Introduction Security One
Introduction Security One
Chapter 1
DO NOT FIGURE ON OPPONENTS NOT
ATTACKING; WORRY ABOUT YOUR OWN
LACK OF PREPARATION.
-- BOOK OF THE FIVE RINGS
Learning Objectives:
Slide
2
Information security in todays enterprise is a wellinformed sense of assurance that the information
risks and controls are in balance. Jim Anderson,
Inovant (2002)
The 1960s
Slide
6
for misuse
Fundamental problems with ARPANET security
were identified
No safety procedures for dial-up connections to the
ARPANET
User identification and authorization to the system were
non-existent
In the late 1970s the microprocessor expanded
609
The scope of computer security grew from physical
security to include:
The 1990s
Slide
10
The Present
Slide
11
What Is Security?
Slid
e 12
from danger
To be protected from adversaries
A successful organization should have multiple
layers of security in place:
Physical security
Personal security
Operations security
Communications security
Network security
Availability
Accuracy
Authenticity
Confidentiality
Integrity
Utility
Possession
an absolute; it is a process
Security should be considered a balance between
protection and availability
To achieve balance, the level of security must allow
reasonable access, yet protect against threats
Bottom Up Approach
Slid
e 21
participant support
organizational staying power
Top-down Approach
Slid
e 23
posture/program
Slid
e 26
Investigation
Slid
e 27
to solve?
Analysis
Slid
e 28
Consists primarily of
Logical Design
Slid
e 29
Physical Design
Slid
e 30
Implementation
Slid
e 31
tested
Users are trained and documentation created
Users are then presented with the system for a
performance review and acceptance test
Security Systems
Development Life Cycle
Slid
e 33
Investigation
Slid
e 34
and constraints
Begins with a statement of program security policy
Teams are organized, problems analyzed, and scope
defined, including objectives, and constraints not
covered in the program policy
An organizational feasibility analysis is performed
Analysis
Slid
e 35
Implementation
Slid
e 37
Senior Management
Slid
e 40
Data Ownership
Slid
e 42
Communities Of Interest
Slid
e 43
Security as Art
Slid
e 45
Security as Science
Slid
e 46
levels of performance
Specific conditions cause virtually all actions that
occur in computer systems
Almost every fault, security hole, and systems
malfunction is a result of the interaction of specific
hardware and software
If the developers had sufficient time, they could
resolve and eliminate these faults