csc 386 – computer security scott heggen. agenda security management

14
CSC 386 – Computer Security Scott Heggen

Upload: winifred-byrd

Post on 27-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

CSC 386 – Computer Security

Scott Heggen

Page 2: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Agenda

• Security Management

Page 3: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Security Management

• What goes in a security policy?

• Examples: http://www.sans.org/security-resources/policies

Page 4: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Security Management• Scenario 1:

– Company XYZ is a new company devoted to developing a social networking platform

– The company will house their own servers which will provide its users with content

– The company will have an in-house IT team to manage their networks, but connect their servers to the Internet through the local ISP

– There will be three main teams working in the company: Administrators (CEOs, HR, Financial, etc.), Developers (software engineers, electrical engineers, graphic designers, etc.), and IT (network engineers, network operations experts, customer service)

– They expect their software to serve at least one million users in the next five years

Page 5: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Measuring Security

• Once a policy is in place, how do you know if it’s working?

• How do you quantify “secure”?

Page 6: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Security Management

• Scenario 2:– You are a contractor for the U.S. government who

develops missile control modules– You have regular communications with 3 other

government contractor companies regarding the integration of your modules with their parts of the system

Page 7: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Risk and Threat Analysis

Page 8: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Risk and Threat Analysis

• Identify the assets valuable to your company• Identify the threats that exist to each asset• Determine the impact a threat can potentially

have on an asset• Monitor your assets for vulnerabilities• Prepare for attacks

Page 9: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Risk and Threat Analysis

Page 10: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Risk and Threat Analysis

Page 11: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Risk and Threat Analysis

Risk = Assets x Threats x Vulnerabilities

Trivial – Important - Critical

Very unlikely - Likely

Fix when convenient – Fix now!

Page 12: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Risk Analysis

• Scenario 1 revisited:– Company XYZ is a new company devoted to developing a social

networking platform– The company will house their own servers which will provide its users

with content use cloud-based servers to host content– The company will have an in-house IT team to manage their networks,

but connect their servers to the Internet through the local ISP– There will be three main teams working in the company:

Administrators (CEOs, HR, Financial, etc.), Developers (software engineers, electrical engineers, graphic designers, etc.), and IT (network engineers, network operations experts, customer service)

– They expect their software to serve at least one million users in the next five years

Page 13: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Risk Mitigation

• Now have a prioritized list of risks/threats• Can develop countermeasures to mitigate

those risks

• Remember, this is an on-going process; IT is constantly changing!

Page 14: CSC 386 – Computer Security Scott Heggen. Agenda Security Management

Next Class

• Due:– Have a good weekend

• Agenda:– Foundations of Computer Security (Chapter 3 of

your text)