information assurance and security: overview

25
Information Assurance and Security: Overview

Upload: dale

Post on 01-Feb-2016

195 views

Category:

Documents


5 download

DESCRIPTION

Information Assurance and Security: Overview. Information Assurance. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Information Assurance and Security: Overview

Information Assurance and Security: Overview

Page 2: Information Assurance and Security: Overview

Information Assurance

“Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”

National Information Assurance (IA) Glossary

Page 3: Information Assurance and Security: Overview
Page 4: Information Assurance and Security: Overview
Page 5: Information Assurance and Security: Overview
Page 6: Information Assurance and Security: Overview

Maconachy, Schou, Ragsdale (MSR) Cube

Maconachy, Schou, Ragsdale and Welch, A Model for Information Assurance: An Integrated Approach, Proceedings of the 2001 IEEE Workshop on IAS, USMA, West Point, NY 5-6 June 2001.

Page 7: Information Assurance and Security: Overview

Security Services:What types of problems can occur?

Confidentiality Integrity Availability Authentication Non Repudiation

Page 8: Information Assurance and Security: Overview

Confidentiality

“the assurance that information is not disclosed to unauthorized persons, processes or devices.”

Maconachy, Schou, Ragsdale and Welch, A Model for Information Assurance: An Integrated Approach, Proceedings of the 2001 IEEE Workshop on IAS, USMA, West Point, NY 5-6 June 2001.

Page 9: Information Assurance and Security: Overview

Integrity

“the assurance that data can not be created, changed, or deleted without proper authorization”

Wikipedia: Information Assurance

Page 10: Information Assurance and Security: Overview

Availability:

“Timely, reliable access to data and information services for authorized users.”

Maconachy, Schou, Ragsdale and Welch, A Model for Information Assurance: An Integrated Approach, Proceedings of the 2001 IEEE Workshop on IAS, USMA, West Point, NY 5-6 June 2001.

Page 11: Information Assurance and Security: Overview

Authentication

Security service “designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorizations to receive specific categories of information”

National Information Assurance (IA) Glossary

Page 12: Information Assurance and Security: Overview

Non-Repudiation

“The assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data”

Maconachy, Schou, Ragsdale and Welch, A Model for Information Assurance: An Integrated Approach, Proceedings of the 2001 IEEE Workshop on IAS, USMA, West Point, NY 5-6 June 2001.

Page 13: Information Assurance and Security: Overview

Maconachy, Schou, Ragsdale (MSR) Cube

Maconachy, Schou, Ragsdale and Welch, A Model for Information Assurance: An Integrated Approach, Proceedings of the 2001 IEEE Workshop on IAS, USMA, West Point, NY 5-6 June 2001.

Page 14: Information Assurance and Security: Overview

Information States:Where is the data?

Transmission Storage Processing

Page 15: Information Assurance and Security: Overview

Transmission

Time in which the data is in transit between processing/process steps.

Page 16: Information Assurance and Security: Overview

Storage

Time during which data is on a persistent medium such as a hard drive or tape.

Page 17: Information Assurance and Security: Overview

Processing

Time during which the data is actually in the control of a processing step.

Page 18: Information Assurance and Security: Overview

Security Countermeasures:Who can enforce/check security?

People Policy and Practice Technology

Page 19: Information Assurance and Security: Overview

People

The heart and soul of secure systems.

Awareness, literacy, training, education in sound practice.

Must follow policy and practice or the systems will be compromised no matter how good the design!

Both strength and vulnerability.

Page 20: Information Assurance and Security: Overview

Policy and Practice (operations)

System users System administrators Software conventions Trust validation

Also a countermeasure and a vulnerability.

Page 21: Information Assurance and Security: Overview

Technology

Evolves rapidly Crypto systems Hardware Software Network

Firewalls Routers Intrusion detection Other….

Platform Operating systems Transaction monitoring Other….

Especially vulnerable to misconfiguration and other “people” errors. (Does what we tell it to!)

Page 22: Information Assurance and Security: Overview

Time

Relationships between all parts change over time…

Page 23: Information Assurance and Security: Overview

The attack model.

Threat: Something that might happen Vulnerability: point in the system where a Threat

could compromise the system. Risk: The combination of the probability of an

event and its consequences Attack: Application of a threat to a system. Exploit: A successful attack Remediation: security team tries to figure out

what happened and come up with a fix to restore things and a countermeasure.

Countermeasure: What you do to fix a vulnerability so the threat can’t be exploited.

Page 24: Information Assurance and Security: Overview

Security Mindset:

Managed Paranoia They are out to get me.. How could they get me? Do I care? What is the real risk? What countermeasures can I apply to mitigate the risks (threats)? Where am I vulnerable? What will it cost to fix it? Is it worth it? Apply countermeasure… Attacks teach you many things. It is important to know you’ve been attacked! You must design and build security into a system, bolting it on after

just doesn’t work. Patches suck, but you have to fix known vulnerabilities or your

insurance company won’t pay damages and you might get thrown in jail… especially if you work with medical or personnel records.

Still want to be an IT major? That’s why they pay us the big bucks…

Page 25: Information Assurance and Security: Overview

Summary

We discussed a model for understanding how one thinks about assuring that one can trust information.

There are information states, security services, and coutermeasures.