no “average user”Understand balance between features and securityEmploy better testingManage complexity and changeBuild in security from the startUnderstand policy differences.[Spafford]Security PlanningSecurity needs planningRisk assessmentCost-benefit analysisCreating policies to reflect your needsImplementationAudit and incident response[Garfinkel & Spafford]Planning Your Security NeedsConfidentialityData IntegrityAvailabilityConsistencyControlAudit[Garfinkel & Spafford]Critical Concerns for Various Industries?Banking environment?National defense-related system that processes classified information?University?eCommerce?Risk AssessmentThree questions to answer:–What am I trying to protect?–What do I need to protect against?–How much time, effort and money am I willing to expend to obtain adequate protection?Three key steps:–Identify assets–Identify threats–Calculate risks[Garfinkel & Spafford]Risk Assessment Step 1: Identify AssetsTangibles–Computers, disk drives, proprietary data, backups and archives, manuals, printouts, commercial software distribution media, communications equipment & wiring, personnel records, audit records Intangibles–Safety & health of personnel, privacy of users, personnel passwords, public image & reputation, customer/client goodwill, processing availability, configuration information[Garfinkel & Spafford]Risk Assessment Step 2: Identify ThreatsIllness of key peopleLoss of key personnelLoss of phone/network servicesLoss of utilities (hone water, electricity) for a short or prolonged timeLightening or floodTheft of disks, tapes, key person’s laptop or home computerIntroduction of a virusComputer vendor bankruptcyBugs in softwareSubverted employees or 3rd party personnelLabor unrestPolitical terrorismRandom “hackers”[Garfinkel & Spafford]Risk Assessment Step 3: Quantify ThreatsEstimate likelihood of each threat occurringIf an event happens on a regular basis, you can estimate based on your recordsOther sources:–Power company: official estimate of likelihood for power outage during coming year–Insurance company: actuarial data on probabilities of death of key personnel based on age & health–Etc.Example: Earthquake once in 100 years (1% of your list) vs. discovery of 3 serious bugs in sendmail during next year (300%)[Garfinkel & Spafford]Cost Benefit


View Full Document

MSU CSE 870 - Introduction to Information Security

Documents in this Course
HW2

HW2

3 pages

splc1

splc1

21 pages

Lessons

Lessons

3 pages

revision

revision

13 pages

ft1

ft1

12 pages

john.dsn

john.dsn

21 pages

Survey

Survey

2 pages

revision

revision

38 pages

Load more
Download Introduction to Information Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Introduction to Information Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction to Information Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?