-
Authentication
-
3 factors
-
1. Something you know
- password, PIN
-
2. Something you have
- Smart card, token device
-
3. Something you own
- fingerprint, voice print, iris pattern
-
Passwords
-
Poor mechanism
- Chosen: Too easy to remember
- Random: Too hard to remember
- Easily shared, written down, forgotten
- Can be stolen
- Transmitted in clear text
-
Strong passwords
- 8-12 characters or more
- Keep secret
- Not contain dictionary words
- Not the variant of username
-
Combination
- Uppercase letters
- Lowercase letters
- Numbers
- Punctuation
-
Biometrics
-
Type
- Fingerprints
- Retina scans
- Iris scans
- Facial scans
- Palm scans
- Hand writing
- Voice
-
Performance measurement
- False Rejection Rate percentage
- False Acceptance Rate percentage
- Crossover Error Rate percentage
-
Token devices
- Static
-
Dynamic
- synchronous
- asynchronous
- Challenge-response
-
Access Control
-
Subject
- Active
- Obtain information
- e.g. User, system, process
-
Object
- Passive
- Provide information
- e.g. file, database, printer
-
Phases
-
Identification
- Claim identity
-
Authentication
- Prove identity
-
Authorization
- Permission
-
Accounting
- audit user activity
-
Separation of duties
- Audit trail
- Logging
- Supervisory review
- Independent review
-
Standards
-
SOX404
- Target: publicly-traded organizations
- Use: protect financial information
-
HIPPA
- Target: healthcare/medical systems
- Use: protect health and patient data
-
Basel 2
- Target: Banks
- Use: banking laws and regulations
-
PCI-DSS
- Target: Card center/Bank
- Use: protect cardholders' information
-
ISO 27001
- Information security management system standard
-
Security Operations Management
- Proactive analysis
- System management
- Security device management
- Fault management
- Configuration management
- Reporting
- Security alert
- DDos mitigation
- Security assessment
- Technical assistance
-
Risk management
-
Risk: likehood that something bad will happen
- Risk = P(accident) x (loss)
-
Audit risk model
- AR = IR x CR x DR)
- I = Inherent
- C = Control
- D = Detection
-
Works
- Identify and estimate the value of assets
- Conduct threat assessment
- Conduct vulnerability assessment
-
Evaluate security elements
- Policies
- Procedures
- Standards
-
Calculate the impact
- Qualitative
- Quantitative
-
Identify, select, implement controls
- Evaluate effectiveness
-
Solutions
- Accept
- Mitigate
- Transfer
- Fix
- Authority + Responsibility + Accountability
-
Control
-
Administrative
-
Preventative access
- Avoid violations
-
Detective access
- Investigate violations
-
Corrective access
- Remedy violations
-
Recovery access
- Restore lost resources
-
Logical
- Password
- Firewall
- IDS
- ACL
- Encryption
-
Physical
- Door
- Lock
- CCTV
- Guard