CS5038: The Electronic Society Security 2: Concepts of Security.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

An Introduction to professional services. The professional services The professional services support businesses of all sizes across the economy, providing.
5038/2009: The Electronic Society Systems Thinking.
OECD/INFE High-level Principles for the evaluation of financial education programmes Adele Atkinson, PhD OECD With the support of the Russian/World Bank/OECD.
Project leaders will keep track of team progress using an A3 Report.
Overview of IS Controls, Auditing, and Security Fall 2005.
1 Continuity Planning for transportation agencies.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Chapter 10 Human Resource Management and Performance: a Review and Research Agenda David E. Guest.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Computer Security: Principles and Practice
Money Management Skills
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
An investment perspective of HRM
Network security policy: best practices
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Introduction to Network Defense
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Consultancy.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Managing Personal Finances. Next Generation Science/Common Core Standards Addressed! CCSS.ELA Literacy.RST.9 ‐ 10.8 Assess the extent to which the reasoning.
1.Knowledge management 2.Online analytical processing 3. 4.Supply chain management 5.Data mining Which of the following is not a major application.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Chapter 3 Internal Controls.
HIPAA PRIVACY AND SECURITY AWARENESS.
Chapter 1 Overview of a Financial Plan
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
OECD/INFE Tools for evaluating financial education programmes Adele Atkinson, PhD Policy Analyst OECD With the support of the Russian/World Bank/OECD Trust.
Group: Anju, Ashok, Justin, Joe and Christina
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
ISO ENVIRONMENTAL POLICY. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to:
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
On the Definition of Survivability J. C. Knight and K. J. Sullivan, Department of Computer Science, University of Virginia, December 2000.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Feasibility Study.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
CHAPTER TWENTY-ONE Portfolio Management CHAPTER TWENTY-ONE Portfolio Management Cleary / Jones Investments: Analysis and Management.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Chapter 1 Overview of a Financial Plan. Copyright ©2014 Pearson Education, Inc. All rights reserved.1-2 Chapter Objectives Explain how you benefit from.
Chapter 12 Money Management Strategies. Do Now  How do you organize your “stuff”?  Schoolwork?  Afterschool activities?  Personal Belongings?
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
DATA COLLECTION AND RECORD MANAGEMENT PRESENTED BY: MRS OLUWAFOLAKEMI A. AJAYI DEPUTY BURSAR UNIVERSITY OF IBADAN 5 TH APRIL 2016.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Ratio Analysis…. Types of ratios…  Performance Ratios: Return on capital employed. (Income Statement and Balance Sheet) Gross profit margin (Income Statement)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Compliance with hardening standards
Security Engineering.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

CS5038: The Electronic Society Security 2: Concepts of Security

Outline Types of security: physical, information, hybrid Concepts of information security – Declarative – Operational Applicability of concepts to physical and hybrid security. Management issues. Security Economics: What’s it worth? Policy, compliance, and trust

Physical Security Primarily about access control – Ensuring that people are kept within specified zones of buildings, countries, etc.; for example, library access, immigration, clubs Also about integrity – Ensuring that necessary properties of specified zones are maintained; for example, no sharp objects in the aircraft cabin, no landside liquids airside

Information Security Classically conceived as being about the following three declarative components: – Confidentiality: about secrecy of information (from those not allowed) – Integrity: about soundness, accuracy of information and information systems – Availability: about accessibility (for those allowed) to information and information systems.

Hybrid Security Some hybrid attacks: – Steal computer with unencrypted hard-drive – Server room/fire alarm

Declarative and Operational Concepts Declarative concepts express what we want to achieve: – Confidentiality – Integrity – Availability – Investment Operational concepts are the mechanisms used to achieve these things: – Access control – Authentication – Education/training – Policies, regulation

Investments in (Information) Security Organizations have limited resources (time, money, etc.) to invest in security Priorities expressed in terms of the declarative confidentiality, integrity, and availability Invest in policies, processes, and technologies − i.e., operational entities − to address these priorities

Example Types of Organizations, 1: Government Security Agency Top priority is usually confidentiality – State secrets to protect – Gathered intelligence to protect High concern for integrity – Important to base actions on uncorrupted information Limited concern for availability – Often would be prepared to disconnect systems to protect I and A, but not always

Example Types of Organizations, 2: Online Retailer Very high concern for availability – Loss of website or back-end for an hour costs a lot of money – Loss for a week might mean the business fails Some concern for confidentiality – Credibility may depend on never having has a credit card compromised – Compare Amazon and eBay Limited concern for integrity – An online retailer might, for example, indicate how many copies of a book are in stock – The actual number doesn’t need to be accurate, just need to give a reliable indication of whether any given order can be fulfilled

Example Types of Organizations, 3: Academic Medical Research Organization Very high concern for integrity – Critical that experiments and conclusions based on accurate data Some concern for availability – Some experiments will be time-critical Limited concern for confidentiality – Data all anonymized anyway – May be part of mission to make it widely available

Exercise Think about some more organizations and what their security priorities might be. For example – Banks – Schools, Colleges, and Universities – Environmental charities – Oil & Gas companies To what extent is the level of financial constraint significant?

Applicability of Concepts In fact, information security concepts are applicable to physical security. Consider airport security/customs/immigration: – Boarding card check is access control (confidentiality, in effect) – Security scanners are about integrity Think about other examples

Security Management For large organizations, security is a management as well as a technological problem. Involves various things: Asset management (investment, capital (IT infrastructure)) Physical security HR processes Formulation of policy, Choice of security controls, Operational IT security of network Risk assessment and risk analysis (including threats) Compliance with regulations – Payment Card Industry standards Payment Card Industry Must have a management system for all of the above. – That must comply with standards – e.g. ISO27001 from the ISO27000 seriesISO27000 – Deming cycle, Plan-Do-Check-Act

Management and Economic Decisions How to value security and decide what investments to make? Management accountancy model: – E.g., return-on-investment (ROI)ROI Problems: – High impact, low probability events (long tail) – What are good metrics? – Do we expect returns to grow linearly with invest.? – Rapidly changing threat environment – Intelligent opponents – Need to protect against threats that don’t emerge – Pressure to save on balance sheet, right now.

Sophisticated Economic Decisions Use models that account for behaviour of system and environment, and preferences of stakeholders. Find best choice of control based on preferences over resulting outcomes. Behaviour: equational models of systems, executable simulations, using probabilities Preferences: often using a utility function to score how much stakeholder likes choice.

Sophisticated Economic Decisions. Various kinds of model: Micro-economic decisions: model detailed interactions of stakeholder preferences. Macro-economic model: focus on whole large-scale system via aggregate variables. – E.g., Impulse-response models: how does IT system (and wider business) respond after security shock.

Utility Functions Idea: express, mathematically, how much the manager cares about deviations from targets for C, I, A, and investment, K Use weights w i − corresponding to the relative importance above − to capture the managers’ preferences: U(C, I, A, K, t) = w 1 f 1 (C – C * ) + w 2 f 2 (I – I * ) + w 3 f 3 (A – A * ) + w 4 f 4 (K – K * ) C = …, I = …, A = …, K = …, all functions of time, t, and of control variables, reflecting configuration under exploration. Explore equations analytically or experimentally (simulations).

Shock and Restore

Notes on the Graphs Key points: – Just look at the upper graphs (the lower ones are a technicality) – See how when a shock to confidentiality (i.e., a security breach) hits the system, the characteristics of the system respond – All governed by carefully formulated utility functions of the kind described Targets for all of C, I, and A are 0. When the shock hits, C (blue) is way below target. This causes spend (red) to go way above target, and system availability to go way below target; that is, the system’s operations have to be curtailed and money spent to fix the problem; with these actions taken, all of C, I, and A begin to return to nominal. Notice the difference between the left and right graphs: the left is for the configuration/preferences of a deep-state organization like a government security agency, whereas the right is for something like an online retailer. The graphs show that the agency is much more willing to sacrifice availability than the retailer. Model above comes from Investments and Trade-offs in the Economics of Information Security, D. Pym, C. Ioannidis and J. Williams, Proc. Financial Cryptography and Data Security 2009, LNCS 5628: , Springer, 2009

Policy, Compliance, and Trust These things are all inter-related If an organization has a security policy, how should it be implemented? – Forced compliance? – Employees/students/ … trusted to comply? – What about penalties? As before, different solutions are appropriate for different environments. Deep interaction of social and psychological phenomena with technical mechanisms (and management sitting in the middle).

Example Policy: unencrypted laptops may not be taken out of the building Enforced compliance: search and inspect on exit: – Intrusive, causes resentment – Slow and expensive – Encourages avoidance strategies Trusted compliance: – Trust employees to comply, but impose very heavy penalty (e.g., fire, prosecute) if found not in compliance

USB Sticks Study Research study part of a project, called ‘Trust Economics’, partly funded by the UK’s Technology Strategy Board. Involved HP Labs, UCL, Aberdeen, Bath, and Newcastle Universities, and Merrill Lynch City of London investment bank Policy & implementation for USB stick security Why is this important?

The bank’s staff all work in several different locations: – The office, inside the firewall – At clients’ offices – At home – In transit These locations all have different security characteristics: different threats, different levels of protection, different consequences

The Problem USB sticks are used for good, practical reasons: convenient way to move information around the different locations, to work on it, share it, use it for client presentations But USB sticks expose information to lots of risks: at home, in transit, at the client; for example: – Corruption/theft of data – Loss of stick – Accidental archiving

What’s the Solution? Encryption? It’s the obvious policy solution How to implement? – Technological enforcement? – Policy enforcement? What are the barriers? The major problem, identified by extensive empirical study (structured interviews, etc.) is a social one: – Bankers don’t like being embarrassed in front of clients,, losing face and maybe losing business and they get embarrassed when they forget their passwords Policies and implementations must take account of these things if they are to be effective In this case, it was concluded that enforced encryption would be the best option only if the bank’s staff included ‘traitors’ actively trying to leak information Very often, education and training, backed up with sanctions, works best.

Summary Types of security: physical, information, hybrid Concepts of information security – Declarative – Operational Applicability of concepts to physical and hybrid security. Management issues. Security Economics: What’s it worth? Policy, compliance, and trust