We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTobias Walsh
Modified over 8 years ago
MID/jpl 5/15/2015 1 © 1999 by James P. Litchko Total BS Security: Business-based Systems Security Jim Litchko email@example.com (703) 528-0334 ext. 310
MID/jpl 5/15/2015 2 © 1999 by James P. Litchko Presentation An Approach –Business and Holistic Attitudes –Ours and Theirs Solutions –Case Studies Opinions –Mine Questions –Anytime
MID/jpl 5/15/2015 3 © 1999 by James P. Litchko Typical Evolving Network Internet or other Clients Partners Corporate System
MID/jpl 5/15/2015 4 © 1999 by James P. Litchko “Secure Brick” Theory OperationsSecurity Manager ProfitLoss DemandSupply
MID/jpl 5/15/2015 5 © 1999 by James P. Litchko Approach... talk about their business What is your business? –Services and products How do you operate? –Processes for selling and providing Who does what? –Responsibilities and information flow How do you measure success? –Customer satisfaction, profit, market share, etc. What is your system’s architecture? –Components, connections, capabilities, and cultures
MID/jpl 5/15/2015 6 © 1999 by James P. Litchko Promotional Web Server Transaction System Service System Integrity Availability Confidentiality Integrity Authentication Clients Partners Confidentiality Visibility Availability Browser Impatient Security Requirements Internet or other Business/ ? Productivity 82% required no additional security products
MID/jpl 5/15/2015 7 © 1999 by James P. Litchko Attitudes and Perceptions: Sailor-on-liberty Philosophy –I want it fast, free and friendly Security only costs money –True, but.... The most secure solution has –best GUI –largest market share –relationship and trust Transparent to the user –Accept when...
MID/jpl 5/15/2015 8 © 1999 by James P. Litchko Attitudes and Perceptions: Sailor-Proof –If it is to hard they will find away around it KISS Principle –Education is the best bang for the buck –Increases ownership for solving security problems SNMP is the standard –Not a smoking gun.... a bleeding wound is needed. What is the aspirin for security: –firewalls, VPN, PKI, IDS,......? –Technology will solve all of our problems! –Email monitoring problem solution was policy.
MID/jpl 5/15/2015 9 © 1999 by James P. Litchko Which Authentication is best? Password? Time-based? Challenge and Response? Event-based? Biometrics? Public Key? VPN? IDS?
MID/jpl 5/15/2015 10 © 1999 by James P. Litchko Problem Subscription Information Service Provider Web site distribution Computer illiterate users Sharing passwords $40,000 loss per month What is the solution?
MID/jpl 5/15/2015 11 © 1999 by James P. Litchko Security and Business Math Profit: Loss: Net: Before $ 50B $ 4.5B $ 46.5B After $ 50B $ 1.0B $ 49.0B Better Idea? $
MID/jpl 5/15/2015 12 © 1999 by James P. Litchko Internet or WAN Promotional Web Server Read Only Firewall Firms Clients Firewall Support Operations Transaction System
MID/jpl 5/15/2015 13 © 1999 by James P. Litchko Internet or WAN Promotional Web Server Read Only Firewall Firms Clients IP Encryption Support Operations Transaction System
MID/jpl 5/15/2015 14 © 1999 by James P. Litchko Internet or WAN Promotional Web Server Read Only Firewall Firms Clients IP Encryption SSL Encryption Support Operations Transaction System
MID/jpl 5/15/2015 15 © 1999 by James P. Litchko Internet or WAN Promotional Web Server Read Only Firewall Clients IP Encryption SSL Encryption Intrusion Detection Systems and Assurance Testing “In God we trust. Everyone else we monitor.”
MID/jpl 5/15/2015 16 © 1999 by James P. Litchko Internet or WAN Promotional Web Server Read Only Firewall Firms Clients IP Encryption SSL Encryption Backups Surf Web Filter Support Operations Transaction System What business is this?
MID/jpl 5/15/2015 17 © 1999 by James P. Litchko Summary Based security on business first Practical solutions, not just technical Security is a business risk
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 Network Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
1 Chapter 5 Electronic Commerce, Intranets, and Extranets Information Systems Today Leonard Jessup and Joseph Valacich.
Unit 28- Website Development Assignment 1- THEORY P3
Presented by Manager, MIS. GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Public Key Infrastructure Ammar Hasayen ….
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
Sols Group 2002, Corporate Presentation. COMPANY PROFILE.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Outline Company Profile Services Provided Assets System Schema Risk Categories Technical Risks and Mitigation Summary.
© 2023 SlidePlayer.com Inc. All rights reserved.