Information Assurance Essentials

overview n.w
1 / 22
Embed
Share

Explore key concepts in Information Assurance including security components, common threats, defense strategies, policy goals, and correctness considerations. Enhance your understanding with examples and insights from Adam Doup at Arizona State University.

  • Information Assurance
  • Security Components
  • Threats
  • Defense Strategies
  • Policy Goals

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Overview CSE 465 Information Assurance Fall 2017 Adam Doup Arizona State University http://adamdoupe.com

  2. What is security? Adam Doup , Information Assurance 2

  3. Components of Security Confidentiality Access Control Encryption Integrity Prevention Detection Availability Denial of Service Adam Doup , Information Assurance 3

  4. Threats Disclosure Deception Disruption Usurpation Adam Doup , Information Assurance 4

  5. Common Threats Snooping (wiretapping) Modification/alteration Man-in-the-middle (MITM) Masquerading/spoofing Delegation? Repudiation Denial of receipt Delay Denial of service Adam Doup , Information Assurance 5

  6. How to Defend Against Threats? Security policy Security mechanism Adam Doup , Information Assurance 6

  7. Example The system we want to defend is a house. Threats? Policy? Mechanism? Adam Doup , Information Assurance 7

  8. Security Policy Goals Prevention Detection Recovery Adam Doup , Information Assurance 8

  9. Defining Policies Natural Language Mathematics Policy Languages Adam Doup , Information Assurance 9

  10. Correctness of Security Policy Assumptions What assumptions did we make in our house example? Policy is correct Mechanism correctly implements policy Trust Who do we trust? Adam Doup , Information Assurance 10

  11. Mechanisms Technical Procedural Adam Doup , Information Assurance 11

  12. Security Mechanism Effectiveness Secure Precise Broad Adam Doup , Information Assurance 12

  13. Assurance How to trust that the system is secure? How much to trust the system? Can this be quantified? What does it depend on? Adam Doup , Information Assurance 13

  14. Specification What is the system supposed to do? How to define? Adam Doup , Information Assurance 14

  15. Design How to design the system? Does the design satisfy the specification? How to prove this? Adam Doup , Information Assurance 15

  16. Implementation How is the design implemented? Does the implementation satisfy the design? How to prove this? Adam Doup , Information Assurance 16

  17. Deployment, Configuration, Operation How is the implementation Deployed? Configured? Operation? How to prove this? Adam Doup , Information Assurance 17

  18. Cost-Benefit Analysis Are security measures/mechanisms worth the cost? What factors to consider? Adam Doup , Information Assurance 18

  19. Risk Analysis Should an asset be protected? What threats does it face? What are the consequences if it is attacked? What level to protect an asset? Does risk remain constant? How to quantify risk? Adam Doup , Information Assurance 19

  20. Laws/Customs Laws can restrict policy and mechanisms Various countries have (or have had in the past) laws regrading cryptography Could privacy laws restrict an admin from performing their job? Customs Adam Doup , Information Assurance 20

  21. Adam Doup, Information Assurance 21

  22. Human Issues Who is responsible for security in an organization? How much budget do they have? How much organizational power do they have? Who enforces the security of a system? People and systems Adam Doup , Information Assurance 22

Related


More Related Content