1 / 8

Meeting 1 Designing Secure Networks Week I

Live Session Presentation. Meeting 1 Designing Secure Networks Week I. Information Systems Security. Purpose: Confidentiality Integrity Availability Also: Authenticity Non-Repudiation. Protect. Detect. Full security is achieved through: physical, administrative, and

gyala
Download Presentation

Meeting 1 Designing Secure Networks Week I

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Live Session Presentation Meeting 1 Designing Secure Networks Week I

  2. Information Systems Security Purpose: Confidentiality Integrity Availability Also: Authenticity Non-Repudiation Protect Detect Full security is achieved through: physical, administrative, and technical safeguards common sense Recover Respond

  3. Information Systems Security Assets Threats Threat Agents Vulnerabilities Risk Countermeasures

  4. Chaos Infrastructure Issues While many books and lectures paint the picture of loss or capture of your personal business systems and data, consider the potential impacts for a moment of modification or destruction to data and/or software, or hacking into and gaining root/superuser access (disclosure), and/or denying authorized service to the following systems: Railroad Switching Computers Power Grids for Major Cities Reservoir Dam Control Systems Nuclear Reactor Control Systems Traffic Control Systems Internal Revenue Service Systems “911” Services Your Agency/Company Payroll

  5. Potential Impacts Sophistication of available tools Required Technical Skills 1940 2001

  6. Key Players Management End Users (First Line of Defense) System Administrators Infrastructure Support Services

  7. Common Sense Management Support Confidentiality Availability Integrity “Key” Premise Keep in Mind: The ultimate Goal is to apply Top-Down support and Common Sense to Integrity, Confidentiality, and Availability concerns. Information Resources … and don’t forget … Your Mom may have wanted you to bundle up by applying layers in the Winter… Same goes for your network … Defense in-Depth!

  8. Asynch Session Readings http://www.sans.org/infosecFAQ/policy/sec_aware.htm http://www.sans.org/infosecFAQ/homeoffice/personal_fw.htm Discussion: Introduction to Information Systems Security, Security Policy and Training.

More Related