Computer Security I
Computer Security I
CS 456
Security I
Configure a secure client
Anomymous Browseing
Encrypted e-mail
Cryptography
Information Security Systems Engineering
Trust Models, Threat Models
Secure Systems Test & Evaluation
Systems Security Testing
CS 456
Security I
Requirements:
No Whining
1 Paper
1 Secure e-mail
1 AD Lab
1 Crypto Project
1 Midterm
1 Final
CSIA Track
WARNING
The material that you will learn in the CSIA track is dual
use.
The ethical and legal implications of your use of
information and techniques presented should always be
part of your decisions.
Information Systems Security
Information assurance
Electronic information
Ubiquity
Importance
Corruptibility
Information systems
Characteristics
Types
Pervasive
Information Assurance
Security
Data
Communications
Executables
System states
Analog information
Information Security Model
Information States
Security Measures
i on g
i ss ge s in
m r a es
Training
n s Sto oc
a r
Tr
Critical Information
Policies
Characteristics
Technology
Confidentiality
Integrity
Availability
Information States
Transmission
Storage
Processing
Information Transmission
Space
Radio waves
Copper
Analog
Digital
Glass
Snell's Law
Information Storage
Altered executables
Introduced executables
Scripts
Information Security Model
Information States
Security Measures
i o n
iss ge in g
n sm or a ess
Training
ra S t r oc
T
Critical Information
Policies
Characteristics
Technology
Confidentiality
Integrity
Availability
Critical Information Characteristics
Confidentiality
Integrity
Availability
CIA
Confidentiality
Only those who are authorized have access in information
Integrity
Information is in a known and trusted state
Availability
Information is available when needed
Confidentiality
Information States
Security Measures
i o n
iss ge in g
n sm or a ess
Training
ra S t r oc
T
Critical Information
Policies
Characteristics
Technology
Confidentiality
Integrity
Availability
Security Measures
Technology
Policies & Procedures
Training & Awareness
Technology Measures
Programs
Software
Architecture
Design
Etc.
Policy and Procedures
What to do
How to do it
What is permissible
What is not
Policies
Sample Policies
www.sans.org/resources/policies
Many of these policies are part of the Employee
Handbook
These are the laws of the Corp
Procedures
Training is dumb
Training is everything
Training, Education & Awareness
The most important security measure
Understanding:
Reasons for security
Reasons for info protection
Results of not doing it
Information Security Architecture
Management Stuff
Organization
Legal
Counsel CEO
CIO CFO
Continuous
Automated vulnerability scanners
Correlate with event logs
Immediate remediation
Patches must be evaluated on a test bench
Malware Defenses
Automatic backups
Incremental regularly
Extensive testing of the backup system
All backups should be encrypted
Backup media should be protected with physical security
Security Skills Assessment