Title: Physical security involves the provision of a safe
1Building a SuccessfulSecurity Infrastructure
Terrence V. Lillard T. Lillard Consulting, Inc.
2Ten Security Domains
Cryptography
Law, Investigations, and Ethics
Telecommunication Network Security
Access Control
Application/System Security
Security Management
Operations Security
Security Architecture
Business Continuation Disaster Recovery Planning
Physical Security
3Group Discussion
- Cryptography
- Law, Investigations Ethics
- Access Control Systems Methodology
- Security Management Practices
- Security Architecture Models
- Physical Security
- Business Continuity Disaster Recovery Planning
- Operations Security (Computers)
- Application Systems Development
- Telecommunications Network Security
4Security Infrastructure
- Cryptography. - is the use of secret codes to
achieve desired levels of confidentiality and
integrity. Two categories focus on (1)
cryptographic applications and uses and (2)
crypto technology and implementations. Included
are basic technologies, encryption systems, and
key management methods.
5Security Infrastructure
- Law, Investigation, and Ethics. Law involves the
legal and regulatory issues faced in an
information security environment. Investigation
consists of guidelines and principles necessary
to successfully investigate security incidents
and preserve the integrity of evidence. Ethics
consists of knowledge of the difference between
right and wrong and the inclination to do the
right thing.
6Security Infrastructure
- Access Control. Access control consists of all of
the various mechanisms (physical, logical, and
administrative) used to ensure that only
authorized persons or processes are allowed to
use or access a system. Three categories of
access control focus on (1) access control
principles and objectives, (2) access control
issues, and (3) access control administration.
7Security Infrastructure
- Security Management Policies, Standards, and
Organization. Policies are used to describe
management intent, standards provide a consistent
level of security in an organization, and an
organization architecture enables the
accomplishment of security objectives. Four
categories include (1) information
classification, (2) security awareness, (3)
organization architecture, and (4) policy
development.
8Security Challenges?
Secured Infrastructure
9Security Infrastructure
- Security Architecture. Security architecture
involves the aspects of computer organization and
configuration that are employed to achieve
computer security. In addition implementing
system security to ensure mechanisms are used to
maintain the security of system programs.
10Security Architecture
Cryptography Public Key (RSA) X.509
Certificates Digital Signatures Digital
Envelopes Hashing/Message Digest Symmetric
Encryption Certificate Authorities
Security Attacks Viruses Trojan
Horses Bombs/Worms Spoofing/Smurf Sniffing and
Tapping DOS Etc.
Domain Trust Management Directional
Trust Transitive Trust Kerberos NTLM
Security Infrastructure DNSDMZ,
Firewalls Directory Services IDS Virus
Checkers VPN PKI NAT RADIUS, Remote Access Web
Servers DHCPWireless
Security Goals Authentication Auditing Availabilit
y Authorization Privacy Integrity Non-Repudiation
Application Single Sign On Kerberos/DCE Mixed/Inte
grated Security Smart Cards Cryptographic
APIs PDAs (PocketPC, Palm Pilots)
Protocols IPSEC SSL/TLS Kerberos L2TP PPTP PPP Etc
.
11Security Infrastructure
- Physical Security. Physical security involves the
provision of a safe environment for information
processing activities with a focus on preventing
unauthorized physical access to computing
equipment. Three categories include (1) threats
and facility requirements, (2) personnel physical
access control, and (3) microcomputer physical
security.
12Security Infrastructure
- Business Continuity Planning and Risk Management.
Risk management encompasses all activities
involved in the control of risk (risk assessment,
risk reduction, protective measures, risk
acceptance, and risk assignment). Business
continuity planning involves the planning of
specific, coordinated actions to avoid or
mitigate the effects of disruptions to normal
business information processing functions.
13Security Infrastructure
- Operations Security (Computer). Computer
operations security involves the controls over
hardware, media and the operators with access
privileges to these. Several aspects are included
notably, operator controls, hardware controls,
media controls trusted system operations, trusted
facility management, trusted recovery, and
environmental contamination control.
14Security Infrastructure
- Application and System Development. Application
and system security involves the controls placed
within the application and system programs to
support the security policy of the organization.
Topics discussed include threats, applications
development, availability issues, security
design, and application/data access control.
15Security Infrastructure
- Telecommunications Network Security.
Communications security involves ensuring the
integrity and confidentiality of information
transmitted via telecommunications media as well
as ensuring the availability of the
telecommunications media itself. Three categories
of communications security are (1)
telecommunications security objectives, threats,
and countermeasures (2) network security and
(3) Internet security.
16Multiple Combined Security Strategies
17Ten (10) Security Strategies
18Security Requirements
- Authentication
- Availability
- Auditing
- Authorization
- Privacy/Confidentiality
- Integrity
- Non-repudiation
4APIN
19Stages of Information and Classification
- Disseminate
- Process
- Accumulate (Collect)
- Store
- Transmit
D-PAST
20N-Factor Authentication Methods
- Someplace where you are located (SITE).
- Something that you HAVE.
- Something that you ARE.
- Something that you NEED.
- Something that you KNOW
SHANK
21TLCs Security Stoplight Chart
22Security Controls
- Types of Control
- Preventive
- Detective
- Corrective
- Deterrent
- Recovery
- Compensating
23Questions/Answers
Security Infrastructure