Security Fundamentals

Goals

Confidentiality

r

1)Use network security mechanisms (firewalls & ACLs)2)Require credentials (usernames & passwords)3)Encrypt traffic

Integrity

r

1)Modifying the appearance of a corporate website2)Intercepting and altering and e-commerce transaction3)Modifying finacial records

Availability

r

1)Send improperly formatted data to create an unhandled exception error2)Flood network with a denial-of-service (DoS) attack

Types of Threats

Internal

r

1)Have knowledge of network and available resources2)Some level of access granted b/c of job3)Traditional sec. mechanisms (i.e. IPS and firewalls) are ineffective against

External

r

Tend to be more technical (i.e ping sweeps or port scans)

Data Classifications

Government

Unclassified

r

Few or no privacy requirements

Sensitive but Unclassified

r

Could casue embarrassment but not a security threat

Confidential

r

Reasonaable probability of causing damage if disclosed

Secret

r

Reasonalbe probability of casuing serious damage if disclosed

Top-Secret

r

Reasonable probability of causing exceptionally grave damage if disclosed

Charateristics

Value

r

How valuable the date is to the organization

Age

r

How old is the data

Useful Life

r

How long is the data will be considered relevant

Personal Association

r

How personal the data is

Roles

Owner

r

1)Initally determines the classification level2)Routinely reviews documented procedures for classifying data3)Gives the custodian the resoponsibilty of protecting the data

Custodian

r

1)Keeps up to date backups2)Verifies the intergrity of backups3)Restores data from backups4)Follows policy guidelines to maintain data

User

r

1)Accesses and uses data in accordance with an established security policy2)Takes reasonable measures to protect the data he or she has access to3)Uses data for only organizational purposes

Contols

Administrative

r

1)Routine security awarness training2)Clearly defined security policies3)Logging config changes4)Properly screening potential employees

Physical

r

1)Security systems2)Physical security barriers3)Climate protection systems4)Security personnel

Preventive

Deterrent

Detective

Technical

r

1)Security appliances (firewalls, IPS, VPN termination)2)Authorizations appliances (RADIUS or TACACS+ servers)

Security Incident

Effective Argument

Motive

Means

Opportunity

Ramifications

Criminal Law

Civil Law

Administrative Law